Re: [tcpm] Some comments on tcpsecure

Fernando Gont <fernando@gont.com.ar> Tue, 08 April 2008 19:12 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: tcpm-archive@megatron.ietf.org
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C082E28C159; Tue, 8 Apr 2008 12:12:34 -0700 (PDT)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 9D6CC3A6B17 for <tcpm@core3.amsl.com>; Tue, 8 Apr 2008 12:12:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.47
X-Spam-Level:
X-Spam-Status: No, score=-0.47 tagged_above=-999 required=5 tests=[AWL=-0.322, BAYES_00=-2.599, RCVD_IN_NJABL_PROXY=1.643, SARE_RECV_SPEEDY_AR=0.808]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dzYu1NiP6r2S for <tcpm@core3.amsl.com>; Tue, 8 Apr 2008 12:12:28 -0700 (PDT)
Received: from smtp1.xmundo.net (smtp1.xmundo.net [201.216.232.80]) by core3.amsl.com (Postfix) with ESMTP id 05BF93A6820 for <tcpm@ietf.org>; Tue, 8 Apr 2008 12:12:25 -0700 (PDT)
Received: from venus.xmundo.net (venus.xmundo.net [201.216.232.56]) by smtp1.xmundo.net (Postfix) with ESMTP id F1CF95A8DC3; Tue, 8 Apr 2008 16:12:41 -0300 (ART)
Received: from notebook.gont.com.ar (201-254-61-175.speedy.com.ar [201.254.61.175] (may be forged)) (authenticated bits=0) by venus.xmundo.net (8.13.8/8.13.8) with ESMTP id m38JCQAM008441; Tue, 8 Apr 2008 16:12:27 -0300
Message-Id: <200804081912.m38JCQAM008441@venus.xmundo.net>
X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9
Date: Tue, 08 Apr 2008 16:03:56 -0300
To: Joe Touch <touch@ISI.EDU>
From: Fernando Gont <fernando@gont.com.ar>
In-Reply-To: <47FA4057.7050206@isi.edu>
References: <200804041832.m34IWTC5025090@venus.xmundo.net> <47F68794.6050100@isi.edu> <200804042012.m34KCk8U022643@venus.xmundo.net> <47F68DC7.2050303@isi.edu> <200804050557.m355vAjU013266@venus.xmundo.net> <47F7B43E.6010004@isi.edu> <200804052024.m35KOlmj018418@venus.xmundo.net> <47F7E2D0.8010802@isi.edu> <200804052353.m35NrdO1031661@venus.xmundo.net> <47F82129.2000603@isi.edu> <200804061042.m36AgYGx028003@venus.xmundo.net> <47F92D13.4020809@isi.edu> <200804062241.m36MfGKx010325@venus.xmundo.net> <47F9AB92.80405@isi.edu> <200804071517.m37FHcq4022232@venus.xmundo.net> <47FA4057.7050206@isi.edu>
Mime-Version: 1.0
X-Greylist: Sender succeeded SMTP AUTH authentication, not delayed by milter-greylist-3.0 (venus.xmundo.net [201.216.232.56]); Tue, 08 Apr 2008 16:12:38 -0300 (ART)
Cc: tcpm@ietf.org
Subject: Re: [tcpm] Some comments on tcpsecure
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

At 12:40 p.m. 07/04/2008, Joe Touch wrote:

>>>In those cases, I still see the contents of the ICMP to be moot 
>>>(w.r.t. window). That info is useful only if:
>>>         - ICMPs are known to be returned in a timely fashion
>>>         (and there's no way of knowing)
>>If anything, isn't this the case for any type of packet? After all, 
>>any packet can get queued in a router or be delayed whilie 
>>transiting a link....
>
>Routers are supposed to forward packets in a timely fashion, but are 
>encouraged to delay control plane event processing when loaded - 
>both are in RFC 1812.
>
>I.e., for forwarding this is required, but for ICMP the contrary us 
>allowed and encouraged if needed.

I'd bet that it is more likely that packets get delayed longer for 
congestion probems or while transiting a link (e.g., a satellite 
link) than for that of delaying control plane event processing when loaded.



>>>Since neither is the case, this is a moot issue. I do not agree 
>>>that checking the TCP SEQ in the content of an ICMP is ever appropriate.
>>Well, I do know that you don't like the idea, but the systems I 
>>know of will not consider a packet legitimate unless there's enough 
>>reason for that. For ICMPs, the bar for that is the SEQ contained 
>>in the payload. That's what everybody has been doing for quite some time.
>
>Again, known implementation bugs aren't the issue - and since seq 
>checking isn't required, dropping packets due to that check 
>qualifies IMO as an implementation bug.

Well, I guess we have to agree to disagree. :-)



>But this is still somewhat off topic if there's a way to get 95% of 
>the way there without doing a seq check, which is what I'm 
>suggesting. That would correct the *intent* of the current code 
>without *needing to change the current specs* (which is the only way 
>to *require* timely ICMPs).

ICMP code has been for a long time (>20+ years, in some cases) to do 
"hard errors -> soft errors". The TCP SEQ check was originally 
implemented in Linux as a general validation check. Then applied in 
virtually all stacks for the same reason.
The TCP SEQ check is particularly useful as a mitigation against 
PMTUD attacks... and some have seen as something quicker/easier to 
implement than the mechanism proposed in my draft (although FWIW, I 
implemented the mechanism myself for OpenBSD, and it wasn't what pne 
would call "complex" at all...)



>>>>However, if TCP waits for USER_TIMEOUT to check whether the 
>>>>connection is making forward progress, then this is basically the 
>>>>"hard errors should be considered to indicate soft errors when 
>>>>received for connections in any of the synchronized states" 
>>>>behavior, and thus an attacker could not exploit the so-called 
>>>>ICMP hard errors to perform reset attacks.
>>>
>>>Waiting that long defeats the purpose of the errors - to terminate 
>>>connections more rapidly than TCP would otherwise. That is, IMO, too far.
>>
>>Well, that's just a matter of policy. In any case, Clark's RFC on 
>>"Fault Isolation and Recovery" and even "The Design of the 
>>DARPA..." seem to support this idea: data transfers should work 
>>when there is at least a working path to do the transfer.
>>As I have seen you have mentioned a number of times, TCP is not 
>>supposed to be optimized for any scenario (e.g., multi-path 
>>scenarios). So if there's a working path, I think that for 
>>robustness sake the connection should not be aborted.
>
>Robustness also allows signalled connection faults to recover 
>quickly, rather than on the same timescale as a 'no message' 
>timeout. Yes, though, the devil is in the detail of what that timeout would be.

You say it allows a connection to recover quickly, but... why would 
it actually recover, if you are not affecting the path that packets follow?



>>In any case, I don't think we'd even have to stick to any 
>>particular timeout. Particularly, given that we can accommodate 
>>existing implementations (hard errors -> soft errors) as a 
>>degenerate case of the above.
>
>That's assuming the worst timeout, IMO, which is a particular 
>timeout value I disagree with.

That's how the Internet has worked during the last 20+ years. 
BSD-derived and Mentat-derived implementations have always done this.



>>>>(i.e., the "hard errors should be considered to indicate soft 
>>>>errors when received for connections in any of the synchronized 
>>>>states" becomes a degenerate case of the "checking for progress 
>>>>on the TCP connection" when TCP waits for USER_TIMEOUT seconds 
>>>>before concluding whether the connection is making progress or not).
>>>>(FWIW, the TCP SEQ is of a little bit more of help for PMTUD, as 
>>>>during what I called 'Initial Path-MTU Discovery', you probably 
>>>>don't want to wait, so that you get a good convergence time for the PMTUD).
>>>
>>>I'd have to think further to see if this appropriate - i.e., if 
>>>done only once during a connection, before a wrap, then the SEQ 
>>>might be appropriate to check, but only within that period.
>>Most of all, the check is needed once at the beginning of the connection.
>>Then, it might be nice to do it after the 10-minute PMTUD timeout 
>>when you want to discover the PMTU again. Although at that point 
>>(t>10 minutes) it wouldn't be much of a problem to just check for 
>>progress on the connection (what's most important is to avoid 
>>delays at he beginning of the connection, as that would hurt 
>>interactive applications)
>
>The first one can easily have a seq num check, since the connection 
>isn't open long enough for a legitimate delay. However, the 
>subesquent ones don't seem to have that luxury, IMO.

Well, that wouldn't be a big deal. After all, the delay I'm more 
concerned about would be the one when the connection has just been 
established (as it would affect interactive applications). Although 
one might argue that with http persistent-connections, connections 
could be affected by the delay made after the 10-minute PMTUD-timeout.....

Kind regards,

--
Fernando Gont
e-mail: fernando@gont.com.ar || fgont@acm.org
PGP Fingerprint: 7809 84F5 322E 45C7 F1C9 3945 96EE A9EF D076 FFF1




_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www.ietf.org/mailman/listinfo/tcpm