[tcpm] Re: [Technical Errata Reported] RFC7413 (8014)

Michael Tuexen <michael.tuexen@lurchi.franken.de> Tue, 20 August 2024 17:37 UTC

Return-Path: <michael.tuexen@lurchi.franken.de>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E3D36C14F6EC; Tue, 20 Aug 2024 10:37:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.497
X-Spam-Level:
X-Spam-Status: No, score=-1.497 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, KHOP_HELO_FCRDNS=0.399, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id edWzUQkCJ9Uq; Tue, 20 Aug 2024 10:37:21 -0700 (PDT)
Received: from drew.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A799CC14F5EB; Tue, 20 Aug 2024 10:37:20 -0700 (PDT)
Received: from smtpclient.apple (unknown [IPv6:2a02:8109:1140:c3d:c1d6:55af:2ce0:e5b8]) (Authenticated sender: lurchi) by mail-n.franken.de (Postfix) with ESMTPSA id 4E0B2721E2806; Tue, 20 Aug 2024 19:37:17 +0200 (CEST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3776.700.51\))
From: Michael Tuexen <michael.tuexen@lurchi.franken.de>
In-Reply-To: <20240702101045.614757FA60@rfcpa.rfc-editor.org>
Date: Tue, 20 Aug 2024 19:37:16 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <8800B581-F46C-40F9-86A8-F28D386D4266@lurchi.franken.de>
References: <20240702101045.614757FA60@rfcpa.rfc-editor.org>
To: RFC Errata System <rfc-editor@rfc-editor.org>
X-Mailer: Apple Mail (2.3776.700.51)
X-MailFrom: michael.tuexen@lurchi.franken.de
X-Mailman-Rule-Hits: max-recipients
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tcpm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-size; news-moderation; no-subject; digests; suspicious-header
Message-ID-Hash: VUA75O5MV6D7GBSFLDDOHOUDCJLZIP3M
X-Message-ID-Hash: VUA75O5MV6D7GBSFLDDOHOUDCJLZIP3M
X-Mailman-Approved-At: Tue, 20 Aug 2024 10:43:33 -0700
CC: hkchu@google.com, arvind@google.com, tcpm-ads@ietf.org, bart@bedrijfzondernaam.nl, tcpm@ietf.org
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [tcpm] Re: [Technical Errata Reported] RFC7413 (8014)
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/rmI9lwZMHOn5AIpHZi8Cn9I3lMI>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Owner: <mailto:tcpm-owner@ietf.org>
List-Post: <mailto:tcpm@ietf.org>
List-Subscribe: <mailto:tcpm-join@ietf.org>
List-Unsubscribe: <mailto:tcpm-leave@ietf.org>

> On 2. Jul 2024, at 12:10, RFC Errata System <rfc-editor@rfc-editor.org> wrote:
> 
> The following errata report has been submitted for RFC7413,
> "TCP Fast Open".
> 
> --------------------------------------
> You may review the report below and at:
> https://www.rfc-editor.org/errata/eid8014
> 
> --------------------------------------
> Type: Technical
> Reported by: Bart Overkamp <bart@bedrijfzondernaam.nl>
> 
> Section: 4.2.1
> 
> Original Text
> -------------
>                                                           <...> We
>  RECOMMEND both the client and the server to retransmit SYN and SYN-
>  ACK packets without the cookie options on timeouts.  This ensures the
>  connections of cookie requests will go through and lowers the latency
>  penalty (of dropped SYN/SYN-ACK packets).
> 
> Corrected Text
> --------------
>                                                           <...> We
>  RECOMMEND both the client and the server to retransmit SYN and SYN-
>  ACK packets without the cookie options on timeouts.  This ensures the
>  connection requests will go through.
> 
> Notes
> -----
> With a retransmitted SYN or SYN-ACK packet without cookie options it does not follow that 'cookie requests' will go through, however 'normal' TCP connection flow does continue. This comes with a latency penalty.
Dear all,

I would consider this as 'Editorial' instead of 'Technical' and would
suggest 'Held for Document Update' as its status.

Best regards
Michael
> 
> Instructions:
> -------------
> This erratum is currently posted as "Reported". (If it is spam, it 
> will be removed shortly by the RFC Production Center.) Please
> use "Reply All" to discuss whether it should be verified or
> rejected. When a decision is reached, the verifying party  
> will log in to change the status and edit the report, if necessary.
> 
> --------------------------------------
> RFC7413 (draft-ietf-tcpm-fastopen-10)
> --------------------------------------
> Title               : TCP Fast Open
> Publication Date    : December 2014
> Author(s)           : Y. Cheng, J. Chu, S. Radhakrishnan, A. Jain
> Category            : EXPERIMENTAL
> Source        vvf