[tcpm] Re: About having reset reason in TCP option
Jason Xing <kerneljasonxing@gmail.com> Thu, 28 November 2024 15:28 UTC
Return-Path: <kerneljasonxing@gmail.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DEE69C1CAE94; Thu, 28 Nov 2024 07:28:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 267HKaqVVrvF; Thu, 28 Nov 2024 07:28:16 -0800 (PST)
Received: from mail-il1-x133.google.com (mail-il1-x133.google.com [IPv6:2607:f8b0:4864:20::133]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1EAEAC1840D0; Thu, 28 Nov 2024 07:28:16 -0800 (PST)
Received: by mail-il1-x133.google.com with SMTP id e9e14a558f8ab-3a777c67c45so2978765ab.1; Thu, 28 Nov 2024 07:28:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1732807695; x=1733412495; darn=ietf.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=FoAqbj7RmIX+qMmYMgE0H+hQ71v5V9jVLPvko12gy3Y=; b=EauxhGtSRLOLfjHWS5NBxlbRE8zIFXi0HF7GJiDGYxD4ih2ZR3n1SIxQuiLIJGDdJP GR9F1h3TCZDipWUQVduhPJGfCiUtla85GBba0fQ26m5ob0PyH6Gdm77GOhDr1P9ljYCx lxHpuTfJcGK4DR+K8QjZMenBIIoNqIXzSHRhdZa/DThkaSmipqSO9fvFSP234N4VmeG9 XG/8hOaGS/2JlFxtNP3H9Yt1M5J8vYj6bNI4TX/0p1qXHUHS2Ocsi6+twrGfTGujkUZE mJN5hR8CzbIbYOV/lN0dmTIK6M9zZdouANO+LkhzrJi2IgohlkoqS2ahtURPI1pY+7cO p0HA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1732807695; x=1733412495; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=FoAqbj7RmIX+qMmYMgE0H+hQ71v5V9jVLPvko12gy3Y=; b=lKHp6YF4BXPmBNi96lmPO24zvGeT5rHjtbVYMn0e7ZTYUhXFNaoL1qnFwpavwtyk+h e9ClT1a0sHo4iykLHfbGrzwc8XOb26POepeQiqGJLxokMohz7qTAxTcpmSoYVXwa0oSD lcylJp3cYJwvRxH2pQ3vPTWSgHVRiYji3Ut+A2DNROJ3eo595NpudGdNRXZM/ckIUD8P PG2zKmeIKDcDKBuyiEtroO4habZihZfii61rn7Z4puXWWums0eD07nQIM7CMWMErcMpF Z6zeI1ZSoAbbP0Fk5cnlYVAwZj1capdTeiMkewwPMg35dpRoNiY/5hJ/pxXn2KjierZk Zm/Q==
X-Forwarded-Encrypted: i=1; AJvYcCU1GR38WM26tYb3bE0+9dQjIV30Xyz3ufQRP4MRjy4JxKRksltCmWRkF7qyX2ger23JhhBOpO+ywgiancpXyinKXxP9ohzofNdgpM6Nzy2hSbMuFMTz/XA1478f@ietf.org
X-Gm-Message-State: AOJu0YzazHE3I+7VuxfDjGUmctmkMHvnHSufrT0dohWZXD57d/P1PVfq hPIJ9YA1JauMENiy+YlApN80nKSoFkwU8GMyWT7ehu7ekCcvTkbWajeuuzC5XIhz10OhtFz1pCB VbNox5FN6rAAUVAMWg1AuxjDlWFk=
X-Gm-Gg: ASbGnctxFsGBUK4P7qQxj0ytKH/Ojox5Bf7DplcXBAm2VEbnJqAiPCtFnTTihcKub3h Geno3vEFhIcOa+zMd6vu4KYSM/35yTdI=
X-Google-Smtp-Source: AGHT+IF1FYD8CYBD3Kq/tPYVM+2h/J9Gy4lezfPczsT7ZrwpL3ugH5ZlS35Q2h8pe2ZIWT+jPQ9QPjSNm72GdjBx90w=
X-Received: by 2002:a92:c24c:0:b0:3a7:d106:3eff with SMTP id e9e14a558f8ab-3a7d1064651mr11652125ab.6.1732807695245; Thu, 28 Nov 2024 07:28:15 -0800 (PST)
MIME-Version: 1.0
References: <CAL+tcoDXjGiDje_za+ECCu2v3bCJL+MbDbdo_xFq2WzRTG-Ufw@mail.gmail.com> <DU2PR02MB1016069235790EDA6B9F5E30688292@DU2PR02MB10160.eurprd02.prod.outlook.com> <CAL+tcoCM_cGxdA-uMV+Fmj0ATWdn2K4TW+D57wepMmj5RBBb3A@mail.gmail.com> <DU2PR02MB10160864793D854199E8A7B6E88292@DU2PR02MB10160.eurprd02.prod.outlook.com>
In-Reply-To: <DU2PR02MB10160864793D854199E8A7B6E88292@DU2PR02MB10160.eurprd02.prod.outlook.com>
From: Jason Xing <kerneljasonxing@gmail.com>
Date: Fri, 29 Nov 2024 00:27:39 +0900
Message-ID: <CAL+tcoBkekm2R8bWn-xfWkvZ=UKK==Xduz40W=4dsT5=DOQ59g@mail.gmail.com>
To: mohamed.boucadair@orange.com
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Message-ID-Hash: DN5O4QLSWUEUAZ5SOUTXJUCNTZC4UNNV
X-Message-ID-Hash: DN5O4QLSWUEUAZ5SOUTXJUCNTZC4UNNV
X-MailFrom: kerneljasonxing@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-tcpm.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "tcpm@ietf.org" <tcpm@ietf.org>, Eric Dumazet <edumazet@google.com>, "draft-boucadair-tcpm-rst-diagnostic-payload@ietf.org" <draft-boucadair-tcpm-rst-diagnostic-payload@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [tcpm] Re: About having reset reason in TCP option
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/zRYmLUWfYA4HT1ID1Vgmnq_-kTk>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Owner: <mailto:tcpm-owner@ietf.org>
List-Post: <mailto:tcpm@ietf.org>
List-Subscribe: <mailto:tcpm-join@ietf.org>
List-Unsubscribe: <mailto:tcpm-leave@ietf.org>
On Fri, Nov 29, 2024 at 12:16 AM <mohamed.boucadair@orange.com> wrote: > > Re-, > > Great to hear this feedback. > > The set of reason values is not frozen. It is easy to add those reasons for which we have a reference in the 9293. Do you want me to get involved in this draft to write a few paragraphs or contribute something else? > > The codes with a reference to This_Document cover cases where the rst is sent by an intermediate NAT/firewall. We don't have anchor text for those in the base TCP spec. > However, rfc5382, for example, says the following: > > Sending a RST notification allows endpoint applications to recover > more quickly; however, notifying the endpoints may not always be > possible if, for example, session state is lost due to a power > failure. > > The intent was to also cover deployments that are not shy about the presence of such intermediate nodes :-) It does make sense to me. Thanks for the explanation. Thanks, Jason > > Cheers, > Med > > > -----Message d'origine----- > > De : Jason Xing <kerneljasonxing@gmail.com> > > Envoyé : jeudi 28 novembre 2024 15:53 > > À : BOUCADAIR Mohamed INNOV/NET <mohamed.boucadair@orange.com> > > Cc : tcpm@ietf.org; Eric Dumazet <edumazet@google.com>; draft- > > boucadair-tcpm-rst-diagnostic-payload@ietf.org > > Objet : Re: [tcpm] About having reset reason in TCP option > > > > > > Hello Mohamed, > > > > On Thu, Nov 28, 2024 at 9:46 PM <mohamed.boucadair@orange.com> > > wrote: > > > > > > Hi Jason, > > > > > > FWIW, you may find a proposal in > > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2 > > Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-boucadair-tcpm-rst- > > diagnostic-payload- > > 08&data=05%7C02%7Cmohamed.boucadair%40orange.com%7Cd73ab5d3c94046 > > a93f5308dd0fbc7d9c%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0%7C6 > > 38684024422562051%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWU > > sIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3 > > D%3D%7C0%7C%7C%7C&sdata=9KttUajmJBpbDoMmkLJpPCfOL2cN96PYIEZogft7b > > Dc%3D&reserved=0, which does not require any new option at all. > > It uses existing TCP provisions (see RFC9293, section 3.5.3). > > > > Thanks for sharing this big information with me :) > > > > > > > > BTW, do you have in mind reasons other than those in draft- > > boucadair-tcpm-rst-diagnostic-payload-08#Section-5.2? Thanks. > > > > After reading the whole draft, I would like to know more details > > about a few following cases: > > 1) for the value 1, what about the case where FIN_WAIT2 socket > > receives the new data? Also please see RFC 9293 3.5.1. Half-Open > > Connections and Other Anomalies. I quote one sentence here "Such > > connections will automatically become reset if an attempt is made > > to send data in either direction". > > > > 2) for the value 9, I wonder if you consider the case (where the > > receiving side fails to fetch a correct socket when the skb is > > coming) as "Destination Unreachable"? > > > > 3) which category is the abort call case labeled? Please see RFC > > 9293 3.10.5. ABORT Call. > > > > 4) what about the fin-wait-2 socket sending RST case? I quote > > here "If the SYN is in the window it is an error: send a > > reset...". Please see RFC 9293 3.10.7.4. Other States. For this > > one, well, it might need more discussion because it regards the > > real implementation? > > > > 5) for the value 8, what case does it refer to? We cannot reply > > with an RST when receiving an RST. > > ... > > > > There are some other reasons labelled "[ThisDocument]" that I > > don't follow, like Not Authorized and Malformed Message. What are > > the exact meanings of them here, I'm curious? > > > > It seems that I miss a lot from the beginning of this draft :( > > > > BTW, if you need me to do anything about this, please let me > > know. I have strong interests in this draft :) > > > > Thanks, > > Jason > > > > > > > > Cheers, > > > Med > > > > > > > -----Message d'origine----- > > > > De : Jason Xing <kerneljasonxing@gmail.com> Envoyé : jeudi 28 > > > > novembre 2024 02:19 À : tcpm@ietf.org Cc : Eric Dumazet > > > > <edumazet@google.com> Objet : [tcpm] About having reset > > reason in > > > > TCP option > > > > > > > > > > > > Hello experts/tcpm-ers :) > > > > > > > > I'd like to make a request to write the TCP reset reason > > feature as > > > > a proposed standard RFC. It's my first time doing this, so if > > there > > > > is something wrong or inappropriate, please let me know. > > > > Thanks in advance. > > > > > > > > The outline of the full draft would be like this: > > > > 1. explicitly define each possible reset reason with > > corresponding > > > > and accurate meaning, say, TCP_LINGER_REASON, which stands > > for the > > > > socket enables the linger option and then triggers the reset > > > > process. > > > > 2. negotiate first during a 3-way handshake, like the SACK > > permitted > > > > field. > > > > 3. If both sides enable this feature on, then let the sending > > side > > > > that enters the reset process and puts the specific reset > > reason > > > > into the TCP option in the RST packet. Then the other side > > will > > > > parse the TCP option from the RST packet it receives and then > > detect > > > > what is going on. Also, users who use tcpdump can get > > benefits from > > > > this without guessing any more. > > > > Default mode could be off. > > > > > > > > MPTCP has already implemented this part in the kernel (please > > see > > > > MPTCP_RST_EUNSPEC), which follows the RFC 8684[1]. > > > > > > > > I think the final format in TCP could be like [2]. > > > > > > > > [1]: > > > > > > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2 > > > > Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc8684%23name- > > mp_tcprst- > > > > reason- > > > > > > codes&data=05%7C02%7Cmohamed.boucadair%40orange.com%7Ca390029e9d2 > > > > > > d4975768008dd0f4ad509%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0% > > > > > > 7C638683536268372165%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRy > > > > > > dWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyf > > > > > > Q%3D%3D%7C0%7C%7C%7C&sdata=o0bZ1HdsPosTzS5TCx1KmxU6k55nzYD5KMfGFh > > > > B2OGY%3D&reserved=0 > > > > [2]: > > > > > > https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2 > > > > Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc8684%23name-subflow- > > > > > > reset&data=05%7C02%7Cmohamed.boucadair%40orange.com%7Ca390029e9d2 > > > > > > d4975768008dd0f4ad509%7C90c7a20af34b40bfbc48b9253b6f5d20%7C0%7C0% > > > > > > 7C638683536268409404%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRy > > > > > > dWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyf > > > > > > Q%3D%3D%7C0%7C%7C%7C&sdata=6TXZou1JJAEVdqwQBRRd%2Bg33gbiUKWEdNhif > > > > N5tEzLQ%3D&reserved=0 > > > > > > > > I've privately discussed with Eric, Neal, Yuchung (which are > > the TCP > > > > maintainers in Linux kernel) before this. Then I'd like to > > hear more > > > > opinions from this mailing list. Any suggestions are always > > > > welcome!!! > > > > > > > > Thanks, > > > > Jason > > > > > > > > _______________________________________________ > > > > tcpm mailing list -- tcpm@ietf.org > > > > To unsubscribe send an email to tcpm-leave@ietf.org > > > > > _________________________________________________________________ > > _____ > > > ______________________________________ > > > Ce message et ses pieces jointes peuvent contenir des > > informations > > > confidentielles ou privilegiees et ne doivent donc pas etre > > diffuses, > > > exploites ou copies sans autorisation. Si vous avez recu ce > > message > > > par erreur, veuillez le signaler a l'expediteur et le detruire > > ainsi que les pieces jointes. Les messages electroniques etant > > susceptibles d'alteration, Orange decline toute responsabilite si > > ce message a ete altere, deforme ou falsifie. Merci. > > > > > > This message and its attachments may contain confidential or > > > privileged information that may be protected by law; they > > should not be distributed, used or copied without authorisation. > > > If you have received this email in error, please notify the > > sender and delete this message and its attachments. > > > As emails may be altered, Orange is not liable for messages > > that have been modified, changed or falsified. > > > Thank you. > > > > ____________________________________________________________________________________________________________ > Ce message et ses pieces jointes peuvent contenir des informations confidentielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les messages electroniques etant susceptibles d'alteration, > Orange decline toute responsabilite si ce message a ete altere, deforme ou falsifie. Merci. > > This message and its attachments may contain confidential or privileged information that may be protected by law; > they should not be distributed, used or copied without authorisation. > If you have received this email in error, please notify the sender and delete this message and its attachments. > As emails may be altered, Orange is not liable for messages that have been modified, changed or falsified. > Thank you.
- [tcpm] About having reset reason in TCP option Jason Xing
- [tcpm] Re: About having reset reason in TCP option mohamed.boucadair
- [tcpm] Re: About having reset reason in TCP option Jason Xing
- [tcpm] Re: About having reset reason in TCP option mohamed.boucadair
- [tcpm] Re: About having reset reason in TCP option Jason Xing
- [tcpm] Re: About having reset reason in TCP option mohamed.boucadair
- [tcpm] Re: About having reset reason in TCP option Jason Xing
- [tcpm] Re: About having reset reason in TCP option Michael Tuexen
- [tcpm] Re: About having reset reason in TCP option Jason Xing
- [tcpm] Re: About having reset reason in TCP option mohamed.boucadair
- [tcpm] Re: About having reset reason in TCP option Michael Tuexen
- [tcpm] Re: About having reset reason in TCP option Lars Eggert
- [tcpm] Re: About having reset reason in TCP option Yuchung Cheng
- [tcpm] Re: About having reset reason in TCP option touch@strayalpha.com
- [tcpm] Re: About having reset reason in TCP option Eric Dumazet
- [tcpm] Re: About having reset reason in TCP option Neal Cardwell
- [tcpm] Re: About having reset reason in TCP option mohamed.boucadair
- [tcpm] Re: About having reset reason in TCP option John Kristoff
- [tcpm] Re: About having reset reason in TCP option mohamed.boucadair
- [tcpm] Re: About having reset reason in TCP option Neal Cardwell
- [tcpm] Re: About having reset reason in TCP option mohamed.boucadair
- [tcpm] Re: About having reset reason in TCP option Rick Jones
- [tcpm] Re: About having reset reason in TCP option mohamed.boucadair