Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notification for draft-gont-tcpm-tcp-seq-validation-03.txt)

"Eggert, Lars" <lars@netapp.com> Tue, 06 March 2018 19:05 UTC

Return-Path: <lars@netapp.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D4B9412D7E8 for <tcpm@ietfa.amsl.com>; Tue, 6 Mar 2018 11:05:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level:
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=netapp.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ukgDnXzrD83t for <tcpm@ietfa.amsl.com>; Tue, 6 Mar 2018 11:05:29 -0800 (PST)
Received: from mx144.netapp.com (mx144.netapp.com [IPv6:2620:10a:4005:8000:2306::d]) (using TLSv1.2 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C544D124234 for <tcpm@ietf.org>; Tue, 6 Mar 2018 11:05:29 -0800 (PST)
X-IronPort-AV: E=Sophos;i="5.47,432,1515484800"; d="asc'?scan'208";a="245135884"
Received: from vmwexchts01-prd.hq.netapp.com ([10.122.105.12]) by mx144-out.netapp.com with ESMTP; 06 Mar 2018 11:05:29 -0800
Received: from VMWEXCCAS03-PRD.hq.netapp.com (10.122.105.19) by VMWEXCHTS01-PRD.hq.netapp.com (10.122.105.12) with Microsoft SMTP Server (TLS) id 15.0.1320.4; Tue, 6 Mar 2018 11:05:29 -0800
Received: from NAM03-BY2-obe.outbound.protection.outlook.com (10.120.60.153) by VMWEXCCAS03-PRD.hq.netapp.com (10.122.105.19) with Microsoft SMTP Server (TLS) id 15.0.1320.4 via Frontend Transport; Tue, 6 Mar 2018 11:05:28 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netapp.onmicrosoft.com; s=selector1-netapp-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=kn3vJb7D/Qb3B6PSU1A9Yw7tCp7E5cyevRhPK/wQdGU=; b=fYotPbsbceEiGb1mW+UeIpF5+McrhC6dj59istoGW7SHROdSlQtEN2j2FNga/gP20O9jrJda5LMHIxy56CC3EcS328ysB0RNPG8RSoGTbcC5765qhBjjSBSp94627lnPZsMru40TufzAFrpKXz+gHkKU4KnNyRatQNTX4tfKZI0=
Received: from BLUPR06MB1764.namprd06.prod.outlook.com (10.162.224.150) by BLUPR06MB852.namprd06.prod.outlook.com (10.141.25.156) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.548.13; Tue, 6 Mar 2018 19:05:27 +0000
Received: from BLUPR06MB1764.namprd06.prod.outlook.com ([fe80::14b2:cbc0:3674:e004]) by BLUPR06MB1764.namprd06.prod.outlook.com ([fe80::14b2:cbc0:3674:e004%14]) with mapi id 15.20.0548.016; Tue, 6 Mar 2018 19:05:27 +0000
From: "Eggert, Lars" <lars@netapp.com>
To: Fernando Gont <fgont@si6networks.com>
CC: "tcpm@ietf.org" <tcpm@ietf.org>
Thread-Topic: [tcpm] Flaw in RFC793 (Fwd: New Version Notification for draft-gont-tcpm-tcp-seq-validation-03.txt)
Thread-Index: AQHTtXp7yXghPaSTSEaOofxmsPYzbKPDkTYA
Date: Tue, 06 Mar 2018 19:05:27 +0000
Message-ID: <E327115A-F8BC-4954-9635-76427199D295@netapp.com>
References: <152029339529.12825.5038413838558267392.idtracker@ietfa.amsl.com> <3edad22d-d6ed-31ea-cfc8-26b04b10de3e@si6networks.com>
In-Reply-To: <3edad22d-d6ed-31ea-cfc8-26b04b10de3e@si6networks.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3445.5.20)
authentication-results: spf=none (sender IP is ) smtp.mailfrom=lars@netapp.com;
x-originating-ip: [2001:a61:360d:b01:7d4a:f261:adcf:7840]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BLUPR06MB852; 7:tsikmPDGa5XYJKIEmY+npLkhtLXeJUUiPoDPYdrC3CxCS9zJ4fkP1K5KK/oOr3mL2eB+xSDdxwV5nZ94gCLkSJIsvfoWZ1jbukB3H/kM83Y/40hH/TtdthjAHycPM6tD7G1nwoCYV4SLrYJR+za9ZXOqfGOmz3QBiW5FHaY/oza7CCXzQG3YxsG1c8lKiDm/SVEiWOYsWC95K6doTnLSbHBXIjPrSFN/tejUN4vHzGjoVkqyobn2e6PUVnetI5yS
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: ae2ccf62-684f-4cdb-8403-08d583953927
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(49563074)(7193020); SRVR:BLUPR06MB852;
x-ms-traffictypediagnostic: BLUPR06MB852:
x-microsoft-antispam-prvs: <BLUPR06MB85218BB43202B9E6720F94FA7D90@BLUPR06MB852.namprd06.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(120809045254105)(100405760836317);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(102415395)(6040501)(2401047)(5005006)(8121501046)(3002001)(3231220)(944501244)(52105095)(10201501046)(93006095)(93001095)(6055026)(6041288)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123564045)(6072148)(201708071742011); SRVR:BLUPR06MB852; BCL:0; PCL:0; RULEID:; SRVR:BLUPR06MB852;
x-forefront-prvs: 06036BD506
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(39380400002)(39860400002)(346002)(376002)(396003)(199004)(189003)(377424004)(316002)(81166006)(81156014)(186003)(8676002)(6116002)(105586002)(50226002)(478600001)(25786009)(36756003)(8936002)(14454004)(33656002)(966005)(4326008)(83716003)(2950100002)(2906002)(15650500001)(229853002)(106356001)(86362001)(57306001)(3660700001)(2900100001)(46003)(3280700002)(53546011)(6916009)(5250100002)(68736007)(6246003)(6512007)(59450400001)(6436002)(99286004)(53936002)(76176011)(6506007)(7736002)(4001150100001)(5660300001)(6306002)(82746002)(102836004)(305945005)(97736004)(99936001)(6486002); DIR:OUT; SFP:1101; SCL:1; SRVR:BLUPR06MB852; H:BLUPR06MB1764.namprd06.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en;
received-spf: None (protection.outlook.com: netapp.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: dQjG1XX/tnNn0tV37rS61sDtb+ctFV3N8Q1d4k83kwWIWhCsWC3+wlzA+PqKJaTecIz9hFmEA4rfmsl7lem+n2j3oZa+Km8o/eOZg36+lycsZXZCuZW41etjUp02SisvXwMw/kDQxdI/P4hE9tx5SnPMoNYsmdtjV6ifdO/9buFyfVvHKodDNzlJ2J/Cu1oj0z3QPKdB0yLMy3dRU6HKaGOavG5w246dGtSLOP9gmuTGSZZ9aWVLB15Jmo1ez/IYEWvSye2uFuXjZQwbenE8VOvywlx7sbJG6/2B5RCUNLPZAmnLNpNaoaBEDQlOHnZP73Q60m9tlepH6+Z9KdrIqQ==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/signed; boundary="Apple-Mail=_476E887B-3E5E-4367-9790-F4A3D201BB8D"; protocol="application/pgp-signature"; micalg="pgp-sha512"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: ae2ccf62-684f-4cdb-8403-08d583953927
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Mar 2018 19:05:27.3174 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4b0911a0-929b-4715-944b-c03745165b3a
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BLUPR06MB852
X-OriginatorOrg: netapp.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/zBKxYD49g8rvPdUl2OOJxOUn7V0>
Subject: Re: [tcpm] Flaw in RFC793 (Fwd: New Version Notification for draft-gont-tcpm-tcp-seq-validation-03.txt)
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Mar 2018 19:05:32 -0000

Hi,

isn't this something that could simply go into 793bis, after there is consensus that something needs to be fixed?

Lars

On 2018-3-6, at 19:38, Fernando Gont <fgont@si6networks.com> wrote:
> 
> Folks,
> 
> There is bug in the TCP Sequence Number validation algorithm from
> RFC793. Most major implementations have addressed it, but the bug still
> remains in our specs.
> 
> We got a bit of extra energy to try to get this one fixed. Our I-D
> (draft-gont-tcpm-tcp-seq-validation) is available at the usual repository.
> 
> We have incorporated some minor edits done after the cut-off here:
> <https://www.si6networks.com/publications/drafts/draft-gont-tcpm-tcp-seq-validation-04.txt>
> -- but modulo minor grammar corrections, version -03 is the same.
> 
> We'd like to receive feedback from the wg regarding the "problem
> statement" (so to speak), and the proposed/described fixes.
> 
> Thanks!
> 
> Cheers,
> Fernando
> 
> 
> 
> 
> -------- Forwarded Message --------
> Subject: New Version Notification for
> draft-gont-tcpm-tcp-seq-validation-03.txt
> Date: Mon, 05 Mar 2018 15:43:15 -0800
> From: internet-drafts@ietf.org
> To: Fernando Gont <fgont@si6networks.com>, David Borman
> <david.borman@quantum.com>
> 
> 
> A new version of I-D, draft-gont-tcpm-tcp-seq-validation-03.txt
> has been successfully submitted by Fernando Gont and posted to the
> IETF repository.
> 
> Name:		draft-gont-tcpm-tcp-seq-validation
> Revision:	03
> Title:		On the Validation of TCP Sequence Numbers
> Document date:	2018-03-05
> Group:		Individual Submission
> Pages:		16
> URL:
> https://www.ietf.org/internet-drafts/draft-gont-tcpm-tcp-seq-validation-03.txt
> Status:
> https://datatracker.ietf.org/doc/draft-gont-tcpm-tcp-seq-validation/
> Htmlized:
> https://tools.ietf.org/html/draft-gont-tcpm-tcp-seq-validation-03
> Htmlized:
> https://datatracker.ietf.org/doc/html/draft-gont-tcpm-tcp-seq-validation-03
> Diff:
> https://www.ietf.org/rfcdiff?url2=draft-gont-tcpm-tcp-seq-validation-03
> 
> Abstract:
>   When TCP receives packets that lie outside of the receive window, the
>   corresponding packets are dropped and either an ACK, RST or no
>   response is generated due to the out-of-window packet, with no
>   further processing of the packet.  Most of the time, this works just
>   fine and TCP remains stable, especially when a TCP connection has
>   unidirectional data flow.  However, there are three scenarios in
>   which packets that are outside of the receive window should still
>   have their ACK field processed, or else a packet war will take place.
>   The aforementioned issues have affected a number of popular TCP
>   implementations, typically leading to connection failures, system
>   crashes, or other undesirable behaviors.  This document describes the
>   three scenarios in which the aforementioned issues might arise, and
>   formally updates RFC 793 such that these potential problems are
>   mitigated.
> 
> 
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> The IETF Secretariat
> 
> 
> 
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm