Re: [tcpm] I-D Action: draft-ietf-tcpm-1323bis-13.txt

"Scheffenegger, Richard" <rs@netapp.com> Thu, 30 May 2013 14:28 UTC

Return-Path: <rs@netapp.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 759EE21F91B7 for <tcpm@ietfa.amsl.com>; Thu, 30 May 2013 07:28:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.524
X-Spam-Level:
X-Spam-Status: No, score=-10.524 tagged_above=-999 required=5 tests=[AWL=0.075, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zn-eFernK1lB for <tcpm@ietfa.amsl.com>; Thu, 30 May 2013 07:28:32 -0700 (PDT)
Received: from mx12.netapp.com (mx12.netapp.com [216.240.18.77]) by ietfa.amsl.com (Postfix) with ESMTP id BA28821F901A for <tcpm@ietf.org>; Thu, 30 May 2013 07:28:03 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.87,770,1363158000"; d="scan'208";a="59602182"
Received: from smtp2.corp.netapp.com ([10.57.159.114]) by mx12-out.netapp.com with ESMTP; 30 May 2013 07:28:01 -0700
Received: from vmwexceht02-prd.hq.netapp.com (vmwexceht02-prd.hq.netapp.com [10.106.76.240]) by smtp2.corp.netapp.com (8.13.1/8.13.1/NTAP-1.6) with ESMTP id r4UES1gu005809; Thu, 30 May 2013 07:28:01 -0700 (PDT)
Received: from SACEXCMBX02-PRD.hq.netapp.com ([169.254.1.61]) by vmwexceht02-prd.hq.netapp.com ([10.106.76.240]) with mapi id 14.03.0123.003; Thu, 30 May 2013 07:28:01 -0700
From: "Scheffenegger, Richard" <rs@netapp.com>
To: Pasi Sarolahti <pasi.sarolahti@iki.fi>, Joe Touch <touch@ISI.EDU>
Thread-Topic: [tcpm] I-D Action: draft-ietf-tcpm-1323bis-13.txt
Thread-Index: AQHOWsOpxpOgcpwlv0GGPZ5muXL+75kZtViAgAAVcICAAAXbAIAAJCMAgAAQEYCAALpegIACUOgAgADRMID//+nNwA==
Date: Thu, 30 May 2013 14:28:01 +0000
Message-ID: <012C3117EDDB3C4781FD802A8C27DD4F24BBA3B6@SACEXCMBX02-PRD.hq.netapp.com>
References: <20130518155753.17946.96581.idtracker@ietfa.amsl.com> <CAK6E8=d_LTZgnGAncdWDAi+7ebd3Lo5aevPeGG0=KSbBMeBhcg@mail.gmail.com> <519A8322.6030405@isi.edu> <26034_1369382276_519F1D83_26034_1735_1_519F1D68.604@uclouvain.be> <E220F4B0-EE27-431C-BCBE-0A0C01C8B0EF@iki.fi> <51A38F9F.4000407@isi.edu> <39EDB63B-7FCB-43F5-9355-474D50976005@iki.fi> <51A3A684.5020400@isi.edu> <B3F294F6-8866-4155-98F6-0927B90346E4@iki.fi> <51A3D24F.7050300@isi.edu> <62F28CBC-271E-42C4-9D06-1331CE25DC0E@iki.fi> <51A66002.7050401@isi.edu> <DDB1E5C2-F806-45CF-80F8-AC3774523A5C@iki.fi>
In-Reply-To: <DDB1E5C2-F806-45CF-80F8-AC3774523A5C@iki.fi>
Accept-Language: de-AT, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.104.60.117]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "tcpm@ietf.org Extensions" <tcpm@ietf.org>
Subject: Re: [tcpm] I-D Action: draft-ietf-tcpm-1323bis-13.txt
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tcpm>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 May 2013 14:28:38 -0000

Thanks Pasi, Joe.

> Even sending an ACK
> defeats that. At best, send a dup ack for last segment received correctly,
> but I still think that doing *anything* other than silent-drop isn't what
> PAWS protection intends.

My understanding is, that failing the PAWS test should be treated like receiving 
a segment that is out-of-window. The reason for failing the PAWS test (missing TSopt, 
or invalid TSval) is secondary, not?

Thus an ACK for the last in-sequence segment should be sent.

> 1) MAY/SHOULD/MUST send response for missing timestamp

This case is not currently covered. As consensus was reached that TSopt should not be allowed to be sent arbitratily for some segments and not for others, I would think a missing timestamp in a segment means, that segment needs to be treated like any other out-of-window segment.


> 2) MAY/SHOULD/MUST send response when timestamp comparison fails (current
> text on R1 seems to want that this is MUST)

For both, I think a MUST would be a appropriate, a SHOULD may suffice. (as an individual contributor).


Fixed the Nit, and updated section 6 as indicated.

Best regards,

Richard Scheffenegger



> -----Original Message-----
> From: tcpm-bounces@ietf.org [mailto:tcpm-bounces@ietf.org] On Behalf Of
> Pasi Sarolahti
> Sent: Donnerstag, 30. Mai 2013 10:36
> To: Joe Touch
> Cc: tcpm@ietf.org Extensions
> Subject: Re: [tcpm] I-D Action: draft-ietf-tcpm-1323bis-13.txt
> 
> On May 29, 2013, at 11:07 PM, Joe Touch <touch@ISI.EDU> wrote:
> 
> >> * PAWS algorithm tells to send acknowledgment if the check fails.
> >> Shouldn't we then, for consistency, require sending acknowledgment
> >> also if TSopt is missing? Current MAY in Sec. 3.2. is not very
> >> informative in my mind.
> >
> > I don't think it's useful to send the ACK in that case. The point of
> PAWS is to ignore segments that are not protected. Even sending an ACK
> defeats that. At best, send a dup ack for last segment received correctly,
> but I still think that doing *anything* other than silent-drop isn't what
> PAWS protection intends.
> 
> The PAWS algorithm motivates sending ACK with recovering from half-open
> connections (referring to fig. 10 in RFC 793), when one side crashes and
> re-opens the connection. Wouldn't this same reasoning apply also for
> missing timestamps case? It is possible that after a reboot the system
> timestamps setting is reset from enabled to disabled, if that happens to
> be the boot-time default. In such case the newly opening connection would
> have its segments discarded by the other side that still remains in
> established state, because of lack of timestamps, isn't that right?
> 
> Admittedly this is not the most likely scenario, but just trying to dig up
> the reasoning for choosing one way or the other.
> 
> Since we are on the path of clarifying the text with normative language,
> why not do the same also for Section 4.3? We should decide
> 
> 1) MAY/SHOULD/MUST send response for missing timestamp
> 
> 2) MAY/SHOULD/MUST send response when timestamp comparison fails (current
> text on R1 seems to want that this is MUST)
> 
> It would be good to provide these with some reasoning, too. For (2) this
> reasoning already seems to be in place.
> 
> Nit: start of section 4.3 uses "REQUIRES" that should not be capitalized
> because it is not a RFC 2119 keyword. How about just saying something like
> "if PAWS algorithm is enabled, the following steps MUST be followed", or
> something. Sorry about splitting hairs, but I think we should be pedantic
> about the keywords.
> 
> >> " *  If the Timestamps option is removed from the <SYN> or <SYN,ACK>
> >>          segment, high speed connections that need PAWS would not
> >> have that protection. Successful negotiation of Timestamps option
> >> enforces a stricter verification of incoming segments at receiver. If
> >> the Timestamps option was removed from a subsequent data segment
> >> after a successful negotiation (for example, as part of
> >> re-segmentation), the segment is discarded by the receiver without
> >> further processing. Middleboxes should not remove the Timestamps
> >> option. One study found that 6% of measured HTTP connections had the
> >> Timestamps option removed from data segments [Honda11]."
> >
> > The last sentence seems out of place; why are you including that? If
> there are implications to the 6% drop then you should mention that, but I
> would expect that elsewhere than the security considerations section.
> 
> Because that paragraph talks about removal of timestamps option. But I
> agree that the proposed sentence doesn't sit there very well. How about
> including the reference in the beginning of the Middleboxes section of the
> text:
> 
> "Some middleboxes have been known to remove the TCP options
>       described in this document from the TCP segments [Honda11]."
> (changed <SYN> segment to TCP segments)
> 
> The main point is that the current text only talks about dropping options
> from SYN segments, but this happens also for data segments, as the paper
> shows. Since we have fairly recent quantified data about this, why not
> include the reference?
> 
> - Pasi
> 
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm