[tcpm] Re: About having reset reason in TCP option

Jason Xing <kerneljasonxing@gmail.com> Thu, 28 November 2024 14:53 UTC

Return-Path: <kerneljasonxing@gmail.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 08D45C151096; Thu, 28 Nov 2024 06:53:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.105
X-Spam-Level:
X-Spam-Status: No, score=-2.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 69cz445jPTKH; Thu, 28 Nov 2024 06:53:52 -0800 (PST)
Received: from mail-io1-xd34.google.com (mail-io1-xd34.google.com [IPv6:2607:f8b0:4864:20::d34]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CEB6C14F6AB; Thu, 28 Nov 2024 06:53:52 -0800 (PST)
Received: by mail-io1-xd34.google.com with SMTP id ca18e2360f4ac-843e546c7f0so30184039f.1; Thu, 28 Nov 2024 06:53:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1732805631; x=1733410431; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=3A90uwVr+LLZVlUHle4Xt/2vr87l8Q5WWWuhWLBgaKg=; b=MBVkJuNSfRt8N3kK+QnyJp8Qc24Y6jZNJ3bxR5oVdhx3aijxJYuD4qwR6P4qbwJEQJ n0W02Vu00UPy/zJ39bjV5/ssXmT1DpgKXvC/HfkgNYxUk9I8NpU1pi6+lYp3D5MVriWZ kOIRTfnaewcXWEfufQhYwM/Tz+i7KarGG82xn0tPi891de+Byw5Kej/CElsYGQxC/PMp Z9pqeWztdf3dbxsLxuE8h7+ml2W7mGW5ruAto6IY99E/Usi1iKSUT69NvyzTnlroRihr Qh47qiYzFvdxixPOB9BYR3TDnq6zzbS9xAw/9p0CAfLE1Fc6E5Xp/6wTxkDmGtdjg1ub mYvA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1732805631; x=1733410431; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=3A90uwVr+LLZVlUHle4Xt/2vr87l8Q5WWWuhWLBgaKg=; b=V4ZJ9AvHycrJYRxnaIPgQrkKJIrs9gsS0wCaQKyfJaTfnINNBjpaizhim8BpnnZNZo adc4d/w1cnEjrO2qvDRTd9oN27KEqxDZOOYaEj3zJH5n1tPeRkARanOVklW9Afml0ZPs DwOoGsBHLpNCE3k5+Jub0esnZpwsc8qu5NRBXycr2BIq46OMSpB3GMnGLBdNhfR2jnoB Vfr51uJ154c+bHhGc8TCyvGIFjEFOzaJNbRDeUJ+Kcuc+vb0PMCyHPdEIeUf8Qm1FMye nt30jVz3+SFSh9ZG/AX/nuNA6qHfV3uZZPX5nvBeye5gASuEzN8j2tgTR1scEx+hAVMc +z4A==
X-Forwarded-Encrypted: i=1; AJvYcCUd1olXALyJxoDUrTh+ODsibxBMS+NSRm+M2CRfPyx7xykIuMdiJknp5DDDeqF3wxGtvWAg1uwGSNpWe0eh1GCCFTzU/1uCkrP88oroF4iLTprA6KH6rOuJqBq7@ietf.org
X-Gm-Message-State: AOJu0Yx1m/C9olDW4iY8jll6+HtyJSvCjMRpUFCsVIF2/JBpZhJTHEkP pvOW0KpIvi+ZP8IFeqvXXS6uan0CcfJTFDmvNrrKbXnBRKo9mykocW9efVTQhBjekZ2T5veFzFf 1tjDcL4ZqYUBpAoEhtnSdKUb991hGc67cHUM=
X-Gm-Gg: ASbGnculhFltJ6HLp6gyNmLqZXhxk6vtZX5OMJcBLZ7Z1iyeSrPZxzhoLX+gI2wtj7r 5X8NNVKGPGMJX/uhGwl5RbegZsovFF6I=
X-Google-Smtp-Source: AGHT+IEPr0aczC7GdmnBG/bKXsTsSnoGBUM1QCOy4ff405zph35Vvz1adTp1LwM2k4swIX+FvYcIit1cXqTtwJit7us=
X-Received: by 2002:a05:6602:6c01:b0:832:480d:6fe1 with SMTP id ca18e2360f4ac-843ecdae5a3mr915031439f.0.1732805631328; Thu, 28 Nov 2024 06:53:51 -0800 (PST)
MIME-Version: 1.0
References: <CAL+tcoDXjGiDje_za+ECCu2v3bCJL+MbDbdo_xFq2WzRTG-Ufw@mail.gmail.com> <DU2PR02MB1016069235790EDA6B9F5E30688292@DU2PR02MB10160.eurprd02.prod.outlook.com>
In-Reply-To: <DU2PR02MB1016069235790EDA6B9F5E30688292@DU2PR02MB10160.eurprd02.prod.outlook.com>
From: Jason Xing <kerneljasonxing@gmail.com>
Date: Thu, 28 Nov 2024 23:53:15 +0900
Message-ID: <CAL+tcoCM_cGxdA-uMV+Fmj0ATWdn2K4TW+D57wepMmj5RBBb3A@mail.gmail.com>
To: mohamed.boucadair@orange.com
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: MBUFG3IGBEQSAS3DHKMDKTLVVMUDAYEP
X-Message-ID-Hash: MBUFG3IGBEQSAS3DHKMDKTLVVMUDAYEP
X-MailFrom: kerneljasonxing@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tcpm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "tcpm@ietf.org" <tcpm@ietf.org>, Eric Dumazet <edumazet@google.com>, "draft-boucadair-tcpm-rst-diagnostic-payload@ietf.org" <draft-boucadair-tcpm-rst-diagnostic-payload@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [tcpm] Re: About having reset reason in TCP option
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/bEmEdfOerUI0qGon3_RpWkeJuJ8>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Owner: <mailto:tcpm-owner@ietf.org>
List-Post: <mailto:tcpm@ietf.org>
List-Subscribe: <mailto:tcpm-join@ietf.org>
List-Unsubscribe: <mailto:tcpm-leave@ietf.org>

Hello Mohamed,

On Thu, Nov 28, 2024 at 9:46 PM <mohamed.boucadair@orange.com> wrote:
>
> Hi Jason,
>
> FWIW, you may find a proposal in https://datatracker.ietf.org/doc/html/draft-boucadair-tcpm-rst-diagnostic-payload-08, which does not require any new option at all. It uses existing TCP provisions (see RFC9293, section 3.5.3).

Thanks for sharing this big information with me :)

>
> BTW, do you have in mind reasons other than those in draft-boucadair-tcpm-rst-diagnostic-payload-08#Section-5.2? Thanks.

After reading the whole draft,  I would like to know more details
about a few following cases:
1) for the value 1, what about the case where FIN_WAIT2 socket
receives the new data? Also please see RFC 9293 3.5.1. Half-Open
Connections and Other Anomalies. I quote one sentence here "Such
connections will automatically become reset if an attempt is made to
send data in either direction".

2) for the value 9, I wonder if you consider the case (where the
receiving side fails to fetch a correct socket when the skb is coming)
as "Destination Unreachable"?

3) which category is the abort call case labeled? Please see RFC 9293
3.10.5. ABORT Call.

4) what about the fin-wait-2 socket sending RST case? I quote here "If
the SYN is in the window it is an error: send a reset...". Please see
RFC 9293 3.10.7.4. Other States. For this one, well, it might need
more discussion because it regards the real implementation?

5) for the value 8, what case does it refer to? We cannot reply with
an RST when receiving an RST.
...

There are some other reasons labelled "[ThisDocument]" that I don't
follow, like Not Authorized and Malformed Message. What are the exact
meanings of them here, I'm curious?

It seems that I miss a lot from the beginning of this draft :(

BTW, if you need me to do anything about this, please let me know. I
have strong interests in this draft :)

Thanks,
Jason

>
> Cheers,
> Med
>
> > -----Message d'origine-----
> > De : Jason Xing <kerneljasonxing@gmail.com>
> > Envoyé : jeudi 28 novembre 2024 02:19
> > À : tcpm@ietf.org
> > Cc : Eric Dumazet <edumazet@google.com>
> > Objet : [tcpm] About having reset reason in TCP option
> >
> >
> > Hello experts/tcpm-ers :)
> >
> > I'd like to make a request to write the TCP reset reason feature
> > as a proposed standard RFC. It's my first time doing this, so if
> > there is something wrong or inappropriate, please let me know.
> > Thanks in advance.
> >
> > The outline of the full draft would be like this:
> > 1. explicitly define each possible reset reason with
> > corresponding and accurate meaning, say, TCP_LINGER_REASON, which
> > stands for the socket enables the linger option and then triggers
> > the reset process.
> > 2. negotiate first during a 3-way handshake, like the SACK
> > permitted field.
> > 3. If both sides enable this feature on, then let the sending
> > side that enters the reset process and puts the specific reset
> > reason into the TCP option in the RST packet. Then the other side
> > will parse the TCP option from the RST packet it receives and
> > then detect what is going on. Also, users who use tcpdump can get
> > benefits from this without guessing any more.
> > Default mode could be off.
> >
> > MPTCP has already implemented this part in the kernel (please see
> > MPTCP_RST_EUNSPEC), which follows the RFC 8684[1].
> >
> > I think the final format in TCP could be like [2].
> >
> > [1]:
> > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2
> > Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc8684%23name-mp_tcprst-
> > reason-
> > codes&data=05%7C02%7Cmohamed.boucadair%40orange.com%7Ca390029e9d2
> > d4975768008dd0f4ad509%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%
> > 7C638683536268372165%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRy
> > dWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyf
> > Q%3D%3D%7C0%7C%7C%7C&sdata=o0bZ1HdsPosTzS5TCx1KmxU6k55nzYD5KMfGFh
> > B2OGY%3D&reserved=0
> > [2]:
> > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2
> > Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc8684%23name-subflow-
> > reset&data=05%7C02%7Cmohamed.boucadair%40orange.com%7Ca390029e9d2
> > d4975768008dd0f4ad509%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%
> > 7C638683536268409404%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRy
> > dWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyf
> > Q%3D%3D%7C0%7C%7C%7C&sdata=6TXZou1JJAEVdqwQBRRd%2Bg33gbiUKWEdNhif
> > N5tEzLQ%3D&reserved=0
> >
> > I've privately discussed with Eric, Neal, Yuchung (which are the
> > TCP maintainers in Linux kernel) before this. Then I'd like to
> > hear more opinions from this mailing list. Any suggestions are
> > always welcome!!!
> >
> > Thanks,
> > Jason
> >
> > _______________________________________________
> > tcpm mailing list -- tcpm@ietf.org
> > To unsubscribe send an email to tcpm-leave@ietf.org
> ____________________________________________________________________________________________________________
> Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc
> pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler
> a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration,
> Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci.
>
> This message and its attachments may contain confidential or privileged information that may be protected by law;
> they should not be distributed, used or copied without authorisation.
> If you have received this email in error, please notify the sender and delete this message and its attachments.
> As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified.
> Thank you.
>