[tcpm] Flaw in RFC793 (Fwd: New Version Notification for draft-gont-tcpm-tcp-seq-validation-03.txt)
Fernando Gont <fgont@si6networks.com> Tue, 06 March 2018 18:38 UTC
Return-Path: <fgont@si6networks.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDE4212D944 for <tcpm@ietfa.amsl.com>; Tue, 6 Mar 2018 10:38:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6-cSvaC6q4eS for <tcpm@ietfa.amsl.com>; Tue, 6 Mar 2018 10:38:26 -0800 (PST)
Received: from fgont.go6lab.si (fgont.go6lab.si [IPv6:2001:67c:27e4::14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0893F12DA23 for <tcpm@ietf.org>; Tue, 6 Mar 2018 10:38:25 -0800 (PST)
Received: from [192.168.3.68] (unknown [186.138.211.87]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 1D0F080EFC; Tue, 6 Mar 2018 19:38:22 +0100 (CET)
From: Fernando Gont <fgont@si6networks.com>
To: "tcpm@ietf.org" <tcpm@ietf.org>
References: <152029339529.12825.5038413838558267392.idtracker@ietfa.amsl.com>
Message-ID: <3edad22d-d6ed-31ea-cfc8-26b04b10de3e@si6networks.com>
Date: Tue, 06 Mar 2018 15:38:08 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0
MIME-Version: 1.0
In-Reply-To: <152029339529.12825.5038413838558267392.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/XDJ4oi3mFiTa_oBqwuno-UMrp2s>
Subject: [tcpm] Flaw in RFC793 (Fwd: New Version Notification for draft-gont-tcpm-tcp-seq-validation-03.txt)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Mar 2018 18:38:32 -0000
Folks, There is bug in the TCP Sequence Number validation algorithm from RFC793. Most major implementations have addressed it, but the bug still remains in our specs. We got a bit of extra energy to try to get this one fixed. Our I-D (draft-gont-tcpm-tcp-seq-validation) is available at the usual repository. We have incorporated some minor edits done after the cut-off here: <https://www.si6networks.com/publications/drafts/draft-gont-tcpm-tcp-seq-validation-04.txt> -- but modulo minor grammar corrections, version -03 is the same. We'd like to receive feedback from the wg regarding the "problem statement" (so to speak), and the proposed/described fixes. Thanks! Cheers, Fernando -------- Forwarded Message -------- Subject: New Version Notification for draft-gont-tcpm-tcp-seq-validation-03.txt Date: Mon, 05 Mar 2018 15:43:15 -0800 From: internet-drafts@ietf.org To: Fernando Gont <fgont@si6networks.com>, David Borman <david.borman@quantum.com> A new version of I-D, draft-gont-tcpm-tcp-seq-validation-03.txt has been successfully submitted by Fernando Gont and posted to the IETF repository. Name: draft-gont-tcpm-tcp-seq-validation Revision: 03 Title: On the Validation of TCP Sequence Numbers Document date: 2018-03-05 Group: Individual Submission Pages: 16 URL: https://www.ietf.org/internet-drafts/draft-gont-tcpm-tcp-seq-validation-03.txt Status: https://datatracker.ietf.org/doc/draft-gont-tcpm-tcp-seq-validation/ Htmlized: https://tools.ietf.org/html/draft-gont-tcpm-tcp-seq-validation-03 Htmlized: https://datatracker.ietf.org/doc/html/draft-gont-tcpm-tcp-seq-validation-03 Diff: https://www.ietf.org/rfcdiff?url2=draft-gont-tcpm-tcp-seq-validation-03 Abstract: When TCP receives packets that lie outside of the receive window, the corresponding packets are dropped and either an ACK, RST or no response is generated due to the out-of-window packet, with no further processing of the packet. Most of the time, this works just fine and TCP remains stable, especially when a TCP connection has unidirectional data flow. However, there are three scenarios in which packets that are outside of the receive window should still have their ACK field processed, or else a packet war will take place. The aforementioned issues have affected a number of popular TCP implementations, typically leading to connection failures, system crashes, or other undesirable behaviors. This document describes the three scenarios in which the aforementioned issues might arise, and formally updates RFC 793 such that these potential problems are mitigated. Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. The IETF Secretariat
- [tcpm] Flaw in RFC793 (Fwd: New Version Notificat… Fernando Gont
- Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notif… Eggert, Lars
- Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notif… Fernando Gont
- Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notif… Yoshifumi Nishida
- Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notif… Wesley Eddy
- Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notif… Fernando Gont
- Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notif… Scharf, Michael (Nokia - DE/Stuttgart)