[tcpm] Document Action: 'Improving the Robustness of TCP to Non-Congestion Events' to Experimental RFC
The IESG <iesg-secretary@ietf.org> Mon, 01 May 2006 21:48 UTC
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1FagGH-00025L-6a; Mon, 01 May 2006 17:48:57 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FagGF-00025A-T1; Mon, 01 May 2006 17:48:55 -0400
Received: from willow.neustar.com ([209.173.53.84]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FagGF-0006dz-Kb; Mon, 01 May 2006 17:48:55 -0400
Received: from stiedprstage1.ietf.org (stiedprstage1.va.neustar.com [10.31.47.10]) by willow.neustar.com (8.12.8/8.12.8) with ESMTP id k41Lmp9W004907 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 1 May 2006 21:48:51 GMT
Received: from ietf by stiedprstage1.ietf.org with local (Exim 4.43) id 1FagGB-0005nG-RV; Mon, 01 May 2006 17:48:51 -0400
X-test-idtracker: no
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Message-Id: <E1FagGB-0005nG-RV@stiedprstage1.ietf.org>
Date: Mon, 01 May 2006 17:48:51 -0400
X-Spam-Score: 0.1 (/)
X-Scan-Signature: b4a0a5f5992e2a4954405484e7717d8c
Cc: tcpm mailing list <tcpm@ietf.org>, Internet Architecture Board <iab@iab.org>, tcpm chair <faber@isi.edu>, tcpm chair <mallman@icir.org>, RFC Editor <rfc-editor@rfc-editor.org>
Subject: [tcpm] Document Action: 'Improving the Robustness of TCP to Non-Congestion Events' to Experimental RFC
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Errors-To: tcpm-bounces@ietf.org
The IESG has approved the following document: - 'Improving the Robustness of TCP to Non-Congestion Events ' <draft-ietf-tcpm-tcp-dcr-07.txt> as an Experimental RFC This document is the product of the TCP Maintenance and Minor Extensions Working Group. The IESG contact persons are Lars Eggert and Magnus Westerlund. A URL of this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-tcpm-tcp-dcr-07.txt Technical Summary This document specifies Non-Congestion Robustness (NCR) for TCP. One of the ways TCP detects loss is using the arrival of three duplicate acknowledgments. However, this heuristic is not always correct, notably in the case when network paths reorder segments. TCP-NCR is designed to mitigate this degraded performance by increasing the number of duplicate acknowledgments required to trigger loss recovery, based on the current state of the connection, in an effort to better disambiguate true segment loss from segment reordering. Working Group Summary This draft has attracted considerable interest in the WG, with many different people commenting on reviewing various iterations. The consensus was that although the specific benefits of the NCR extensions remain to be investigated, the mechanism itself is suitably ready for publication as an Experimental RFC. Protocol Quality PROTO Shepherd: Ted Faber (faber@isi.edu) The Gen-ART reviewer (Eric Gray, eric.gray@marconi.com) has found this ready for publication as an Experimental RFC. Chris Lonvick (clonvick@cisco.com) has reviewed this draft for the Security Directorate. Lars Eggert has reviewed this spec for the IESG. Note to RFC Editor Section 7, the only paragraph OLD: We do not believe there are security implications involved with TCP- NCR over and above those for general TCP congestion control [RFC2581]. In particular, the Extended Limited Transmit algorithms specified in this document have been specifically designed not to be susceptible to the sorts of ACK splitting attacks TCP's general TCP congestion control is vulnerable to (as discussed in [RFC3465]). NEW: General attacks against the congestion control of TCP are described in [RFC2581]. SACK-based loss recovery for TCP [RFC3517] mitigates some of the duplicate ACK attacks against TCP's congestion control. This document builds upon that work, and the Extended Limited Transmit algorithms specified in this document have been designed to thwart the ACK division problems that are described in [RFC3465]. (I.e., just replace the entire paragraph.) _______________________________________________ tcpm mailing list tcpm@ietf.org https://www1.ietf.org/mailman/listinfo/tcpm