[tcpm] DoS attack from misbehaving receivers

Stephen Hemminger <shemminger@osdl.org> Thu, 11 January 2007 18:54 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1H553v-0005Ub-Fx; Thu, 11 Jan 2007 13:54:07 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1H553u-0005UR-Ep for tcpm@ietf.org; Thu, 11 Jan 2007 13:54:06 -0500
Received: from smtp.osdl.org ([65.172.181.24]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1H553o-0002Cj-Ll for tcpm@ietf.org; Thu, 11 Jan 2007 13:54:06 -0500
Received: from shell0.pdx.osdl.net (fw.osdl.org [65.172.181.6]) by smtp.osdl.org (8.12.8/8.12.8) with ESMTP id l0BIrnWi000860 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO); Thu, 11 Jan 2007 10:53:49 -0800
Received: from freekitty (freekitty.pdx.osdl.net [10.8.0.54]) by shell0.pdx.osdl.net (8.13.1/8.11.6) with ESMTP id l0BIrnjt032475; Thu, 11 Jan 2007 10:53:49 -0800
Date: Thu, 11 Jan 2007 10:53:48 -0800
From: Stephen Hemminger <shemminger@osdl.org>
To: tcpm@ietf.org
Message-ID: <20070111105348.546de25e@freekitty>
Organization: OSDL
X-Mailer: Sylpheed-Claws 2.5.0-rc3 (GTK+ 2.10.6; i486-pc-linux-gnu)
Mime-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=-1.182 required=5 tests=AWL
X-Spam-Checker-Version: SpamAssassin 2.63-osdl_revision__1.107__
X-MIMEDefang-Filter: osdl$Revision: 1.167 $
X-Scanned-By: MIMEDefang 2.36
X-Spam-Score: 0.1 (/)
X-Scan-Signature: 7a6398bf8aaeabc7a7bb696b6b0a2aad
Cc: david.malone@nuim.ie
Subject: [tcpm] DoS attack from misbehaving receivers
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Errors-To: tcpm-bounces@ietf.org

Has anyone in this group explored the problems described in:
"Misbehaving TCP Receivers Can Cause Internet-Wide Congestion Collapse"?

	http://www.cs.umd.edu/~capveg/optack/optack-ccs05.pdf
	http://www.cs.umd.edu/~capveg/
	http://www.kb.cert.org/vuls/id/102014

A possible solution (optack) is described in the paper that involves the
sender randomly skipping segments and resetting connections that
ACK data that was never sent.  But it is not clear that the impacts
of such a change have been fully investigated.

Comments?

_______________________________________________
tcpm mailing list
tcpm@ietf.org
https://www1.ietf.org/mailman/listinfo/tcpm