Re: [tcpm] ECN++ control packet handling

"Scheffenegger, Richard" <rs.ietf@gmx.at> Tue, 09 February 2021 19:30 UTC

Return-Path: <rs.ietf@gmx.at>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFD9B3A1196; Tue, 9 Feb 2021 11:30:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CV_w52M24JAb; Tue, 9 Feb 2021 11:30:32 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A27AC3A1193; Tue, 9 Feb 2021 11:30:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1612898982; bh=dSBTs4xEv6MutSuRhxv1iPHhxY6wvGOH/j70dez9i+E=; h=X-UI-Sender-Class:Subject:To:Cc:References:From:Date:In-Reply-To; b=jUmMhAsEo2J79vOrRkLq0kMFVBHnCPSWSEEwSte3OgHfLp5sCQPD/UCzyzfjkMy5t LKr5DwpTeOwPDOwWjmW3A2dbRRgjLwSgFIgehIqf6AjHZYvuK9FxKfUGwBHbpDJJ+O 8oC8us+nwShncXanN67Yi1ZAjJVATyh3arhzTKFk=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from [192.168.1.199] ([178.165.129.138]) by mail.gmx.net (mrgmx004 [212.227.17.190]) with ESMTPSA (Nemesis) id 1MLi8g-1lR5aY2HGi-00HbeD; Tue, 09 Feb 2021 20:29:42 +0100
To: Bob Briscoe <ietf@bobbriscoe.net>
Cc: "tcpm@ietf.org" <tcpm@ietf.org>, draft-ietf-tcpm-generalized-ecn@ietf.org
References: <d5754c0e-f45b-9cf0-1a68-e90eee0740c7@gmx.at> <391747b3-b513-1063-ba6a-5011d5ef0b0c@bobbriscoe.net>
From: "Scheffenegger, Richard" <rs.ietf@gmx.at>
Message-ID: <9e2d2db1-d93f-1ffb-770c-4c23d7388b50@gmx.at>
Date: Tue, 09 Feb 2021 20:29:39 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.7.0
MIME-Version: 1.0
In-Reply-To: <391747b3-b513-1063-ba6a-5011d5ef0b0c@bobbriscoe.net>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: quoted-printable
X-Provags-ID: V03:K1:67Z/OCIBIdHOBxgesJelwZ8eqWuEIaH/dJque49u6rPF39fAAOG 3x53Xqti1WfBv9T3JN6UotxEdyvfxZCdIKZIhaoQNITqKzHH0bXKD5Uije9Yqh25rYM4djb eNSrji+KfsjRxOHYZqz+prdtWYpdSwEQwJmrAtFUSUfJ780D/EQmpKtMONjx/SWMRmiHoYZ EJQ65KXY3JEORBJAPr/Lg==
X-UI-Out-Filterresults: notjunk:1;V03:K0:4aMPd3gCFho=:qdCyM4jeCPVQERPU2ROq1a uQBuw7YkMAy4p0APGP3oWzlt24Mn89r8kWqWSLAygfEmi/XR/Psjn5RsGVQ0A2HB1U1a8PU7x IAU7Nxl9ZcoQDxJrCrLsbmRFmpUM+AW1pLBkc7X6NXroIifLPHWYpDYGjsFN7bHiKoemZ0+1I gwe/Hh/P//aq/fuFj04Omli/2O24kY+9ym9tVPBj/AuX9AlTdVWse7FnrkxUk7F+XtIMkU5S6 L2Gl0vwc1mU9hxOcqUz604Kxxa4npDZ/1qQcS6pRaB9nH5CbK0oH86fVhamDQBNc87POZUrmJ mOWIQQQBIcEIWOtwLgpiYPGApAvvnSSGS4NmtJzmtnNElL7cnom6PDqDNcv9QJCN+JeIfPbeq 0Gzg193wQzv7ExysAh5VOImP9+5g8COwYhUoKV2GHNcirLHbM0DZ2tKdPksEn+mmTVL22iYNs vlEYchjm/aH7PMSlfIQ7ACh1mmhY8NLp38ofIr+11f484csvrqrrmegMkdNob8A+liJt6FNz5 rPuj7VlUg+2csbsZS31R8A1CdLBHXYwm+WJ0gNXu4Jx++qb799DyDEP0FMjOz+20OAmV8kIQy NyVJ0Xtej5IxfLM93ywQ1ibuP2xKCIHRL1tuHI+9teNlJHuTSBu4vfR9diNIwqUI7t+a7dwxI 13c5q8ZiOj6sijqXuhRP9pqA/jhbl3Im0jc+7jcPr5V1nooXlL1q/FWnTqTz6fYtzazrzKCD+ fKUPX6seCSpLHre+yUptPpyu+bTsU556b4R2SzHQy12HRZMvQOTJ0LeFzm9HmVL0OnHZj3brd S8n5IQRuMaRy7gytNMucIZwLL8yYqsZHW5qSGq2IeIHgqNWqMXIMKXVXvGI2KpSi75m/ds/9F hCwx2xonfHdqGwlVKeTQ==
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/JPzfOaoCoXgQCL2hNLW7WqXKrWU>
Subject: Re: [tcpm] ECN++ control packet handling
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Feb 2021 19:30:34 -0000

Sounds good to me!

Thanks for the quick turnaround!

Best regards,
    Richard

Am 09.02.2021 um 16:48 schrieb Bob Briscoe:
> Richard,
>
> Good point. Thanks for noticing this potential implementation pit-fall.
>
> In my local copy of the ECN++ draft I have added the following to the
> end of "3.2.6 RST (Send)":
>
> + Implementers SHOULD ensure that RST packets (and control packets
>
> + generally) are always sent out with the same ECN field regardless of
>
> + the TCP state machine. Otherwise the ECN field could reveal internal
>
> + TCP state. For instance, the ECN field on a RST ought not to reveal
>
> + any distinction between a non-listening port, a recently in-use
>
> + port, and a closed session port.
>
> And I've added this to the end of Security Considerations:
>
> + Section 3.2.6 on sending TCP RSTs points out
>
> + that implementers need to take care to ensure that the ECN field on a
>
> + RST does not depend on TCP's state machine. Otherwise the internal
>
> + information revealed could be of use to potential attackers. This point
>
> + applies more generally to all control packets, not just RSTs.
>
> Do you think that's correct / sufficient?
>
> Cheers
>
> Bob
>
> On 08/02/2021 21:03, Scheffenegger, Richard wrote:
>> Hi Bob, Marcelo,
>>
>> While working on the ecn++ code for fbsd patch, I found that the
>> codepath for dealing with out-of-window, past-established and
>> non-listening ports is actually quite different there.
>>
>> Casually glancing over the draft for ecn++, I didn’t find a reference
>> specifically about the handling of RST (non-listening port, vs. closing
>> session etc).
>>
>> This may need a hint in the security section, that an implementation
>> should ensure, that control packets are always sent out with similar
>> headers, regardless of the TCP state machine. Otherwise, you could
>> potentially leak information (eg. Recently in-use ports) which may be a
>> clue to malicious players…
>>
>>
>> Richard Scheffenegger
>>
>> _______________________________________________
>> tcpm mailing list
>> tcpm@ietf.org
>> https://www.ietf.org/mailman/listinfo/tcpm
>
> --
> ________________________________________________________________
> Bob Briscoehttp://bobbriscoe.net/
>