Re: [tcpm] MSL 120sec still a good value?

tuexen@fh-muenster.de Sat, 12 November 2022 09:59 UTC

Return-Path: <tuexen@fh-muenster.de>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB2D3C1526FC for <tcpm@ietfa.amsl.com>; Sat, 12 Nov 2022 01:59:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.885
X-Spam-Level:
X-Spam-Status: No, score=-1.885 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4POwK_7Ra0ie for <tcpm@ietfa.amsl.com>; Sat, 12 Nov 2022 01:59:50 -0800 (PST)
Received: from drew.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 59D68C1526FB for <tcpm@ietf.org>; Sat, 12 Nov 2022 01:59:49 -0800 (PST)
Received: from smtpclient.apple (unknown [IPv6:2a02:8109:1140:c3d:b8ff:49dd:17ad:f2a1]) (Authenticated sender: macmic) by drew.franken.de (Postfix) with ESMTPSA id 71EDC70F4B815; Sat, 12 Nov 2022 10:59:43 +0100 (CET)
Content-Type: multipart/signed; boundary="Apple-Mail=_C84C23A0-57E5-40E6-9B8A-1C2324998D2C"; protocol="application/pkcs7-signature"; micalg="sha-256"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3731.200.110.1.12\))
From: tuexen@fh-muenster.de
In-Reply-To: <9A82B521-1E83-4E08-87F1-EE23BEC58738@strayalpha.com>
Date: Sat, 12 Nov 2022 10:59:42 +0100
Cc: Jonathan Morton <chromatix99@gmail.com>, tcpm <tcpm@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <0883EEDD-A9B2-41E8-A6DD-7D67DB535589@fh-muenster.de>
References: <2B33D130-81A8-4CB5-8CA1-E0D932906DCA@fh-muenster.de> <FDF35F4C-E175-4385-9AC4-A7D862201E92@gmail.com> <9A82B521-1E83-4E08-87F1-EE23BEC58738@strayalpha.com>
To: touch@strayalpha.com
X-Mailer: Apple Mail (2.3731.200.110.1.12)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/Imr65RAZGIgp20WtUrLS-f8SE1Q>
Subject: Re: [tcpm] MSL 120sec still a good value?
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Nov 2022 09:59:54 -0000

> On 11. Nov 2022, at 18:03, touch@strayalpha.com wrote:
> 
> 
> 
>> On Nov 9, 2022, at 4:07 PM, Jonathan Morton <chromatix99@gmail.com> wrote:
>> 
>>> On 9 Nov, 2022, at 5:39 pm, tuexen@fh-muenster.de wrote:
>>> 
>>> quick question for TCP implementers:
>>> TCP end points stay in TIMEWAIT for 2 MSL and RFC 9293 says MSL is 120 sec.
>>> Is this still a good value anymore? Wouldn't it make sense to use the maximum
>>> round trip time observed on the connection or some multiple of it?
>>> Any information how implementations do it right now appreciated.
>> 
>> IIRC, the reason for TIMEWAIT is to guard against the possibility of packets caught in a routing loop and later released.
> 
> 
> See:
> Faber, T.; Touch, J.; Yue, W.
> The TIME-WAIT state in TCP and Its Effect on Busy Servers Inproceedings
> In: Infocom, pp. 1573-1583, IEEE, 1999
> 
> It’s more than just routing loops - it’s also things like reboots.
> 
>>  The period of 2x120 seconds is derived from the maximum value of the TTL field and the assumption that the "time" may be one second per TTL decrement.
> 
> Per RFC791 and RFC1812, IPv4 TTL is supposed to be decremented at least once a second, but also no less than once per forwarding operation. When time is being ignored, it counts routers (not links). I.e., a packet with a TTL of zero should successfully traverse a link (or switched LAN).
> 
>> However, TTL has rarely if ever been decremented more than once per hop when the delay exceeded 1 second at any given hop.  Additionally, TTL must be decremented by at least one per hop even when the delay is much less (by orders of magnitude) than one second at that hop.  This makes the term "time" in the name of the TTL field farcical.
> 
> It was accurate as intended when written; perhaps what is farcical is how some implementers have ignored it - because, as you note, this has implications elsewhere (TIME-WAIT, but also receiver reassembly).
> 
>> I think the question we should ask is: how robust are today's TCP implementations against packets released from a routing loop?  Is this risk therefore small enough that TIMEWAIT can be reduced to, say, some multiple of the (expected or measured) path RTT, or calculated in a similar way to RTO?
> 
> Servers already ignore TIME-WAIT for their own convenience - since the 1990s, as noted in the paper above. There are already other ways to address this, e.g., RFC6191. The only issue is that this RFC assumes clocks.
> 
> That said, why is this an issue that needs to be addressed further?
Hi Joe,

thanks you very much for the link above. The reason I was asking this is that
FreeBSD recently dropped the support of compressed TCBs for TIME_WAIT and just
uses normal TCBs for that. Then the discussion came up for how long these TCBs
actually should be kept alive. I thought it might be good to get some feedback
from TCPM on this...

Best regards
Michael
> 
> Joe
> 
> —
> Dr. Joe Touch, temporal epistemologist
> www.strayalpha.com
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm