Re: [tcpm] I-D Action: draft-nishida-tcpm-agg-syn-ext-00.txt

"Scheffenegger, Richard" <rs.ietf@gmx.at> Mon, 08 February 2021 22:49 UTC

Return-Path: <rs.ietf@gmx.at>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FCC63A166E for <tcpm@ietfa.amsl.com>; Mon, 8 Feb 2021 14:49:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.4
X-Spam-Level:
X-Spam-Status: No, score=-0.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_SORBS_WEB=1.5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=gmx.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cmrQdrdUaHsj for <tcpm@ietfa.amsl.com>; Mon, 8 Feb 2021 14:49:18 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1C8603A0E89 for <tcpm@ietf.org>; Mon, 8 Feb 2021 14:49:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gmx.net; s=badeba3b8450; t=1612824553; bh=W3p04sFnm6V2gHQuoW9n4LGdfw2ZWEaziDzzD9qSqcA=; h=X-UI-Sender-Class:Subject:To:Cc:References:From:Date:In-Reply-To; b=a2Cje1/0/APo598R53ieV99hqevLh5g7Rlb3xaZej99ciQl/h9SFu8BckDVgOZh2w QFDWPux4YCZIEZiyniIZ75AZGTyLGJplC0/6XNr8N/j4rMIO75T5yIjF9Ed5v30syB U8c3qltLHwVfSYI8bP1ZeuhUyX6/LEHMQwsVm9/o=
X-UI-Sender-Class: 01bb95c1-4bf8-414a-932a-4f6e2808ef9c
Received: from [192.168.1.199] ([178.165.131.138]) by mail.gmx.net (mrgmx105 [212.227.17.168]) with ESMTPSA (Nemesis) id 1MZkpb-1lNpVv2lNv-00WnBf; Mon, 08 Feb 2021 23:49:12 +0100
To: Matthew Luckie <mjl@caida.org>
Cc: "tcpm@ietf.org Extensions" <tcpm@ietf.org>
References: <161233469809.31214.294457730576935197@ietfa.amsl.com> <CAAK044QYBiGXKm+D+=edc8TWhjzAadBxER5VRFmJOdW8hdXFKg@mail.gmail.com> <244FE3E7-7B83-4884-B11B-028F7167B549@strayalpha.com> <CAAK044RKtJ_PpDXH9pmS90wqUZNK9unDggiDjVLUBK00cxhYnA@mail.gmail.com> <8C6762C8-2A22-4CC7-AF53-1D13FC3DC268@strayalpha.com> <C591EED6-210A-4AEB-94D6-D3B77130596E@strayalpha.com> <CAAK044SxMF1p-BzyOYWYkhYYrToLg+8Ybx8ZB-GeADGkayexGQ@mail.gmail.com> <274785c8-004e-71bb-828b-8d8d0ee95af8@gmx.at> <YCG4EQ9BCAvucdN1@sorcerer.cms.waikato.ac.nz>
From: "Scheffenegger, Richard" <rs.ietf@gmx.at>
Message-ID: <fd9ba17d-37d3-e0d4-16be-e8fb69eb60ba@gmx.at>
Date: Mon, 08 Feb 2021 23:49:10 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.5.0
MIME-Version: 1.0
In-Reply-To: <YCG4EQ9BCAvucdN1@sorcerer.cms.waikato.ac.nz>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: quoted-printable
X-Provags-ID: V03:K1:b9XDBH57FniKBPYA8upJYubwjMebuvtQsjSLjhqoM5Umv4bzQT9 bL1tgKMhhP5CCp6WL6d8T2h+lYLKNSYoC0ACqw45UrO4E0lE0g1aocGaI9ZXy/0HdypYueA ZqKjmb9Dna8/ped5oiZHcwCsT7sgJVgMWKjSrzj0HUVSbZcj9J9CPEgPh6iLYYs74S0coev bNUFGq3ym0/lDy2TLco/g==
X-UI-Out-Filterresults: notjunk:1;V03:K0:4B5sCh3K8sI=:bxfqnpR4F7aZpYvQF7HMEZ 4cODflxGT9L0hZ9T0eXB5/l/PNTsr7s4foMUrjrCCOgsuFW/cM6Z1eDah4kWBQbjzA4sTZ/jd phKwjqUbk2OWNZNBvsYsxm55hv1qu0USfn5ZEqK1vPzKflmq5HwkT6xjvnwecfah0e0xPw/+x zuHW3ccT5ptHMM5jDKxk9W7LVT9UEB9p4JFllH+RSYpZn7OI5+7Hjkq1C+tlKNBteinVoc6jf iBZh1aXrCzlzwVIDA1nr9PP7EM13uJQ+RDxyukY4Ue3iRv8zuRtsjZe9xUmGrKhkBd4gsp3Sq +v14NuH7m/ukmizNzqr/Cpv80JXBQDQBub/J8i2wlnnenXgctwxMbi8EgoCVTFPWfQkgeb6K+ enKa9T4aU8TaK+Z7bk8csqkDtsOTqVSkxL+HxQGo9vrVmH+FFKb3Nrz1vtVOQMKeuXSZvBqBy wt31j4bRqR97/hGn73WJvbtBJLXbb++kCu9gQOvOKAaizmxX8gD/mEB2qkIlm95/5fVZyuSRo VgICGpKt+6yemS/ME2tY2xngT2pgIepB+KXYZ6TIuGHjIfu14OnCgLwwMRHZD4xqa70O91tlu wcz70rFrWdOrIAXC98LbXUtrw0z9TB2mxdiPvhpg+S2/vHp0vwCHgOM9X2bLO5VCZeSDvAXxI 2wiV1lLIaRo54NZx4ewLeNTFbMUwIia645UsLPMsKQqjew6pd0hHvoeo0hiviaeNFRMCEwSgc GE7Vq3p1rbBqPhwKQMyPhQZUAx1Ww/908LswnklgsI/S7/JOVIhBfgojtZl6wg0c3twIVwV9R toLWU/s2j2Y0P2ewkeXaRcWLj+4L3uu0wwy/oZPIGbYHr2LKPt/f8G7xcFEtHoIfqX3pF9jfR zvMMdiMtXc014tZ2zShA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/et1jcTzUdIf0oNmJ1vLlmYMXknw>
Subject: Re: [tcpm] I-D Action: draft-nishida-tcpm-agg-syn-ext-00.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Feb 2021 22:49:20 -0000

Thanks!

Still, without additional constraints my simplistic reading of how the
GID value mapping to groups doesn't seem to address such collisions
entirely..

Also, some options are not necessarily negotiated, but only indicated -
thus a constraint that corresponding bits of the group may only be set
in a <SYN,ACK>, when they where present in the <SYN> is not sufficient.

One constraint I could come up with would be to require  the server to
reflect back "empty" (all zero option flags) blocks received from the
client, in case a bitstream collision would otherwise happen


e.g. client wants to signal option flag 7 of group 2, while server wants
to send back option flag 7 of group 1 (but not flag 7 of group 2), the
current draft would allow a "valid" exchange that looks like a reflection.

With the above, additional constraint, the server would have to return
an all-zero block for group 2 also, and may NOT skip over that...

Best regards,
    Richard




Am 08.02.2021 um 23:15 schrieb Matthew Luckie:
> Hi Richard,
>
> On Mon, Feb 08, 2021 at 10:46:45PM +0100, Scheffenegger, Richard wrote:
>> Hi Yoshi,
>>
>> Sorry to nitpick - in your draft, you mention that some hosts reflect
>> back unknown tcp options, which is why you are using different GID
>> mappings between SYN and SYN,ACK.
>>
>> I did read about this behavior concerning TCP header flags / reserved
>> bits - but have not come across a paper where this behavior is described
>> for unknown TCP options (or I may have missed that aspect in the various
>> studies around TCP option investigations done by MPTCP and other groups).
>
> There is some discussion of systems that seem to reflect TCP options here:
>
> http://blog.multipath-tcp.org/blog/html/2018/12/19/which_servers_use_multipath_tcp.html
>
> Matthew
>