Skip to main content

TCP User Timeout Option
draft-ietf-tcpm-tcp-uto-11

Revision differences

Document history

Date Rev. By Action
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Chris Newman
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Pasi Eronen
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Dan Romascanu
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Ronald Bonica
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2009-01-27
11 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2009-01-27
11 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2009-01-27
11 (System) IANA Action state changed to In Progress from Waiting on Authors
2009-01-26
11 (System) IANA Action state changed to Waiting on Authors from In Progress
2009-01-26
11 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2009-01-26
11 (System) IANA Action state changed to In Progress
2009-01-26
11 Amy Vezza IESG state changed to Approved-announcement sent
2009-01-26
11 Amy Vezza IESG has approved the document
2009-01-26
11 Amy Vezza Closed "Approve" ballot
2009-01-26
11 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2009-01-26
11 Pasi Eronen [Ballot Position Update] Position for Pasi Eronen has been changed to No Objection from Discuss by Pasi Eronen
2009-01-22
11 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2009-01-22
11 Chris Newman [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman
2009-01-22
11 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss by Dan Romascanu
2009-01-22
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-01-22
11 (System) New version available: draft-ietf-tcpm-tcp-uto-11.txt
2008-12-19
11 Ron Bonica [Ballot Position Update] Position for Ron Bonica has been changed to No Objection from Discuss by Ron Bonica
2008-12-19
11 (System) Removed from agenda for telechat - 2008-12-18
2008-12-18
11 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Jeffrey Hutzelman.
2008-12-18
11 Cindy Morgan State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan
2008-12-18
11 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2008-12-18
11 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2008-12-18
11 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2008-12-18
11 Ross Callon
[Ballot comment]
In the security considerations section, where the document mentions MD5, it should also mention TCP-AO as another option (with an informative reference to …
[Ballot comment]
In the security considerations section, where the document mentions MD5, it should also mention TCP-AO as another option (with an informative reference to TCP-AO).
2008-12-18
11 Ron Bonica
[Ballot discuss]
This may be a very short-lived discuss. In the security section, you recommend the use of IPSEC or TCP-MD5. AFAIK, TCP-MD5 is rarely …
[Ballot discuss]
This may be a very short-lived discuss. In the security section, you recommend the use of IPSEC or TCP-MD5. AFAIK, TCP-MD5 is rarely implemented on boxes that aren't routers. Wouldn't you be better off recommending TCP-AO?
2008-12-18
11 Ron Bonica
[Ballot discuss]
This may be a very short-lived discuss. In the security section, you recommend the use of IPSEC or TCP-MD5. AFAIK, TCP-MD5 is rarely …
[Ballot discuss]
This may be a very short-lived discuss. In the security section, you recommend the use of IPSEC or TCP-MD5. AFAIK, TCP-MD5 is rarely implemented on boxes that aren't routers. Wouldn't you be better off recommending TCP-AO?
2008-12-18
11 Ron Bonica [Ballot Position Update] New position, Discuss, has been recorded by Ron Bonica
2008-12-18
11 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2008-12-17
11 Cullen Jennings
[Ballot comment]
I think this is great (as long as it works through firewalls and nats - and support that part of Pasi discuss) but …
[Ballot comment]
I think this is great (as long as it works through firewalls and nats - and support that part of Pasi discuss) but I think that it has to be exposed to apps and support that parts of Chris' discuss.
2008-12-17
11 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2008-12-17
11 Tim Polk
[Ballot comment]
I support Chris's and Pasi's discusses.  The failure rate with middleboxes could present a significant problem unless the TCP stack is clever enough …
[Ballot comment]
I support Chris's and Pasi's discusses.  The failure rate with middleboxes could present a significant problem unless the TCP stack is clever enough to establish new connections
without using uto after failure.  The onus is clearly on the TCP stack to adjust since the
"communication of timeout information between the TCP stack and application software
has been so poor in the past" to quote Chris's discuss.
2008-12-17
11 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2008-12-17
11 Dan Romascanu
[Ballot discuss]
The document is missing any manageability or operational considerations. Although section 3 mentions that the UTO can be enabled either on a per-connection …
[Ballot discuss]
The document is missing any manageability or operational considerations. Although section 3 mentions that the UTO can be enabled either on a per-connection basis, or controlled by a system-wide setting there is no further indication what this means from the point of view of system opertors. There is also no indication about performance measurement, especially on the light of the fact that reliability issues are a concern and are discussed. Last would the MIB modules defined in RFC 4022 or RFC 4898 need to be extended to cover this new option?
2008-12-17
11 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu
2008-12-15
11 Pasi Eronen
[Ballot discuss]
I have reviewed draft-ietf-tcpm-tcp-uto-10. Overall, the document
looks good, but I have one concern that I'd like to discuss before
recommending approval of …
[Ballot discuss]
I have reviewed draft-ietf-tcpm-tcp-uto-10. Overall, the document
looks good, but I have one concern that I'd like to discuss before
recommending approval of the document:

If the data cited in Section 4.1 is a reasonable approximation of
reality -- and 3% of TCP connections would fail -- doesn't this mean
that either (a) no popular OS or popular application (such as email,
IM, or SSH client -- all of which would potentially benefit from
longer timeouts) can enable this by default, or (b) it has to
implement some kind of recovery logic (if using UTO fails, disable it
and establish new connection without UTO). (Totally failing for 3% of
users does not sound like a realistic option for things intended
to be used by "ordinary users" -- instead of, say, network engineers
for interplanetary stuff.)

If this is the case, it should be mentioned in e.g. Section 4.1,
possibly sketching how the recovery logic would work (so each app
doesn't have to reinvent it, possible badly).
2008-12-15
11 Chris Newman
[Ballot discuss]
Is the intention to have this be used only by operating system software?
Or should this be made visible to applications?  If the …
[Ballot discuss]
Is the intention to have this be used only by operating system software?
Or should this be made visible to applications?  If the latter is the
case, is there work in progress to define the identifiers and
structures that would be used with setsockopt() so this would have a
chance of deploying?

Applications sometimes have information about the desirability of long
lived connections.  For example, HTTP wouldn't benefit from longer user
timeouts, IMAP+TLS benefits quite a bit, while SSH could benefit a
great deal (especially if the user has spent time setting up multiple
data tunnels).  But as we've seen with the IPv6 mess prior to
getaddrinfo, if the socket extension identifiers/structures aren't
nailed down early deployment is slowed greatly when communication
between the transport and application layers is needed.

Also, because communication of timeout information between the TCP
stack and application software has been so poor in the past, quality
server applications will put sockets in non-blocking mode and
implement their own timeouts with select/poll or equivalent and shut
down the socket.  If applications have no way to communicate this to
the TCP stack, the stack could negotiate a timeout longer than the
application timeout and thus create a false expectation for connection
retention.
2008-12-15
11 Pasi Eronen [Ballot Position Update] New position, Discuss, has been recorded by Pasi Eronen
2008-12-15
11 Chris Newman [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman
2008-12-12
11 Russ Housley
[Ballot discuss]
In the Gen-ART Review from Scott Brim, a significant question was
  raised, and the WG has not provided an answer.  Scott asked: …
[Ballot discuss]
In the Gen-ART Review from Scott Brim, a significant question was
  raised, and the WG has not provided an answer.  Scott asked:
  >
  > Since a UTO can apparently be sent at any time, what happens
  > if a UTO is received that shortens the timeout and there are
  > unacknowledged packets that are already beyond the new timeout
  > value?
2008-12-12
11 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2008-12-10
11 Lars Eggert [Ballot Position Update] New position, Recuse, has been recorded by Lars Eggert
2008-12-01
11 Magnus Westerlund [Ballot Position Update] New position, Yes, has been recorded for Magnus Westerlund
2008-12-01
11 Magnus Westerlund Ballot has been issued by Magnus Westerlund
2008-12-01
11 Magnus Westerlund Created "Approve" ballot
2008-12-01
11 Magnus Westerlund Placed on agenda for telechat - 2008-12-18 by Magnus Westerlund
2008-12-01
11 Magnus Westerlund State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Magnus Westerlund
2008-12-01
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2008-12-01
10 (System) New version available: draft-ietf-tcpm-tcp-uto-10.txt
2008-11-27
11 Magnus Westerlund State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead by Magnus Westerlund
2008-11-25
11 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2008-11-24
11 Amanda Baber
IANA Last Call comments:

Upon approval of this document, the IANA will make the following
assignment in the "Transmission Control Protocol (TCP) Option
Numbers" registry …
IANA Last Call comments:

Upon approval of this document, the IANA will make the following
assignment in the "Transmission Control Protocol (TCP) Option
Numbers" registry at
http://www.iana.org/assignments/tcp-parameters/

Kind Length Meaning Reference
------ ------ ------------------------------------- ---------
[tbd] 4 User Timeout Option [RFC-tcpm-tcp-uto-09]
2008-11-11
11 Samuel Weiler Request for Last Call review by SECDIR is assigned to Jeffrey Hutzelman
2008-11-11
11 Samuel Weiler Request for Last Call review by SECDIR is assigned to Jeffrey Hutzelman
2008-11-05
11 Amy Vezza Last call sent
2008-11-05
11 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2008-11-05
11 Magnus Westerlund State Changes to Last Call Requested from AD Evaluation::External Party by Magnus Westerlund
2008-11-05
11 Magnus Westerlund Last Call was requested by Magnus Westerlund
2008-10-15
11 Magnus Westerlund State Changes to AD Evaluation::External Party from AD Evaluation by Magnus Westerlund
2008-10-15
11 Magnus Westerlund Awaiting clarification from WG chairs on intended status. Otherwise ready for IETF last call.
2008-10-13
11 Magnus Westerlund Intended Status has been changed to Proposed Standard from Experimental
2008-10-13
11 Magnus Westerlund State Changes to AD Evaluation from Last Call Requested by Magnus Westerlund
2008-10-13
11 Magnus Westerlund State Changes to Last Call Requested from AD Evaluation by Magnus Westerlund
2008-10-13
11 Magnus Westerlund Last Call was requested by Magnus Westerlund
2008-10-13
11 (System) Ballot writeup text was added
2008-10-13
11 (System) Last call text was added
2008-10-13
11 (System) Ballot approval text was added
2008-10-13
11 Magnus Westerlund State Changes to AD Evaluation from Publication Requested by Magnus Westerlund
2008-09-25
11 Magnus Westerlund
draft-ietf-tcpm-tcp-uto-08.txt

> >    (1.a)  Who is the Document Shepherd for this document?  Has the
> >          Document Shepherd personally reviewed …
draft-ietf-tcpm-tcp-uto-08.txt

> >    (1.a)  Who is the Document Shepherd for this document?  Has the
> >          Document Shepherd personally reviewed this version of
> >          the document and, in particular, does he or she believe
> >          this version is ready for forwarding to the IESG for
> >          publication?

Mark Allman (mallman@icir.org) (TCPM co-chair)

I have read the document and believe it is ready for publication.

> >    (1.b)  Has the document had adequate review both from key WG members
> >          and from key non-WG members?  Does the Document Shepherd have
> >          any concerns about the depth or breadth of the reviews that
> >          have been performed?

The document has enjoyed much review from the TCPM WG.

> >    (1.c)  Does the Document Shepherd have concerns that the document
> >          needs more review from a particular or broader perspective,
> >          e.g., security, operational complexity, someone familiar with
> >          AAA, internationalization or XML?

No concerns.

> >    (1.d)  Does the Document Shepherd have any specific concerns or
> >          issues with this document that the Responsible Area Director
> >          and/or the IESG should be aware of?  For example, perhaps he
> >          or she is uncomfortable with certain parts of the document, or
> >          has concerns whether there really is a need for it.  In any
> >          event, if the WG has discussed those issues and has indicated
> >          that it still wishes to advance the document, detail those
> >          concerns here.  Has an IPR disclosure related to this document
> >          been filed?  If so, please include a reference to the
> >          disclosure and summarize the WG discussion and conclusion on
> >          this issue.

This document involves no IPR disclosure.

The document shepherd has no specific concerns about the document.

> >    (1.e)  How solid is the WG consensus behind this document?  Does it
> >          represent the strong concurrence of a few individuals, with
> >          others being silent, or does the WG as a whole understand and
> >          agree with it?

The WG consensus on this document is broad and solid.

> >    (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
> >          discontent?  If so, please summarise the areas of conflict in
> >          separate email messages to the Responsible Area Director.  (It
> >          should be in a separate email because this questionnaire is
> >          entered into the ID Tracker.)

We are aware of no reasons this document would be appealed or anyone
who is overly unhappy with it.

> >    (1.g)  Has the Document Shepherd personally verified that the
> >          document satisfies all ID nits?  (See
> >          http://www.ietf.org/ID-Checklist.html and
> >          http://tools.ietf.org/tools/idnits/).  Boilerplate checks are
> >          not enough; this check needs to be thorough.  Has the document
> >          met all formal review criteria it needs to, such as the MIB
> >          Doctor, media type and URI type reviews?

This document does not need MIB or URI reviews.

The document passes 'idnits'.

> >    (1.h)  Has the document split its references into normative and
> >          informative?  Are there normative references to documents that
> >          are not ready for advancement or are otherwise in an unclear
> >          state?  If such normative references exist, what is the
> >          strategy for their completion?  Are there normative references
> >          that are downward references, as described in [RFC3967]?  If
> >          so, list these downward references to support the Area
> >          Director in the Last Call procedure for them [RFC3967].

The references have been split into 'normative' and 'non-normative'.

The normative references are all published RFCs.

> >    (1.i)  Has the Document Shepherd verified that the document IANA
> >          consideration section exists and is consistent with the body
> >          of the document?  If the document specifies protocol
> >          extensions, are reservations requested in appropriate IANA
> >          registries?  Are the IANA registries clearly identified?  If
> >          the document creates a new registry, does it define the
> >          proposed initial contents of the registry and an allocation
> >          procedure for future registrations?  Does it suggest a
> >          reasonable name for the new registry?  See [RFC2434].  If the
> >          document describes an Expert Review process has Shepherd
> >          conferred with the Responsible Area Director so that the IESG
> >          can appoint the needed Expert during the IESG Evaluation?

The document requests a new TCP option number from IANA and includes
this in an IANA considerations section (which is consistent with the
rest of the document).

> >    (1.j)  Has the Document Shepherd verified that sections of the
> >          document that are written in a formal language, such as XML
> >          code, BNF rules, MIB definitions, etc., validate correctly in
> >          an automated checker?

N/A

> >    (1.k)  The IESG approval announcement includes a Document
> >          Announcement Write-Up.  Please provide such a Document
> >          Announcement Write-Up?  Recent examples can be found in the
> >          "Action" announcements for approved documents.  The approval
> >          announcement contains the following sections:
> >
> >          Technical Summary
> >              Relevant content can frequently be found in the abstract
> >              and/or introduction of the document.  If not, this may be
> >              an indication that there are deficiencies in the abstract
> >              or introduction.
> >
> >          Working Group Summary
> >              Was there anything in WG process that is worth noting?  For
> >              example, was there controversy about particular points or
> >              were there decisions where the consensus was particularly
> >              rough?
> >
> >          Document Quality
> >              Are there existing implementations of the protocol?  Have a
> >              significant number of vendors indicated their plan to
> >              implement the specification?  Are there any reviewers that
> >              merit special mention as having done a thorough review,
> >              e.g., one that resulted in important changes or a
> >              conclusion that the document had no substantive issues?  If
> >              there was a MIB Doctor, Media Type or other expert review,
> >              what was its course (briefly)?  In the case of a Media Type
> >              review, on what date was the request posted?

Technical Summary:

    This document calls for an option to all TCP endpoints to
    request peers to set the user-timeout to a particular value.
    The motivation behind this option is hosts that understand that
    they will be unavailable for a lengthy period of time and can
    thus inform their peer of this phenomenon such that the peer can
    prevent the normal connection aborting procedures from reaping
    the connection.  The information is advisory and therefore the
    peer is still able to abort the connection (e.g., in times of
    resource contention).

Working Group Summary

    Given that the information exchanged is advisory, the TCPM WG
    has consensus that this option is perfectly reasonable.

Document Quality

    The document was reviewed for quality by a large number of TCPM
    WG members.
2008-09-25
11 Magnus Westerlund State Changes to Publication Requested from Dead by Magnus Westerlund
2008-06-13
09 (System) New version available: draft-ietf-tcpm-tcp-uto-09.txt
2008-05-22
11 (System) State Changes to Dead from AD is watching by system
2008-05-22
11 (System) Document has expired
2007-11-19
08 (System) New version available: draft-ietf-tcpm-tcp-uto-08.txt
2007-11-13
07 (System) New version available: draft-ietf-tcpm-tcp-uto-07.txt
2007-06-11
06 (System) New version available: draft-ietf-tcpm-tcp-uto-06.txt
2007-03-08
05 (System) New version available: draft-ietf-tcpm-tcp-uto-05.txt
2006-11-09
11 Magnus Westerlund Intended Status has been changed to Experimental from Proposed Standard
2006-10-25
04 (System) New version available: draft-ietf-tcpm-tcp-uto-04.txt
2006-07-20
11 (System) State Changes to AD is watching from Dead by system
2006-07-19
03 (System) New version available: draft-ietf-tcpm-tcp-uto-03.txt
2006-07-19
02 (System) New version available: draft-ietf-tcpm-tcp-uto-02.txt
2006-05-05
11 (System) State Changes to Dead from AD is watching by system
2006-05-05
11 (System) Document has expired
2006-03-28
11 Lars Eggert Assigned to Magnus, because I am a co-author.
2006-03-28
11 Lars Eggert Shepherding AD has been changed to Magnus Westerlund from Allison Mankin
2006-03-19
11 Magnus Westerlund Draft Added by Magnus Westerlund in state AD is watching
2005-07-19
01 (System) New version available: draft-ietf-tcpm-tcp-uto-01.txt
2005-05-24
00 (System) New version available: draft-ietf-tcpm-tcp-uto-00.txt