Re: [tsvwg] SCTP RANDOM parameter in case of INIT collision

Michael Tuexen <tuexen@fh-muenster.de> Fri, 01 March 2019 13:48 UTC

Return-Path: <tuexen@fh-muenster.de>
X-Original-To: tsvwg@ietfa.amsl.com
Delivered-To: tsvwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 659F8124BAA for <tsvwg@ietfa.amsl.com>; Fri, 1 Mar 2019 05:48:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b6zdWmW75V-X for <tsvwg@ietfa.amsl.com>; Fri, 1 Mar 2019 05:48:40 -0800 (PST)
Received: from drew.franken.de (drew.ipv6.franken.de [IPv6:2001:638:a02:a001:20e:cff:fe4a:feaa]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4370E130E73 for <tsvwg@ietf.org>; Fri, 1 Mar 2019 05:48:40 -0800 (PST)
Received: from [192.168.1.9] (p57BB42E6.dip0.t-ipconnect.de [87.187.66.230]) (Authenticated sender: macmic) by mail-n.franken.de (Postfix) with ESMTPSA id 6A8D5721E281E; Fri, 1 Mar 2019 14:48:36 +0100 (CET)
From: Michael Tuexen <tuexen@fh-muenster.de>
Message-Id: <05B1E876-F942-4AF6-8DDF-FF77295A2D49@fh-muenster.de>
Content-Type: multipart/signed; boundary="Apple-Mail=_B9B501D7-71F3-42A4-82BF-FD58B4B13F76"; protocol="application/pkcs7-signature"; micalg="sha-256"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
Date: Fri, 01 Mar 2019 14:48:35 +0100
In-Reply-To: <588a6ab909d14fd78ca8715aec951954@mera.ru>
Cc: "tsvwg@ietf.org" <tsvwg@ietf.org>
To: "Proshin, Maksim" <mproshin@mera.ru>
References: <2b50678935f34e25aff2f6b21eca9374@mera.ru> <997A9DE0-5AD2-4991-8D09-7F1C00072929@fh-muenster.de> <588a6ab909d14fd78ca8715aec951954@mera.ru>
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tsvwg/GyTOrkCTlrFTStUdI7dX4Z11H9E>
Subject: Re: [tsvwg] SCTP RANDOM parameter in case of INIT collision
X-BeenThere: tsvwg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Transport Area Working Group <tsvwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tsvwg/>
List-Post: <mailto:tsvwg@ietf.org>
List-Help: <mailto:tsvwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tsvwg>, <mailto:tsvwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Mar 2019 13:48:43 -0000

> On 1. Mar 2019, at 14:46, Proshin, Maksim <mproshin@mera.ru> wrote:
> 
> Hi Michael,
> 
> Yes, it seems lksctp always puts a new random number into INIT ACK when it receives INIT. 
I see. Did you also test with FreeBSD? However, it seems to be a motivation to add SCTP-AUTH
support to packetdrill...

Best regards
Michael
> Thanks for your prompt response!
> 
> BR, Maxim
> 
> -----Original Message-----
> From: Michael Tuexen [mailto:tuexen@fh-muenster.de] 
> Sent: Friday, March 1, 2019 16:29
> To: Proshin, Maksim <mproshin@mera.ru>
> Cc: tsvwg@ietf.org
> Subject: Re: [tsvwg] SCTP RANDOM parameter in case of INIT collision
> 
> 
> 
>> On 1. Mar 2019, at 14:05, Proshin, Maksim <mproshin@mera.ru> wrote:
>> 
>> Hi Michael, tsvwg,
>> 
>> I have a doubt about the RANDOM parameter from RFC 4895 which was caused by interoperability tests with different SCTP implementations.
>> RFC 4895 has the following text in Section 6.1:
>>   In case
>>   of INIT collision, the rules governing the handling of this Random
>>   Number follow the same pattern as those for the Verification Tag, as
>>   explained in Section 5.2.4 of RFC 2960 [5].  Therefore, each endpoint
>>   knows its own Random Number and the peer's Random Number after the
>>   association has been established.
>> 
>> and RFC 4960 which obsoletes RFC 2960 has the following statement in Section 5.2.1:
>> 
>>   Upon receipt of an INIT in the COOKIE-WAIT state, an endpoint MUST
>>   respond with an INIT ACK using the same parameters it sent in its
>>   original INIT chunk (including its Initiate Tag, unchanged).
>> 
>> Based on those 2 statements I assume that SCTP must always respond with the same Random Number when it sends INIT ACK in response to INIT received in the COOKIE-WAIT state. Is my understanding correct?    
> Yes, I would say so.
> 
> Is an open source implementation not following these rules?
> 
> Best regards
> Michael
>> 
>> BR, Maxim
>