Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2068816.2068834acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Is it still possible to extend TCP?

Published:02 November 2011Publication History

ABSTRACT

We've known for a while that the Internet has ossified as a result of the race to optimize existing applications or enhance security. NATs, performance-enhancing-proxies,firewalls and traffic normalizers are only a few of the middleboxes that are deployed in the network and look beyond the IP header to do their job. IP itself can't be extended because "IP options are not an option". Is the same true for TCP?

In this paper we develop a measurement methodology for evaluating middlebox behavior relating to TCP extensions and present the results of measurements conducted from multiple vantage points. The short answer is that we can still extend TCP, but extensions' design is very constrained as it needs to take into account prevalent middlebox behaviors. For instance, absolute sequence numbers cannot be embedded in options, as middleboxes can rewrite ISN and preserve undefined options. Sequence numbering also must be consistent for a TCP connection, because many middleboxes only allow through contiguous flows.

We used these findings to analyze three proposed extensions to TCP. We find that MPTCP is likely to work correctly in the Internet or fallback to regular TCP. TcpCrypt seems ready to be deployed, however it is fragile if resegmentation does happen---for instance with hardware offload. Finally, TCP extended options in its current form is not safe to deploy.

References

  1. M. Allman. On the Performance of Middleboxes. ACM IMC, 35(2):307--312, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Bakre and B. Badrinath. I-TCP: Indirect TCP for Mobile Hosts. In Proc. IEEE ICDCS, pages 136--143, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. Balakrishnan, S. Seshan, E. Amir, and R. Katz. Improving TCP/IP Performance over Wireless Networks. In Proc. ACM MOBICOM, pages 2--11, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Bittau, D. Boneh, M. Hamburg, M. Handley, D. Mazieres, and Q. Slack. Cryptographic protection of TCP Streams (tcpcrypt). draft-bittau-tcp-crypt-00.txt, July 2010.Google ScholarGoogle Scholar
  5. A. Bittau, M. Hamburg, M. Handley, D. Mazieres, and D. Boneh. The case for ubiquitous transport-level encryption. In Proc. USENIX Security Symposium, Aug 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Carpenter and S. Brim. Middleboxes: Taxonomy and Issues. RFC 3234, Feb. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Chakravorty, S. Katti, J. Crowcroft, and I. Pratt. Flow Aggregation for Enhanced TCP over Wide-Area Wireless. In Proc. IEEE INFOCOM, pages 1754--1764, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  8. Dataset for Middlebox Measurement. URL http://web.sfc.wide.ad.jp/ micchie/mbox-dataset.html.Google ScholarGoogle Scholar
  9. W. Eddy and A. Langley. Extending the Space Available for TCP Options. Internet Draft, Jul. 2008.Google ScholarGoogle Scholar
  10. R. Fonseca, G. Porter, R. Katz, S. Shenker, and I. Stoica. IP options are not an option. Tech. Rep. UCB/EECS- 2005--24, 2005.Google ScholarGoogle Scholar
  11. A. Ford, C. Raiciu, M. Handley, S. Barre, and J. Iyengar. Architectural guidelines for multipath TCP development. RFC 6182, Mar. 2011.Google ScholarGoogle Scholar
  12. A. Ford, C. Raiciu, M. Handley, and O. Bonaventure. TCP Extensions for Multipath Operation with Multiple Addresses. Internet Draft, July. 2011.Google ScholarGoogle Scholar
  13. B. Ford, P. Srisuresh, and D. Kegel. Peer-to-Peer Communication Across Network Address Translators. USENIX ATC, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. F. Gont and A. Yourtchenko. On the Implementation of the TCP Urgent Mechanism. RFC 6093, Jan. 2011.Google ScholarGoogle Scholar
  15. M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. In Proc. USENIX Security Symposium, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Hätõnen, A. Nyrhinen, L. Eggert, S. Strowes, P. Sarolahti, and M. Kojo. An Experimental Study of Home Gateway. ACM IMC, pages 260--266, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. V. Jacobson, R. Braden, and D. Borman. TCP Extensions for High Performance. RFC 1323, May. 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J.Border, M. Kojo, J. Griner, G. Montenegro, and Z. Shelby. Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations. RFC 3135, Jun. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Re: {tcpm} Extending the TCP option space - yet another approach. http://www.ietf.org/mail-archive/web/tcpm/current/msg06481.html.Google ScholarGoogle Scholar
  20. M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow. TCP Selective Acknowledgment Options. RFC 2018, Oct. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Medina, M. Allman, and S. Floyd. Measuring the Evolution of Transport Protocols in the Internet. ACM CCR, 35(2):37--52, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. P. Srisuresh and M. Holdrege. IP Network Address Translator (NAT) Terminology and Considerations. RFC 2663, Aug. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Padhye and S. Floyd. On Inferring TCP Behavior. In ACM SIGCOMM, pages 287--298, Oct. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. V. Paxson. End-to-End Internet Packet Dynamics. In Proc. ACM SIGCOMM, pages 139--152, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. L. Popa, A. Ghodsi, and I. Stoica. HTTP as the Narrow Waist of the Future Internet. In Proc. ACM Hotnets, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. Savage. Sting: a TCP-based Network Measurement Tool. In USENIX USITS, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. S. Savage, N. Cardwell, D. Wetherall, and T. Anderson. TCP Congestion Control with a Misbehaving Receiver. ACM CCR, 29(5):71--78, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. R. Stewart, M. Ramalho, and et al. Stream Control Transmission Protocol (SCTP) Partial Reliability Extension. RFC 3758, May. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. D. Watson, M. Smart, G. R. Malan, and F. Jahanian. Protocol Scrubbing: Network Security Through Transparent Flow Modification. IEEE/ACM ToN, 12(2):261--273, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. D. Wischik, C. Raiciu, A. Greenhalgh, and M. Handley. Design, implementation and evaluation of congestion control for multipath TCP. In Proc. USENIX NSDI, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Is it still possible to extend TCP?

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IMC '11: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
          November 2011
          612 pages
          ISBN:9781450310130
          DOI:10.1145/2068816

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 November 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate277of1,083submissions,26%

          Upcoming Conference

          IMC '24
          ACM Internet Measurement Conference
          November 4 - 6, 2024
          Madrid , AA , Spain

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader