Re: [tcpm] ICMPv6 Error Handling at TCP draft-fujisaki-tcpm-icmpv6-reaction-00.txt

Fernando Gont <fernando@gont.com.ar> Wed, 21 March 2007 19:25 UTC

Return-path: <tcpm-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1HU6RL-00058V-Sh; Wed, 21 Mar 2007 15:25:43 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1HU6RK-0004u4-MP for tcpm@ietf.org; Wed, 21 Mar 2007 15:25:42 -0400
Received: from smtp1.xmundo.net ([201.216.232.80]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1HU6Ql-00064g-NE for tcpm@ietf.org; Wed, 21 Mar 2007 15:25:12 -0400
Received: from venus.xmundo.net (venus.xmundo.net [201.216.232.56]) by smtp1.xmundo.net (Postfix) with ESMTP id 5D716F0C5B9; Wed, 21 Mar 2007 16:14:50 -0300 (ART)
Received: from fgont.gont.com.ar (113-165-231-201.fibertel.com.ar [201.231.165.113]) (authenticated bits=0) by venus.xmundo.net (8.13.8/8.13.8) with ESMTP id l2LJEkxN000499; Wed, 21 Mar 2007 16:14:47 -0300
Message-Id: <200703211914.l2LJEkxN000499@venus.xmundo.net>
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Wed, 21 Mar 2007 16:12:17 -0300
To: fujisaki@syce.net
From: Fernando Gont <fernando@gont.com.ar>
Subject: Re: [tcpm] ICMPv6 Error Handling at TCP draft-fujisaki-tcpm-icmpv6-reaction-00.txt
In-Reply-To: <20070322.034143.783370888.fujisaki@syce.net>
References: <200703201831.l2KIVkl8012269@venus.xmundo.net> <4600FB7E.7030700@nttv6.net> <200703211749.l2LHnmls014912@venus.xmundo.net> <20070322.034143.783370888.fujisaki@syce.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format="flowed"
X-Greylist: Sender succeeded SMTP AUTH authentication, not delayed by milter-greylist-2.0.2 (venus.xmundo.net [201.216.232.56]); Wed, 21 Mar 2007 16:14:50 -0300 (ART)
X-Spam-Score: 0.1 (/)
X-Scan-Signature: a7d6aff76b15f3f56fcb94490e1052e4
Cc: tcpm@ietf.org
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Errors-To: tcpm-bounces@ietf.org

At 03:41 p.m. 21/03/2007, Tomohiro -INSTALLER- wrote:

>  | The ICMP attacks draft is aiming at Informational, too. Yet virtually
>  | all vendors have implemented most of it. Nobody ever bothered whether
>  | it was Std track or Informational.
>
>Is it in reverse order, isn't it?  Many vendors implement not to
>disconnect established TCP session because it would have security
>risks. And then ICMP attacks draft was written, as far as I read ML
>archives.

BSD systems do not abort established connection in response to ICMP 
messages because the developers thought that that would negatively 
affect robustness. Those implementations that implemented this 
behavior in the last three years or so did that in response to the 
ICMP attacks draft.



>  | If your specific problem arises from use of IPv6, then you can send
>  | the vendor (Microsoft?) the soft errors draft, and even direct them
>  | to the v6fix site. If that's not enough, I guess the only thing left
>  | is to have their clients tell them that it really sucks to have to
>  | wait dozens of seconds to browse a web page.
>
>Sorry for repeatedly, but we think soft errors draft does not provide
>enough information to implement the TCP reaction. We are afraid every
>system react differently when it receives ICMP errors.

Perfect. Do you have any specific suggestion on how to improve the 
draft, so it addresses your concerns?

Kindest regards,

-- 
Fernando Gont
e-mail: fernando@gont.com.ar || fgont@acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1





_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www1.ietf.org/mailman/listinfo/tcpm