Re: [tcpm] Comments to draft-ietf-tcpm-tcp-edo-13

rs.ietf@gmx.at Wed, 22 November 2023 09:11 UTC

Return-Path: <rs.ietf@gmx.at>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0D0BC14CE51 for <tcpm@ietfa.amsl.com>; Wed, 22 Nov 2023 01:11:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.303
X-Spam-Level:
X-Spam-Status: No, score=-1.303 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_SORBS_WEB=1.5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmx.at
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r_YmbRXBK-V2 for <tcpm@ietfa.amsl.com>; Wed, 22 Nov 2023 01:11:49 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CAE65C14CE29 for <tcpm@ietf.org>; Wed, 22 Nov 2023 01:11:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.at; s=s31663417; t=1700644306; x=1701249106; i=rs.ietf@gmx.at; bh=77EQiwe44hRLwRWDPwrpypsLzTK8jx3XGvNvGOVfl18=; h=X-UI-Sender-Class:Date:From:Reply-To:Subject:To:References: In-Reply-To; b=LAbBQgz7W/CyUNEdj1gKAn/YA/Ta3Xy3yfa4BLqHM9ZNIusfsLAlg40EQW5VOkCz vynnpbwYCVX21M8rb73WzQd/Ue7Zl70vo7DIRR3YRenLkHxzI6gTJnfDJ2aQ4rdKJ 18csPo4uU9pbBCH7kuuxMRql+jyh68+UhBXBni3tJinF3PQUMtoOQYC950IO18uzo GRl+g6fhe1hxICUFn0VHtcjkFagYgwOWsk/MvQQfzSVs/tkutidBFfV2GsWCRQBQU julakeNRKeD6q78pCwXmx/zQI546DqCM4ms1AP+GY4/WcoUFn1sUTupMDTvAhawYC zADhHr/47fRfvUR2NA==
X-UI-Sender-Class: 724b4f7f-cbec-4199-ad4e-598c01a50d3a
Received: from [172.20.10.13] ([46.125.249.61]) by mail.gmx.net (mrgmx104 [212.227.17.168]) with ESMTPSA (Nemesis) id 1N3KPq-1rWVV22VlK-010Hsb for <tcpm@ietf.org>; Wed, 22 Nov 2023 10:11:46 +0100
Message-ID: <4d093f24-0edf-4fd9-81e6-d042ce1be841@gmx.at>
Date: Wed, 22 Nov 2023 10:11:44 +0100
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
From: rs.ietf@gmx.at
Reply-To: rs.ietf@gmx.at
To: tcpm@ietf.org
References: <fc2d032a-eed3-536a-7131-f4c8ba697136@linux.alibaba.com>
In-Reply-To: <fc2d032a-eed3-536a-7131-f4c8ba697136@linux.alibaba.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: quoted-printable
X-Provags-ID: V03:K1:8Xk4IlI3N7JANMyDENa+ONGV8aBGOjY6fW6+oWzaU0aAktIfPjo jpl8/on9qnKH8fvt/pfWR34D0ZNw1cgS44H4SzTbz+lV34BmcG6UaISOmO9AJab2zZy0BBX jd85S+VCewBkgWpaAH60uj5GFlDVCyI8NWfnd+MC/B2T0ZfhWepLpUy9JFfyWHFNVXnmppJ pFKyDgzO/JcOmuNK9Z+fA==
UI-OutboundReport: notjunk:1;M01:P0:D1m9Lqh515o=;gCzIVdxsnFsThqqeRXs+LV4Tjbs qdAgzt5U4fqvwQWOP5LcXTmKUhw3ALmhSYFvTfOHh+HnUHwxMCRYqBAJTNaB5lJmD02MXcSc3 9GpJrxPP79aXTSj+mbJzwjiLJ13zrRdSw1H7XBWYCjo36KbzlHvd8ouQqHMlHqZFabAsEtK2w ZfqqQX0vJPXTFGbimNbEKdJRUZHEv8jpX80AszZ8OYLXVZqw28VO+2xGPeeO+uPhQ45vkhQyX Og4IzE0mtXzfIg8TATNGZrQW8G5Jm0RJ3f/pGqjFpdYysG8vRksakDsQcTH9xtSXWUCHQi3QG YbwfoMr84exiE86Ov5qAqYGRLcWYGDT8U5g/DeSXaTRZuGcXkgHcjBUCwwJLfHhSgb/CgT/ze lmWOscieJH8LURLLgCuqS0dEPTqoHzzNa/UnXDb8lQmfkdS/cFABAmLMl67M3f0MAukl7JvuT g6okqBjzk0X44HXch20V7N19gbwLYVxkzHtCSCxdu6qkVz5Hwwx3EZYAAfvgvhqz5CQqaS/l+ rV3cVF0Lf0vud7+25CNfsWxxAEYaZQMI54pOONhBHLgVDMtdZkhCim/tw8gYAZ9T5oOaGuXSW zDylz+rZRchl/tdcQi19JdzQ3nfFke6n4FvVklutIoIYG3z8wFzaixR7XSciGSr1sNeAvNmZm knebEM1MGEzye19NuQkMSxVJ4JRqs0tBSjVS+/364iw1c/60u4G9Ue4cE4YNx5mV3RuTX1mCK ZIyxGweYudx+53taX5+oV6iSO9HEh65jWDDlGOvERDmjj1EOHR/V+CLWa3+ptMnA7qlr69auz a0ne+V/VDbSh9/xsrIVbwxuPtJbDfxfMZakOPF9dbSvwE9srdtVcTeMSAbuVkj3xAZXhcP9wu KYWZN+O1cAnIk1tdX4JNcP7Z33dt6hiBUHJF6TIFLkLkEd0op5W2Sb844dFosnETZzTqdU0gv lnUaMEIF7L5VHmot5GDUF5jx3MI=
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/ZbECQUT_cpForUWeL8HSNMkIqT4>
Subject: Re: [tcpm] Comments to draft-ietf-tcpm-tcp-edo-13
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Nov 2023 09:11:53 -0000

Unfortunately, similar issues have been plagued the deployment of any
new features / functions on the two most well known IP protocols for
well over 30 years.

See the Mechanisms developted for IP ECN, TCP AccECN, TFO, ...

For the most part, this meddling is restricted to small parts /
fractions of sessions in the internet - but it is prudent to investigate
the impact of such pathological behavior on the deployment of new
protocols during their design phase.

Maybe you can share more details, which AS exposes this misbehavior, or
if this is observable more widely (eg from specific vantage points).

Investigating this is always a nice project.

Best regards,
   Richard



Am 22.11.2023 um 09:24 schrieb D. Wythe:
>
> Hi all,
>
> I am D. Wythe from Alibaba, currently conducting research on EDO. I
> would like to report an issue
> involving certain middleboxes that may have an impact on EDO.
>
> We have observed that some middleboxes incorrectly copy unknown TCP
> options from SYN packets into the SYN-ACK packets.
> We believe this behavior is entirely incorrect, although we are
> uncertain of the reasons behind it.
>
> Here is an example of a TCP SYN packet I constructed with an unknown SYN
> TCP option:
>
> local.32218 > remote.http: Flags [S], seq 4026107292, win 8192, options
> [unknown-100 0x01020304,nop,nop], length 0
> remote.http > local.32218: Flags [S.], seq 3220955308, ack 4026107293,
> win 8192, options [unknown-100 0x01020304,nop,nop], length 0
>
> Unfortunately, this is not an isolated incident. We have observed
> several publicly available services on the internet
> exhibiting the same incorrect behavior.
>
> We would like to know if anyone else has encountered similar issues and
> how you perceive the impact of EDO in this scenario
> (we believe it may result in the server interpreting the TCP options as
> application data).
>
> Additionally, is there any possibility of adding an explicit
> notification when one side detects a violation of the EDO protocol.
> This could potentially prevent all segments from being discarded by
> restricting the peer from further extending the TCP header.
>
>
> Best regards,
> D. Wythe
>
>
>
>
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm