[tcpm] ECN+SYN

Stefanos Harhalakis <v13@v13.gr> Tue, 19 February 2008 23:18 UTC

Return-Path: <tcpm-bounces@ietf.org>
X-Original-To: ietfarch-tcpm-archive@core3.amsl.com
Delivered-To: ietfarch-tcpm-archive@core3.amsl.com
Received: from localhost (localhost []) by core3.amsl.com (Postfix) with ESMTP id 567613A6E37; Tue, 19 Feb 2008 15:18:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.394
X-Spam-Status: No, score=-0.394 tagged_above=-999 required=5 tests=[AWL=-0.557, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_ORG=0.611, J_CHICKENPOX_33=0.6, RDNS_NONE=0.1]
Received: from mail.ietf.org ([]) by localhost (core3.amsl.com []) (amavisd-new, port 10024) with ESMTP id u+vbRPYfIoZJ; Tue, 19 Feb 2008 15:18:26 -0800 (PST)
Received: from core3.amsl.com (localhost []) by core3.amsl.com (Postfix) with ESMTP id 6DA203A6DB0; Tue, 19 Feb 2008 15:18:23 -0800 (PST)
X-Original-To: tcpm@core3.amsl.com
Delivered-To: tcpm@core3.amsl.com
Received: from localhost (localhost []) by core3.amsl.com (Postfix) with ESMTP id 141743A6D4C for <tcpm@core3.amsl.com>; Tue, 19 Feb 2008 15:18:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from mail.ietf.org ([]) by localhost (core3.amsl.com []) (amavisd-new, port 10024) with ESMTP id dGoLU0kJ-NBn for <tcpm@core3.amsl.com>; Tue, 19 Feb 2008 15:18:19 -0800 (PST)
Received: from mx-out-01.forthnet.gr (mx-out.forthnet.gr []) by core3.amsl.com (Postfix) with ESMTP id 005D828C696 for <tcpm@ietf.org>; Tue, 19 Feb 2008 15:16:43 -0800 (PST)
Received: from mx-av-04.forthnet.gr (mx-av.forthnet.gr []) by mx-out-01.forthnet.gr (8.13.8/8.13.8) with ESMTP id m1JNGeX5022045; Wed, 20 Feb 2008 01:16:40 +0200
Received: from MX-IN-05.forthnet.gr (mx-in-05.forthnet.gr []) by mx-av-04.forthnet.gr (8.14.1/8.14.1) with ESMTP id m1JNGegd000704; Wed, 20 Feb 2008 01:16:40 +0200
Received: from hell.hell.gr (adsl2-71.lsf.forthnet.gr []) by MX-IN-05.forthnet.gr (8.14.2/8.14.2) with ESMTP id m1JNGcnp027855; Wed, 20 Feb 2008 01:16:39 +0200
Authentication-Results: MX-IN-05.forthnet.gr smtp.mail=v13@v13.gr; spf=neutral
Authentication-Results: MX-IN-05.forthnet.gr header.from=v13@v13.gr; sender-id=neutral
From: Stefanos Harhalakis <v13@v13.gr>
To: akuzma@northwestern.edu
Date: Wed, 20 Feb 2008 01:16:26 +0200
User-Agent: KMail/1.9.7
MIME-Version: 1.0
Content-Disposition: inline
Message-Id: <200802200116.26451.v13@v13.gr>
Cc: tcpm@ietf.org
Subject: [tcpm] ECN+SYN
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <http://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <http://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: tcpm-bounces@ietf.org
Errors-To: tcpm-bounces@ietf.org

Hello there,

  I've just read the proposal regarding ECN and SYN/ACK packets and I cannot 
understand why not to allow ECN in SYN packets too. Let me elaborate a bit 

  In paragraph 4, page 10 you mention two reasons which I find incorrect:

*  First reason claims that there is no guarantee that the other TCP endpoint 
is ECN-capable. AFAICT this is exactly the case as in ECN in SYN/ACK packets. 
I fail to see why there is a difference when "the connection" looses the SYN 
instead of the SYN/ACK packet.

*  Next paragraph says that SYN packets can be missused. IMHO, this is already 
possible. A malicious host can send IP packets with the ECT codepoint set 
that include non-ECN TCP SYN packets, or even SYN/ECN+ECT packets. There is 
no guarantee that an endpoint will drop SYN/ECN+ECT packets and I believe 
there is no valid reason for having an ECN capable endpoint drop SYN/ECN 
packets (as being malicious).

  Because of my limited experience I believe that I'm not able to comment on 
reason (3) of page 22 (appendix A). 

Best regards,
Harhalakis Stefanos

p.s. Please excuse me if I'm wrong. I'm new in this area.
tcpm mailing list