[tcpm] [Errata Verified] RFC7413 (8013)

RFC Errata System <rfc-editor@rfc-editor.org> Fri, 16 August 2024 19:14 UTC

Return-Path: <wwwrun@rfcpa.rfc-editor.org>
X-Original-To: tcpm@ietf.org
Delivered-To: tcpm@ietfa.amsl.com
Received: from rfcpa.rfc-editor.org (unknown [167.172.21.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 50F52C1CAE7C; Fri, 16 Aug 2024 12:14:58 -0700 (PDT)
Received: by rfcpa.rfc-editor.org (Postfix, from userid 461) id B87873B874; Fri, 16 Aug 2024 12:14:57 -0700 (PDT)
To: bart@bedrijfzondernaam.nl, ycheng@google.com, hkchu@google.com, sivasankar@cs.ucsd.edu, arvind@google.com
From: RFC Errata System <rfc-editor@rfc-editor.org>
Content-Type: text/plain; charset="UTF-8"
Message-Id: <20240816191457.B87873B874@rfcpa.rfc-editor.org>
Date: Fri, 16 Aug 2024 12:14:57 -0700
X-MailFrom: wwwrun@rfcpa.rfc-editor.org
X-Mailman-Rule-Hits: max-recipients
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tcpm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-size; news-moderation; no-subject; digests; suspicious-header
Message-ID-Hash: 6L5UMVFRTMCBMKIWLTYV4B4L5GXUS25Y
X-Message-ID-Hash: 6L5UMVFRTMCBMKIWLTYV4B4L5GXUS25Y
X-Mailman-Approved-At: Sat, 17 Aug 2024 05:03:20 -0700
CC: rfc-ed@rfc-editor.org, iesg@ietf.org, tcpm@ietf.org, iana@iana.org, rfc-editor@rfc-editor.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [tcpm] [Errata Verified] RFC7413 (8013)
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/ZklS16JtNWrTGYGTVHb0qwj8Q2A>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Owner: <mailto:tcpm-owner@ietf.org>
List-Post: <mailto:tcpm@ietf.org>
List-Subscribe: <mailto:tcpm-join@ietf.org>
List-Unsubscribe: <mailto:tcpm-leave@ietf.org>

The following errata report has been verified for RFC7413,
"TCP Fast Open". 

--------------------------------------
You may review the report below and at:
https://www.rfc-editor.org/errata/eid8013

--------------------------------------
Status: Verified
Type: Editorial

Reported by: Bart Overkamp <bart@bedrijfzondernaam.nl>
Date Reported: 2024-07-02
Verified by: RFC Editor  

Section: 4.2

Original Text
-------------
   PendingFastOpenRequests: tracks the number of TFO connections in SYN-
      RCVD state.  If this variable goes over a preset system limit, the
      server MUST disable TFO for all new connection requests until
      PendingFastOpenRequests drops below the system limit.  This
      variable is used for defending some vulnerabilities discussed in
      the "Security Considerations" section (Section 5).

Corrected Text
--------------
   PendingFastOpenRequests: tracks the number of TFO connections in SYN-
      RCVD state.  If this variable goes over a preset system limit, the
      server MUST disable TFO for all new connection requests until
      PendingFastOpenRequests drops below the system limit.  This
      variable is used for defending against some vulnerabilities 
      discussed in the "Security Considerations" section (Section 5).

Notes
-----
The original text seems to suggest defending (the existence of) some vulnerabilities

--------------------------------------
RFC7413 (draft-ietf-tcpm-fastopen-10)
--------------------------------------
Title               : TCP Fast Open
Publication Date    : December 2014
Author(s)           : Y. Cheng, J. Chu, S. Radhakrishnan, A. Jain
Category            : EXPERIMENTAL
Source              : TCP Maintenance and Minor Extensions
Stream              : IETF