Re: [tcpm] TCP Long Options - Why not as payload in SYNs?

"Caitlin Bestler" <Caitlin.Bestler@neterion.com> Mon, 14 July 2008 19:45 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5936B3A6BF4; Mon, 14 Jul 2008 12:45:41 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 339143A6B06 for <tcpm@core3.amsl.com>; Mon, 14 Jul 2008 12:45:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eKlJAEXvxaJH for <tcpm@core3.amsl.com>; Mon, 14 Jul 2008 12:45:01 -0700 (PDT)
Received: from owa.neterion.com (mx.neterion.com [72.1.205.142]) by core3.amsl.com (Postfix) with ESMTP id 2F4EF3A67A4 for <tcpm@ietf.org>; Mon, 14 Jul 2008 12:45:00 -0700 (PDT)
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Mon, 14 Jul 2008 15:45:27 -0400
Message-ID: <78C9135A3D2ECE4B8162EBDCE82CAD7703E66F37@nekter>
In-Reply-To: <20080714121424.GA31382@ikr.uni-stuttgart.de>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [tcpm] TCP Long Options - Why not as payload in SYNs?
Thread-Index: AcjlqzMv4BdTSCxPTgm4HBfpZCNwWgAPpYIg
References: <20080714121424.GA31382@ikr.uni-stuttgart.de>
From: Caitlin Bestler <Caitlin.Bestler@neterion.com>
To: Michael Scharf <michael.scharf@ikr.uni-stuttgart.de>, tcpm@ietf.org
Subject: Re: [tcpm] TCP Long Options - Why not as payload in SYNs?
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org


> -----Original Message-----
> From: tcpm-bounces@ietf.org [mailto:tcpm-bounces@ietf.org] On Behalf
Of
> Michael Scharf
> Sent: Monday, July 14, 2008 5:14 AM
> To: tcpm@ietf.org
> Subject: [tcpm] TCP Long Options - Why not as payload in SYNs?
> 
> Hi all,
> 
> I wonder whether "modern" TCP stacks indeed process application
> payload data in SYN segments.
> 
> Even though RFC 793 explicitly allows payload in SYN segments, there
> are TCP stacks that just seem to ignore it. Couldn't this offer an
> opportunity to transport long TCP options in the payload of SYN
> segments, instead of expanding the header option space?
> 
> Sorry if this question has already been answered elsewhere.
> 
> Michael

Any stack that uses SYN Cookies, or wants the option to, will reject
any SYN that has payload.

If a stack were to decide to accept SYNs with Payload as part of an
optional enhancement then it would need a new method of defending from
SYN floods. Generally, any stack that obligates itself to retain state
in its memory on the basis of a single received SYN is a sitting duck
for a Denial of Service attack.

_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm