TCP Congestion Control with a Misbehaving Receiver - PowerPoint PPT Presentation

1 / 19
About This Presentation
Title:

TCP Congestion Control with a Misbehaving Receiver

Description:

Fast Recovery. One Packet sent for each DupACK. Bounded by Receiver Window ... Modified Linux 2.2.10 TCP stack. ACK division 24 lines. DupACK spoofing 11 lines ... – PowerPoint PPT presentation

Number of Views:119
Avg rating:3.0/5.0
Slides: 20
Provided by: cseW
Category:

less

Transcript and Presenter's Notes

Title: TCP Congestion Control with a Misbehaving Receiver


1
TCP Congestion Control with a Misbehaving Receiver
ACM SIGCOMM CCR Oct 1999
Stefan Savage Neal Cardwell David Wetherall Tom
Anderson
Paper by
Discussion Leader
Christoph Jechlitschek
Presented by
Manfred Georg
2
Overview
  • RFC 2581
  • Attacks
  • ACK division
  • DupACK spoofing
  • Optimistic ACKing
  • TCP Daytona
  • Robust Protocol Design
  • Conclusion

3
RFC 2581
  • TCP Specifications
  • Based on mutual trust
  • Ambiguous
  • Security holes

4
ACK division
  • cwnd grows with each ACK received
  • Attack
  • For each received packet,
  • send many ACKs each for a
  • piece of the packet.

5
ACK division
6
DupACK spoofing
  • Fast Recovery
  • One Packet sent for each DupACK
  • Bounded by Receiver Window

7
DupACK spoofing
8
Optimistic ACKing
  • Preemptively acknowledge packets
  • Reduce RTT
  • Conceal losses
  • Possible data loss

9
Optimistic ACKing
10
TCP Daytona
  • Modified Linux 2.2.10 TCP stack
  • ACK division 24 lines
  • DupACK spoofing 11 lines
  • Optimistic ACKing 45 lines

11
TCP Daytona
ACK division
12
TCP Daytona
DupACK
13
TCP Daytona
Optimistic ACKing
14
Vulnerable OS
15
Robust Protocol Design
  • Principle 2
  • What is an ACK ?
  • Byte or segment granularity?

The conditions for a message to be acted upon
should be clearly set out.
16
Robust Protocol Design
  • Principle 1
  • What is a DupACK?
  • Meaning is context dependent
  • Use nonce to establish context

Every message should say what it means the
interpretation of the message should depend only
on its content.
17
Robust Protocol Design
  • Principle 3
  • Segment not required to create ACK
  • Cumulative Nonce

If sender identity is essential to the meaning of
a message, explicitly include it in the message.
18
Robust Protocol Design
19
Conclusion
  • TCP grew in cooperation
  • Internet uncooperative
  • Security holes
  • (Easy) fixes
  • Consistent granularity
  • Cumulative nonce
  • Robust protocol design
Write a Comment
User Comments (0)
About PowerShow.com