Re: [tcpm] IETF 114 TCPM WG - NG TCPM Yang Model

Gyan Mishra <hayabusagsm@gmail.com> Mon, 08 August 2022 21:14 UTC

Return-Path: <hayabusagsm@gmail.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BF62C157B37 for <tcpm@ietfa.amsl.com>; Mon, 8 Aug 2022 14:14:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YIdoXYh5aHoG for <tcpm@ietfa.amsl.com>; Mon, 8 Aug 2022 14:14:29 -0700 (PDT)
Received: from mail-pj1-x1030.google.com (mail-pj1-x1030.google.com [IPv6:2607:f8b0:4864:20::1030]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0AA49C14F738 for <tcpm@ietf.org>; Mon, 8 Aug 2022 14:14:29 -0700 (PDT)
Received: by mail-pj1-x1030.google.com with SMTP id o3-20020a17090a0a0300b001f7649cd317so2658287pjo.0 for <tcpm@ietf.org>; Mon, 08 Aug 2022 14:14:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc; bh=zNwvn7l/PXsJGnppOVa7/8zO+9TSGaWRNk1mu0ghc+A=; b=p9HkCQQCQ8fZsc2x/oIenvzgFcgnH5c+W2HIyWJ5ofcfvt0wqr4PXOhLuZnsspMz7f Sfc8Jni5df9us1DB4mBNObfBQl0IIHEIw587W5d3lc9pUDQo8n6zre8l8hLRB0Xoi28G UIfJ/rTkFXgYX4nfrISiKts9sOX91nQAXu6UhGHKBtNoKhSKedIAoxu+EmvB9r0WNQA6 AbOCKqG2xRPt2R21cW11Sks4p5zdQ9CJpgRJTS2g9HlQZUuf88zXtXQNUdCDcHGYaYGx n1oQIxxIXWbv+OuZGqG18R+6vJES5gV+KKtYV/Vff4A+358AlhqDi9CI7WMywbMEdCjK teKw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc; bh=zNwvn7l/PXsJGnppOVa7/8zO+9TSGaWRNk1mu0ghc+A=; b=ueF5kd2xHtgaQhFJOp55Qitmfd9LP7qzV4lhF/XAOLbf83CnGcoh4vjKIAnZmht7Da Q42aZk2TuFy3XEttQ+GbG7XWA99zgY76cfNcSegKUtxDx8hbApX9z8uekLv5vmyGfveG 1Z5mWoShMb553ds3dHFajo/0uladZV2xZY+3vXd6l1OqbWeFFGwrfT3QD3yYSzEBfjiG AyT7t++TUjNSbSEzJ8KSiBQBGrIu1SdAhLS6q8/MhCq/dz4blUecyLhWnyiN9O6bWvkn q9ycGlZbylOwWmvhTG/TMi039lflD6+wa2uo2cNpk/7jJyYFWe9DlEKbX4KI35IkLr9l 0yUQ==
X-Gm-Message-State: ACgBeo2Ywy+kxDa3OwLRW318Vnc+l5um6veZJP2W6Enmda+frB+sj813 Hpsu9KQNVTQ93Oea8yF/SZD0syzJDLrz692OfEfqvDEb
X-Google-Smtp-Source: AA6agR6XZzTbFYZr61oNOYircuXaZK8/C7TYu09n5cWfCV5pX1QyjhyqcbkZ8nRSsC96g6Zl+h0/yM+pzXwsXqr0R4E=
X-Received: by 2002:a17:90b:4f44:b0:1f5:1310:9e7f with SMTP id pj4-20020a17090b4f4400b001f513109e7fmr30992652pjb.235.1659993268410; Mon, 08 Aug 2022 14:14:28 -0700 (PDT)
MIME-Version: 1.0
References: <CAJhXr9-zcJg99ML3MSNMTvRFiT_BLzJihQucAdX8MZGDZ84dWw@mail.gmail.com> <CABNhwV1wz2Uhx+DWjabzVz8GAhQD78NFKhq2az=E7dhnxTC-Ww@mail.gmail.com> <A8851A57-748D-4504-97B6-677807EE0DB6@lurchi.franken.de> <EF72E595-0B1E-4AD9-BDFE-603B9B200F0D@strayalpha.com> <CABNhwV1OZawGXbH4d9RGx0KWKoiKLdZnNPq1gOcSfMQeie3q4Q@mail.gmail.com> <0D8E1E5A-5CD1-4302-8FE9-21EFF9847199@strayalpha.com> <CABNhwV363kikY+9Brvwn3pF=5Hh0VCQHyYqPxSNFzS3q-3H2Gw@mail.gmail.com> <8C844A10-F028-42B4-804D-78FA4A03B860@strayalpha.com>
In-Reply-To: <8C844A10-F028-42B4-804D-78FA4A03B860@strayalpha.com>
From: Gyan Mishra <hayabusagsm@gmail.com>
Date: Mon, 08 Aug 2022 17:14:17 -0400
Message-ID: <CABNhwV01iRaMQah4eBS7KDWz2_5qnWTPFOm-=RR-eih=9+knYA@mail.gmail.com>
To: "touch@strayalpha.com" <touch@strayalpha.com>
Cc: Jeffrey Haas <jhaas@pfrc.org>, Michael Tuexen <michael.tuexen@lurchi.franken.de>, Robert Raszuk <robert@raszuk.net>, Susan Hares <shares@ndzh.com>, "Van De Velde, Gunter (Nokia - BE/Antwerp)" <gunter.van_de_velde@nokia.com>, tcpm IETF list <tcpm@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000017def105e5c14d8d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/ampsWCD-ZN4X1jpx7MImOx_BR9A>
Subject: Re: [tcpm] IETF 114 TCPM WG - NG TCPM Yang Model
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Aug 2022 21:14:33 -0000

Hi Joe

Our main concern is how best to monitor the occurrence of TCP Zero window
on the BGP client so that we can take action and reset the peer.

So any and all TCP parameters that can help provide us better insight into
connection state is what we are after.

Also if there is anything proactive as far as tx and rx buffer and if the
buffer is depleting or system resource issues writing to the buffer that is
causing the window to collapse to be able to possibly proactively monitor
leading up to the zero window.

Thanks

Gyan

On Mon, Aug 8, 2022 at 11:16 AM touch@strayalpha.com <touch@strayalpha.com>
wrote:

> See below inline:
>
> On Aug 7, 2022, at 4:31 PM, Gyan Mishra <hayabusagsm@gmail.com> wrote:
>
>
> Replies below
>
> On Sat, Aug 6, 2022 at 11:25 AM touch@strayalpha.com <touch@strayalpha.com>
> wrote:
>
>> Replies below...
>> —
>> Dr. Joe Touch, temporal epistemologist
>> www.strayalpha.com
>>
>> On Jul 29, 2022, at 8:14 AM, Gyan Mishra <hayabusagsm@gmail.com> wrote:
>>
>> Hi Joe
>>
>> Responses in-line
>>
>> On Tue, Jul 26, 2022 at 10:13 PM touch@strayalpha.com <
>> touch@strayalpha.com> wrote:
>>
>>> Notes below.
>>>
>>> > On Jul 26, 2022, at 6:19 PM, Michael Tuexen <
>>> michael.tuexen@lurchi.franken.de> wrote:
>>> >
>>>
>> ...
>>
>> > • All TCP flags and respective states.
>>> > Do you mean the TCP flags SYN, FIN, PSH, ... Does a YANG module all to
>>> describe
>>> > packets sent and received?
>>>
>>> I can’t see how this can model the TCP flags; all it should be modeling
>>> is the states of the connection. The model is for TCP, not TCP packets.
>>
>>
>>     Gyan> Agreed that we want to model the TCP states not the packets.
>>
>>
>> Then you need to consider only the parameters passed via socket options
>> that control those flags, not the flags themselves.
>>
>
>     Gyan> Understood.  Yes so what we ar looking for is the state of the
> socket connection and and control flags for each state of the socket
> connection.
>
>
> Socket options are OS state, not TCP state.
>
> I don’t know if there is a common framework for them, though, esp. given
>> the IETF (incorrectly) abandoned the idea of the abstract user interface as
>> part of a protocol definition, at least for decades.
>>
>
>     Gyan> I don’t know either.  Would the common framework be based on the
>  TCP FSM and socket connection states and related flags?
>
>
> The TCP FSM is already part of the current TCP YANG model.
>
> Flags, again, are not endpoint states - they are packet contents.
>
> Socket connection states are tightly coupled to TCP FSM (though not
> identical), but these are OS-specific.
>
> ...
>>
>>
>    Gyan> Understood and agreed there is no CC specific to BGP
>
>>
>> So if this is all aimed at helping BGP figure out when TCP isn’t making
>> progress,
>>
>
> Gyan> Yes that is the goal
>
> it seems like an impossibly large task (too many CC algs).
>>
>
> Gyan> If we can hone in on the popular CC Alg used today by routers and
> computers would be a start.
>
>
> I think you may be missing the point. Rather than trying to figure out the
> common CC algs and parameterize them, why not explain what you really want
> to know about the connection?
>
> Again, IMO, if this is really about trying to instrument an endpoint so
> that all possible attacks can be detected, it’s a non-starter to me.
>
> Are there particular parameters you think would be beneficial for BGP to
>> know about TCP and can they be abstracted away from specific
>> implementations?
>>
>
> Gyan> The main parameters are the TCP socket connection state and related
> header flags, TCP Congestion control algorithms common ones used by routers
> and computers, and looking at the TCP parameters list, timestamps, CC,
> Quick start, User timeout, ECN.
>
>
> Again you mention header flags. Those are set by TCP based on connection
> state and user commands, but they are NOT properties of the connection
> itself. The rest of the list is just the set of everything om the endpoint
> that MIGHT be useful.
>
> https://www.iana.org/assignments/tcp-parameters/tcp-parameters.xhtml
>
>
> Those are code points used in TCP messages, not parameters to the TCP
> protocol.
>
> —
>
> I continue to see a disconnect here. There is a difference between TCP
> endpoints, TCP messages, and OS (i.e., socket) endpoints. TCP YANG models
> should reflect TCP endpoints; Netconf/YANG is not a packet inspection or
> packet debugging tool. And some of what you want to know refers to a
> socket, not TCP at all.
>
> Joe
>
> --

<http://www.verizon.com/>

*Gyan Mishra*

*Network Solutions A**rchitect *

*Email gyan.s.mishra@verizon.com <gyan.s.mishra@verizon.com>*



*M 301 502-1347*