Re: [tcpm] poll for adoption of draft-gont-tcpm-tcp-timestamps-03

Joe Touch <touch@ISI.EDU> Tue, 23 March 2010 18:00 UTC

Return-Path: <touch@ISI.EDU>
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B5BB33A683C for <tcpm@core3.amsl.com>; Tue, 23 Mar 2010 11:00:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.364
X-Spam-Level: **
X-Spam-Status: No, score=2.364 tagged_above=-999 required=5 tests=[AWL=-1.667, BAYES_50=0.001, DNS_FROM_OPENWHOIS=1.13, J_CHICKENPOX_19=0.6, MANGLED_OFF=2.3]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5l+DaBVKRLv9 for <tcpm@core3.amsl.com>; Tue, 23 Mar 2010 11:00:06 -0700 (PDT)
Received: from vapor.isi.edu (vapor.isi.edu [128.9.64.64]) by core3.amsl.com (Postfix) with ESMTP id 758CC3A6D39 for <tcpm@ietf.org>; Tue, 23 Mar 2010 10:51:17 -0700 (PDT)
Received: from [130.129.28.166] (dhcp-wireless-open-abg-28-166.meeting.ietf.org [130.129.28.166]) (authenticated bits=0) by vapor.isi.edu (8.13.8/8.13.8) with ESMTP id o2NHoXlY029117 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Tue, 23 Mar 2010 10:50:34 -0700 (PDT)
Message-ID: <4BA8FF68.8040302@isi.edu>
Date: Tue, 23 Mar 2010 10:50:32 -0700
From: Joe Touch <touch@ISI.EDU>
User-Agent: Thunderbird 2.0.0.24 (Windows/20100228)
MIME-Version: 1.0
To: Fernando Gont <fernando@gont.com.ar>
References: <C304DB494AC0C04C87C6A6E2FF5603DB47DF997795@NDJSSCC01.ndc.nasa.gov> <4BA8E5C6.8010509@isi.edu> <4BA8F90C.6040703@gont.com.ar>
In-Reply-To: <4BA8F90C.6040703@gont.com.ar>
X-Enigmail-Version: 0.96.0
Content-Type: multipart/signed; micalg="pgp-sha1"; protocol="application/pgp-signature"; boundary="------------enig5868E22829D72ACFF37A8053"
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: "tcpm@ietf.org" <tcpm@ietf.org>
Subject: Re: [tcpm] poll for adoption of draft-gont-tcpm-tcp-timestamps-03
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Mar 2010 18:00:06 -0000


Fernando Gont wrote:
> Hi, Joe,
> 
>> By randomizing the initial timestamp, we now need to keep per-connection
>> timestamp offsets, which increases both state and processing. 
> 
> Huh? I don't follow this. Could you clarify what's the "extra state" and
> "extra processing" you're referring to?

   timestamp = T() + F(localhost, localport, remotehost, remoteport,
   secret_key)

Either I need to keep the result of F(...), or I need to recompute for
each timestamp. The former costs processing, the latter costs state.

Either way, you're adding an index and an add to the timestamp
calculation. That's processing. We're talking about extra steps for
every packet.

>> It also
>> means that incoming connections to socket pairs in TIME_WAIT would
>> silently fail roughly half the time, requiring undue timeouts.
> 
> Joe, please read the I-D. It's *without* this RFC1948-like scheme that
> timeouts/delays could occur. -- this mod actually improves the handling
> of incoming connection requests (SYNs), allowing connections that would
> have otherwise failed.

The document never asserts that the "secret_key" would never change.

If it does change, you run the risk that F(...) will end up being
sufficiently lower that you fall through your checks and treat the SYN
as a silent discard, which causes delays.

Joe





> 
> (see also the reference to Mike Silbersack's presentation at BSDCan)
> 
> Thanks,