Dear vpp-dev,

Based on below and after discussion with both Miklos and Andrew I have 
implemented new TCP state tracking for endpoint-dependent NAT44.

Most of the behavior is in line with RFC 7857 and 6146 except for VPP 
supporting session reopening while an old session is closed (meaning, both FINs 
have been seen in both directions) by observing SYN packets from both 
directions. We had a chat with Andrew and couldn’t find any reason why this 
would break stuff and agreed that it can only help clients to achieve fast 
connection restart should they wish to do so. Old behavior was to drop all 
traffic in transitory timeout until session was completely removed from NAT 
state.

Proposed code is here:

https://gerrit.fd.io/r/c/vpp/+/34877

A document w/graph describing TCP state tracking is part of the change:

https://gerrit.fd.io/r/c/vpp/+/34877/7/src/plugins/nat/nat44-ed/tcp_conn_track.rst

Thanks,
Klement

From: vpp-dev@lists.fd.io <vpp-dev@lists.fd.io> on behalf of Miklos Tirpak 
<miklos.tir...@emnify.com>
Date: Wednesday, January 5, 2022 at 6:23 PM
To: vpp-dev <vpp-dev@lists.fd.io>
Subject: [vpp-dev] NAT44-ed state machine
Hi,

we have observed couple of problems with the NAT44-ed state machine and would 
appreciate your advice to fix them. In our use case, the clients can have a 
lossy connection, which results in retransmissions. In some cases, these 
retransmissions do not seem to be handled correctly.


  1.  The server retransmits the [SYN, ACK], the state is left non-zero and the 
transitory timer is applied for the entire session.

[SYN] ->
        X <- [SYN, ACK]
           <- [SYN, ACK]
The session state is set to 0 and then to NAT44_SES_O2I_SYN when routing the 
retransmitted packet.
[ACK] ->

As far as I see in https://datatracker.ietf.org/doc/html/rfc7857#section-2, the 
state should be set to established when the SYNs are received from both sides, 
without waiting for the ACK.
  2.  The FIN is retransmitted because of a lost ACK and the 
tcp_closed_timestamp has already been set. VPP drops every packet in this 
closed state.

                  <- [FIN]
[FIN, ACK] ->
  3.                  X <- [ACK]
  4.  VPP starts dropping after this step, but there is no guarantee that the 
ACK will arrive.
[FIN, ACK] ->
[FIN, ACK] ->
...

https://datatracker.ietf.org/doc/html/rfc5382#section-5 says

5.     Once FIN packets are seen in both directions, application data can no

6.     longer be exchanged, but the stacks still need to ensure that the FIN

   packets are received (TCP states: CLOSING and LAST_ACK).

7.
Letting the FINs and ACKs go through would fix this issue.
However, the newer RFC 7857 simplifies the state machine as far as I see, and 
it references RFC 6146 (the state machine the NAT64 plugin also implements).
From https://datatracker.ietf.org/doc/html/rfc6146#section-3.5.2.2:

   *** V6 FIN + V4 FIN RCV ***



   All packets are translated and forwarded.

I am wondering if data can still arrive because of packet re-ordering and 
whether it should be forwarded. Could this be the background of this sentence 
in RFC 6146?

  1.  The client reuses the port within the transitory time.

When a SYN is received that matches a closed session in transitory state, the 
packet is dropped and the connection cannot be established. RFC 5382 mentions a 
similar case as externally initiated connection, and it is implementation 
dependent whether or not to allow that. We have, however seen this in in-2-out 
direction 40 seconds after the previous session has been closed. It would be 
nice to allow this at least in this direction.
The above mentined RFC updates seem to be a contradictional to me, RFC 7857 
simplifies the state machine but does not mention case 3 anymore, for example. 
Would it be better to fix the existing state machine in nat44-ed, or do you 
think it should look similar to the one in nat64 instead?

Thanks,
Miklos
rfc6146 - IETF 
Datatracker<https://datatracker.ietf.org/doc/html/rfc6146#section-3.5.2.2>
RFC 6146 Stateful NAT64 April 2011 1.Introduction This document specifies 
stateful NAT64, a mechanism for IPv4-IPv6 transition and IPv4-IPv6 coexistence. 
Together with DNS64 [], these two mechanisms allow an IPv6-only client to 
initiate communications to an IPv4-only server.They also enable peer-to-peer 
communication between an IPv4 and an IPv6 node, where the communication can be 
initiated ...
datatracker.ietf.org





rfc5382 - IETF 
Datatracker<https://datatracker.ietf.org/doc/html/rfc5382#section-5>
RFC 5382 NAT TCP Requirements October 2008 Recently, many techniques have been 
devised to make peer-to-peer TCP applications work across NATs. [], [], and [] 
describe Unilateral Self-Address Fixing (UNSAF) mechanisms that allow 
peer-to-peer applications to establish TCP through NATsThese approaches require 
only endpoint applications to be modified and work with standards compliant OS 
stacks.
datatracker.ietf.org








-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#20701): https://lists.fd.io/g/vpp-dev/message/20701
Mute This Topic: https://lists.fd.io/mt/88218698/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to