Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notification for draft-gont-tcpm-tcp-seq-validation-03.txt)

Yoshifumi Nishida <nishida@sfc.wide.ad.jp> Tue, 06 March 2018 21:53 UTC

Return-Path: <nishida@sfc.wide.ad.jp>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0F29124B17 for <tcpm@ietfa.amsl.com>; Tue, 6 Mar 2018 13:53:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.65
X-Spam-Level:
X-Spam-Status: No, score=-1.65 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTML_OBFUSCATE_05_10=0.26, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 94fNIVepLvtC for <tcpm@ietfa.amsl.com>; Tue, 6 Mar 2018 13:53:19 -0800 (PST)
Received: from mail.sfc.wide.ad.jp (shonan.sfc.wide.ad.jp [203.178.142.130]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EBF771204DA for <tcpm@ietf.org>; Tue, 6 Mar 2018 13:53:18 -0800 (PST)
Received: from mail-wr0-f172.google.com (mail-wr0-f172.google.com [209.85.128.172]) by mail.sfc.wide.ad.jp (Postfix) with ESMTPSA id DBD90278721 for <tcpm@ietf.org>; Wed, 7 Mar 2018 06:53:16 +0900 (JST)
Received: by mail-wr0-f172.google.com with SMTP id l43so149306wrc.2 for <tcpm@ietf.org>; Tue, 06 Mar 2018 13:53:16 -0800 (PST)
X-Gm-Message-State: APf1xPBDyZdOUoLq5fAczHkaCO1w1sZk4l1lwQ75PtTut3jNJ2oq66GW FMeSpGkZtCgwAhaVyhtKgDYspHgX7qhQkA7VEGc=
X-Google-Smtp-Source: AG47ELtCdLMRFqJ1OgqsOK8UfVfyHTjQsvOjvK4nBpkn9sKl4ryuyaRkMRdSFCEuNvzm0W2iXsrSl1PVrlR8jP6LnnY=
X-Received: by 10.223.185.112 with SMTP id b45mr17119208wrg.159.1520373194962; Tue, 06 Mar 2018 13:53:14 -0800 (PST)
MIME-Version: 1.0
Received: by 10.223.129.200 with HTTP; Tue, 6 Mar 2018 13:53:14 -0800 (PST)
In-Reply-To: <E327115A-F8BC-4954-9635-76427199D295@netapp.com>
References: <152029339529.12825.5038413838558267392.idtracker@ietfa.amsl.com> <3edad22d-d6ed-31ea-cfc8-26b04b10de3e@si6networks.com> <E327115A-F8BC-4954-9635-76427199D295@netapp.com>
From: Yoshifumi Nishida <nishida@sfc.wide.ad.jp>
Date: Tue, 06 Mar 2018 13:53:14 -0800
X-Gmail-Original-Message-ID: <CAO249ycn-pv_TCpJEcpuV85RJ9eUqzzF7b6Hhx6S7s-CqwpKsQ@mail.gmail.com>
Message-ID: <CAO249ycn-pv_TCpJEcpuV85RJ9eUqzzF7b6Hhx6S7s-CqwpKsQ@mail.gmail.com>
To: "Eggert, Lars" <lars@netapp.com>
Cc: Fernando Gont <fgont@si6networks.com>, "tcpm@ietf.org" <tcpm@ietf.org>
Content-Type: multipart/alternative; boundary="f403045fa4c6363dba0566c578ef"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/Qdj7C_jvLt2ES1KaG4nbPZAHnc0>
Subject: Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notification for draft-gont-tcpm-tcp-seq-validation-03.txt)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Mar 2018 21:53:22 -0000

Hello,

On Tue, Mar 6, 2018 at 11:05 AM, Eggert, Lars <lars@netapp.com> wrote:

> Hi,
>
> isn't this something that could simply go into 793bis, after there is
> consensus that something needs to be fixed?
>

I think the observation of the bug can go into 793bis (which has been done
in the current version).
However, I think the solution for it needs to be reviewed and discussed.

It will be really great if some implementers speak up if the solution in
the draft looks good or they take different approach to address the issue.
--
Yoshi


>
> On 2018-3-6, at 19:38, Fernando Gont <fgont@si6networks.com> wrote:
> >
> > Folks,
> >
> > There is bug in the TCP Sequence Number validation algorithm from
> > RFC793. Most major implementations have addressed it, but the bug still
> > remains in our specs.
> >
> > We got a bit of extra energy to try to get this one fixed. Our I-D
> > (draft-gont-tcpm-tcp-seq-validation) is available at the usual
> repository.
> >
> > We have incorporated some minor edits done after the cut-off here:
> > <https://www.si6networks.com/publications/drafts/draft-gont-
> tcpm-tcp-seq-validation-04.txt>
> > -- but modulo minor grammar corrections, version -03 is the same.
> >
> > We'd like to receive feedback from the wg regarding the "problem
> > statement" (so to speak), and the proposed/described fixes.
> >
> > Thanks!
> >
> > Cheers,
> > Fernando
> >
> >
> >
> >
> > -------- Forwarded Message --------
> > Subject: New Version Notification for
> > draft-gont-tcpm-tcp-seq-validation-03.txt
> > Date: Mon, 05 Mar 2018 15:43:15 -0800
> > From: internet-drafts@ietf.org
> > To: Fernando Gont <fgont@si6networks.com>, David Borman
> > <david.borman@quantum.com>
> >
> >
> > A new version of I-D, draft-gont-tcpm-tcp-seq-validation-03.txt
> > has been successfully submitted by Fernando Gont and posted to the
> > IETF repository.
> >
> > Name:         draft-gont-tcpm-tcp-seq-validation
> > Revision:     03
> > Title:                On the Validation of TCP Sequence Numbers
> > Document date:        2018-03-05
> > Group:                Individual Submission
> > Pages:                16
> > URL:
> > https://www.ietf.org/internet-drafts/draft-gont-tcpm-tcp-seq
> -validation-03.txt
> > Status:
> > https://datatracker.ietf.org/doc/draft-gont-tcpm-tcp-seq-validation/
> > Htmlized:
> > https://tools.ietf.org/html/draft-gont-tcpm-tcp-seq-validation-03
> > Htmlized:
> > https://datatracker.ietf.org/doc/html/draft-gont-tcpm-tcp-se
> q-validation-03
> > Diff:
> > https://www.ietf.org/rfcdiff?url2=draft-gont-tcpm-tcp-seq-validation-03
> >
> > Abstract:
> >   When TCP receives packets that lie outside of the receive window, the
> >   corresponding packets are dropped and either an ACK, RST or no
> >   response is generated due to the out-of-window packet, with no
> >   further processing of the packet.  Most of the time, this works just
> >   fine and TCP remains stable, especially when a TCP connection has
> >   unidirectional data flow.  However, there are three scenarios in
> >   which packets that are outside of the receive window should still
> >   have their ACK field processed, or else a packet war will take place.
> >   The aforementioned issues have affected a number of popular TCP
> >   implementations, typically leading to connection failures, system
> >   crashes, or other undesirable behaviors.  This document describes the
> >   three scenarios in which the aforementioned issues might arise, and
> >   formally updates RFC 793 such that these potential problems are
> >   mitigated.
> >
> >
> >
> >
> > Please note that it may take a couple of minutes from the time of
> submission
> > until the htmlized version and diff are available at tools.ietf.org.
> >
> > The IETF Secretariat
> >
> >
> >
> > _______________________________________________
> > tcpm mailing list
> > tcpm@ietf.org
> > https://www.ietf.org/mailman/listinfo/tcpm
>
>
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm
>
>