Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notification for draft-gont-tcpm-tcp-seq-validation-03.txt)
"Eggert, Lars" <lars@netapp.com> Tue, 06 March 2018 19:05 UTC
Return-Path: <lars@netapp.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D4B9412D7E8 for <tcpm@ietfa.amsl.com>; Tue, 6 Mar 2018 11:05:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=netapp.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ukgDnXzrD83t for <tcpm@ietfa.amsl.com>; Tue, 6 Mar 2018 11:05:29 -0800 (PST)
Received: from mx144.netapp.com (mx144.netapp.com [IPv6:2620:10a:4005:8000:2306::d]) (using TLSv1.2 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C544D124234 for <tcpm@ietf.org>; Tue, 6 Mar 2018 11:05:29 -0800 (PST)
X-IronPort-AV: E=Sophos;i="5.47,432,1515484800"; d="asc'?scan'208";a="245135884"
Received: from vmwexchts01-prd.hq.netapp.com ([10.122.105.12]) by mx144-out.netapp.com with ESMTP; 06 Mar 2018 11:05:29 -0800
Received: from VMWEXCCAS03-PRD.hq.netapp.com (10.122.105.19) by VMWEXCHTS01-PRD.hq.netapp.com (10.122.105.12) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Tue, 6 Mar 2018 11:05:29 -0800
Received: from NAM03-BY2-obe.outbound.protection.outlook.com (10.120.60.153) by VMWEXCCAS03-PRD.hq.netapp.com (10.122.105.19) with Microsoft SMTP Server (TLS) id 15.0.1320.4 via Frontend Transport; Tue, 6 Mar 2018 11:05:28 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netapp.onmicrosoft.com; s=selector1-netapp-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=kn3vJb7D/Qb3B6PSU1A9Yw7tCp7E5cyevRhPK/wQdGU=; b=fYotPbsbceEiGb1mW+UeIpF5+McrhC6dj59istoGW7SHROdSlQtEN2j2FNga/gP20O9jrJda5LMHIxy56CC3EcS328ysB0RNPG8RSoGTbcC5765qhBjjSBSp94627lnPZsMru40TufzAFrpKXz+gHkKU4KnNyRatQNTX4tfKZI0=
Received: from BLUPR06MB1764.namprd06.prod.outlook.com (10.162.224.150) by BLUPR06MB852.namprd06.prod.outlook.com (10.141.25.156) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.548.13; Tue, 6 Mar 2018 19:05:27 +0000
Received: from BLUPR06MB1764.namprd06.prod.outlook.com ([fe80::14b2:cbc0:3674:e004]) by BLUPR06MB1764.namprd06.prod.outlook.com ([fe80::14b2:cbc0:3674:e004%14]) with mapi id 15.20.0548.016; Tue, 6 Mar 2018 19:05:27 +0000
From: "Eggert, Lars" <lars@netapp.com>
To: Fernando Gont <fgont@si6networks.com>
CC: "tcpm@ietf.org" <tcpm@ietf.org>
Thread-Topic: [tcpm] Flaw in RFC793 (Fwd: New Version Notification for draft-gont-tcpm-tcp-seq-validation-03.txt)
Thread-Index: AQHTtXp7yXghPaSTSEaOofxmsPYzbKPDkTYA
Date: Tue, 06 Mar 2018 19:05:27 +0000
Message-ID: <E327115A-F8BC-4954-9635-76427199D295@netapp.com>
References: <152029339529.12825.5038413838558267392.idtracker@ietfa.amsl.com> <3edad22d-d6ed-31ea-cfc8-26b04b10de3e@si6networks.com>
In-Reply-To: <3edad22d-d6ed-31ea-cfc8-26b04b10de3e@si6networks.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3445.5.20)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=lars@netapp.com;
x-originating-ip: [2001:a61:360d:b01:7d4a:f261:adcf:7840]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BLUPR06MB852; 7:tsikmPDGa5XYJKIEmY+npLkhtLXeJUUiPoDPYdrC3CxCS9zJ4fkP1K5KK/oOr3mL2eB+xSDdxwV5nZ94gCLkSJIsvfoWZ1jbukB3H/kM83Y/40hH/TtdthjAHycPM6tD7G1nwoCYV4SLrYJR+za9ZXOqfGOmz3QBiW5FHaY/oza7CCXzQG3YxsG1c8lKiDm/SVEiWOYsWC95K6doTnLSbHBXIjPrSFN/tejUN4vHzGjoVkqyobn2e6PUVnetI5yS
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: ae2ccf62-684f-4cdb-8403-08d583953927
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(49563074)(7193020); SRVR:BLUPR06MB852;
x-ms-traffictypediagnostic: BLUPR06MB852:
x-microsoft-antispam-prvs: <BLUPR06MB85218BB43202B9E6720F94FA7D90@BLUPR06MB852.namprd06.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(120809045254105)(100405760836317);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(102415395)(6040501)(2401047)(5005006)(8121501046)(3002001)(3231220)(944501244)(52105095)(10201501046)(93006095)(93001095)(6055026)(6041288)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123564045)(6072148)(201708071742011); SRVR:BLUPR06MB852; BCL:0; PCL:0; RULEID:; SRVR:BLUPR06MB852;
x-forefront-prvs: 06036BD506
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(39380400002)(39860400002)(346002)(376002)(396003)(199004)(189003)(377424004)(316002)(81166006)(81156014)(186003)(8676002)(6116002)(105586002)(50226002)(478600001)(25786009)(36756003)(8936002)(14454004)(33656002)(966005)(4326008)(83716003)(2950100002)(2906002)(15650500001)(229853002)(106356001)(86362001)(57306001)(3660700001)(2900100001)(46003)(3280700002)(53546011)(6916009)(5250100002)(68736007)(6246003)(6512007)(59450400001)(6436002)(99286004)(53936002)(76176011)(6506007)(7736002)(4001150100001)(5660300001)(6306002)(82746002)(102836004)(305945005)(97736004)(99936001)(6486002); DIR:OUT; SFP:1101; SCL:1; SRVR:BLUPR06MB852; H:BLUPR06MB1764.namprd06.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: netapp.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: dQjG1XX/tnNn0tV37rS61sDtb+ctFV3N8Q1d4k83kwWIWhCsWC3+wlzA+PqKJaTecIz9hFmEA4rfmsl7lem+n2j3oZa+Km8o/eOZg36+lycsZXZCuZW41etjUp02SisvXwMw/kDQxdI/P4hE9tx5SnPMoNYsmdtjV6ifdO/9buFyfVvHKodDNzlJ2J/Cu1oj0z3QPKdB0yLMy3dRU6HKaGOavG5w246dGtSLOP9gmuTGSZZ9aWVLB15Jmo1ez/IYEWvSye2uFuXjZQwbenE8VOvywlx7sbJG6/2B5RCUNLPZAmnLNpNaoaBEDQlOHnZP73Q60m9tlepH6+Z9KdrIqQ==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/signed; boundary="Apple-Mail=_476E887B-3E5E-4367-9790-F4A3D201BB8D"; protocol="application/pgp-signature"; micalg="pgp-sha512"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: ae2ccf62-684f-4cdb-8403-08d583953927
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Mar 2018 19:05:27.3174 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4b0911a0-929b-4715-944b-c03745165b3a
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR06MB852
X-OriginatorOrg: netapp.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/zBKxYD49g8rvPdUl2OOJxOUn7V0>
Subject: Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notification for draft-gont-tcpm-tcp-seq-validation-03.txt)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Mar 2018 19:05:32 -0000
Hi, isn't this something that could simply go into 793bis, after there is consensus that something needs to be fixed? Lars On 2018-3-6, at 19:38, Fernando Gont <fgont@si6networks.com> wrote: > > Folks, > > There is bug in the TCP Sequence Number validation algorithm from > RFC793. Most major implementations have addressed it, but the bug still > remains in our specs. > > We got a bit of extra energy to try to get this one fixed. Our I-D > (draft-gont-tcpm-tcp-seq-validation) is available at the usual repository. > > We have incorporated some minor edits done after the cut-off here: > <https://www.si6networks.com/publications/drafts/draft-gont-tcpm-tcp-seq-validation-04.txt> > -- but modulo minor grammar corrections, version -03 is the same. > > We'd like to receive feedback from the wg regarding the "problem > statement" (so to speak), and the proposed/described fixes. > > Thanks! > > Cheers, > Fernando > > > > > -------- Forwarded Message -------- > Subject: New Version Notification for > draft-gont-tcpm-tcp-seq-validation-03.txt > Date: Mon, 05 Mar 2018 15:43:15 -0800 > From: internet-drafts@ietf.org > To: Fernando Gont <fgont@si6networks.com>, David Borman > <david.borman@quantum.com> > > > A new version of I-D, draft-gont-tcpm-tcp-seq-validation-03.txt > has been successfully submitted by Fernando Gont and posted to the > IETF repository. > > Name: draft-gont-tcpm-tcp-seq-validation > Revision: 03 > Title: On the Validation of TCP Sequence Numbers > Document date: 2018-03-05 > Group: Individual Submission > Pages: 16 > URL: > https://www.ietf.org/internet-drafts/draft-gont-tcpm-tcp-seq-validation-03.txt > Status: > https://datatracker.ietf.org/doc/draft-gont-tcpm-tcp-seq-validation/ > Htmlized: > https://tools.ietf.org/html/draft-gont-tcpm-tcp-seq-validation-03 > Htmlized: > https://datatracker.ietf.org/doc/html/draft-gont-tcpm-tcp-seq-validation-03 > Diff: > https://www.ietf.org/rfcdiff?url2=draft-gont-tcpm-tcp-seq-validation-03 > > Abstract: > When TCP receives packets that lie outside of the receive window, the > corresponding packets are dropped and either an ACK, RST or no > response is generated due to the out-of-window packet, with no > further processing of the packet. Most of the time, this works just > fine and TCP remains stable, especially when a TCP connection has > unidirectional data flow. However, there are three scenarios in > which packets that are outside of the receive window should still > have their ACK field processed, or else a packet war will take place. > The aforementioned issues have affected a number of popular TCP > implementations, typically leading to connection failures, system > crashes, or other undesirable behaviors. This document describes the > three scenarios in which the aforementioned issues might arise, and > formally updates RFC 793 such that these potential problems are > mitigated. > > > > > Please note that it may take a couple of minutes from the time of submission > until the htmlized version and diff are available at tools.ietf.org. > > The IETF Secretariat > > > > _______________________________________________ > tcpm mailing list > tcpm@ietf.org > https://www.ietf.org/mailman/listinfo/tcpm
- [tcpm] Flaw in RFC793 (Fwd: New Version Notificat… Fernando Gont
- Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notif… Eggert, Lars
- Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notif… Fernando Gont
- Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notif… Yoshifumi Nishida
- Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notif… Wesley Eddy
- Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notif… Fernando Gont
- Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notif… Scharf, Michael (Nokia - DE/Stuttgart)