<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tcpm-rst-diagnostic-payload-02" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="RST Diagnostic Payload">TCP RST Diagnostic Payload</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tcpm-rst-diagnostic-payload-02"/>
    <author fullname="Mohamed Boucadair">
      <organization>Orange</organization>
      <address>
        <email>mohamed.boucadair@orange.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <country>India</country>
        </postal>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Jason Xing">
      <organization>Tencent</organization>
      <address>
        <email>kerneljasonxing@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="05"/>
    <area/>
    <workgroup>TCP Maintenance and Minor Extensions</workgroup>
    <keyword>service diagnostic</keyword>
    <keyword>service function</keyword>
    <keyword>troubelshooting</keyword>
    <keyword>diagnostic</keyword>
    <keyword>serviceability</keyword>
    <keyword>root cause</keyword>
    <keyword>anomaly</keyword>
    <abstract>
      <?line 61?>
<t>This document specifies an experimental diagnostic payload format returned in TCP
   RST segments. Such payloads are used to share with an endpoint the
   reasons for which a TCP connection has been reset.  Sharing this
   information is meant to ease diagnostic and troubleshooting.</t>
      <t>This specification builds on provisions that are already present in RFC 9293 "Transmission Control Protocol (TCP)".
   As such, this document does not require any change to RFC 9293.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    TCP Maintenance and Minor Extensions  mailing list (tcpm@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tcpm/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/boucadair/draft-boucadair-tcpm-rst-diagnostic-payload"/>.</t>
    </note>
  </front>
  <middle>
    <?line 70?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>A TCP connection <xref target="RFC9293"/> can be reset by a peer for various
   reasons, e.g., received data does not correspond to an active
   connection.  Also, a TCP connection can be reset by an on-path
   service function (e.g., Carrier Grade NAT (CGN) <xref target="RFC6888"/>, NAT64
   <xref target="RFC6146"/>, or firewall) for several reasons.  Typically, a Network
   Address Translator (NAT) function can generate an RST segment to
   notify an endpoint upon the expiry of the lifetime of the
   corresponding mapping entry or because an RST segment was received
   from a peer (<xref section="2.2" sectionFormat="of" target="RFC7857"/>).</t>
      <t>A TCP connection can also be
   closed by a user or an application at any time.  However, the peer
   that receives an RST segment does not have any hint about the reason
   that led to terminating the connection.  Likewise, the application
   that relies upon such a TCP connection may not easily identify the
   reason for the connection reset. Troubleshooting such events at
   the remote side of the connection that receives the RST segment may
   not be trivial.</t>
      <t>This document fills this void by specifying an experimental format of the
   diagnostic payload returned in an RST segment. This design is
   backward compatible with TCP as further clarified in <xref target="bc"/>.</t>
      <t>The generic procedure for processing an RST segment is specified in
   <xref section="3.5.3" sectionFormat="of" target="RFC9293"/>. Only the deviations from that procedure
   to insert and validate a diagnostic payload is provided in <xref target="payload"/>.</t>
      <t>This document specifies the format and the overall approach to ease
   maintaining the list of codes while allowing for adding new codes as
   needed in the future and accommodating any existing vendor-specific
   codes.  An initial version of error codes is available in <xref target="initial"/>.
   However, the authoritative source to retrieve the full list of error
   codes is the IANA-maintained registry (<xref target="causes"/>).</t>
      <t><xref target="examples"/> provides a set of examples to illustrate the use of TCP RST
   diagnostic payloads.</t>
      <t><xref target="socket-api"/> provides an informative discussion of socket API considerations.
   Implementation and experimental validation are detailed in <xref target="sec-validation"/>.</t>
      <t>Experiment goals are listed in <xref target="sec-goals"/>.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>This document makes use of the terms defined in <xref section="4" sectionFormat="of" target="RFC9293"/>.</t>
      <t>SEG.LEN is defined in <xref section="3.3.1" sectionFormat="of" target="RFC9293"/>. SHLD-2 is defined in <xref section="3.5.3" sectionFormat="of" target="RFC9293"/> while <bcp14>MUST</bcp14>-12 is defined in <xref section="3.6" sectionFormat="of" target="RFC9293"/>.</t>
      <t>This document uses the following terms:</t>
      <dl>
        <dt>RST diagnostic payload:</dt>
        <dd>
          <t>The payload of an RST message that conveys diagnostic data.</t>
        </dd>
        <dt>RST with diagnostic payload:</dt>
        <dd>
          <t>An RST segment that includes diagnostic payload.</t>
        </dd>
        <dt>Reset reason information:</dt>
        <dd>
          <t>Refers to a reset reason code and a Private Enterprise Number (PEN). The PEN can be omitted if it is set to 0.</t>
        </dd>
      </dl>
    </section>
    <section anchor="sec-goals">
      <name>Experiment Description &amp; Goals</name>
      <t>The main objective of this experiment is to have a common format
  of RST diagnostic payload that would be used as basis for consistent
  testing and evaluation in a variety of deployment contexts
  (Internet, data centers, application clients/servers provided and managed by the same entity,
  clients and servers software owned by distinct entities, etc.).</t>
      <t>Experiments reports are encouraged to share the main lessons
  learned in these experimentations. Specifically, the following items are of interest:</t>
      <dl>
        <dt>Delivery and on-path device interference:</dt>
        <dd>
          <t>Identify and share issues (or lack thereof) related to the delivery of RST with diagnostic payload.</t>
        </dd>
        <dt>CPU/load impact:</dt>
        <dd>
          <t>Assess CPU/load impact (or lack thereof) of handling RSTs, including when a mix of RSTs with and without diagnostic payload are sent by an endpoint.</t>
        </dd>
        <dt>Standard reset reasons:</dt>
        <dd>
          <t>Assess whether the list of code reasons (<xref target="causes"/>) reflects observed reset cases.</t>
        </dd>
        <dt>Integration of socket API extensions:</dt>
        <dd>
          <t>Exercise the socket API extensions and identify any required adjustement (<xref target="socket-api"/>).</t>
        </dd>
        <dt>Operational guidance:</dt>
        <dd>
          <t>Strengthen the operational guidance for deploying RSTs with diagnostic payload.</t>
        </dd>
      </dl>
    </section>
    <section anchor="payload">
      <name>RST Diagnostic Payload</name>
      <section anchor="compact">
        <name>Payload Format</name>
        <t>This section defines the message format to convey RST diagnostic payload. This format is designed to minimize the length of the payload.</t>
        <t>The format of the RST diagnostic payload is shown in <xref target="format-1"/>.</t>
        <figure anchor="format-1">
          <name>Structure of the RST Diagnostic Payload</name>
          <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |             0x33AA            |          reason-code          |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                              pen                              |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
        </figure>
        <t>The RST diagnostic payload comprises a magic number that is used to
   unambiguously identify an RST payload that follows this
   specification.  The magic number <bcp14>MUST</bcp14> be set to 0x33AA.</t>
        <t>The descriptions of other fields shown in <xref target="format-1"/> are as follows:</t>
        <dl>
          <dt>reason-code:</dt>
          <dd>
            <t>This field takes a value from an available registry (IANA or vendor-specific).</t>
          </dd>
          <dt/>
          <dd>
            <t>Value 0 is reserved and <bcp14>MUST NOT</bcp14> be used.</t>
          </dd>
          <dt/>
          <dd>
            <t>The reason code is taken from the "TCP Failure Causes" registry  <xref target="IANA-TCP"/> if "pen" is set to 0.</t>
          </dd>
          <dt/>
          <dd>
            <t>It is <bcp14>RECOMMENDED</bcp14> that implementations support all codes defined in <xref target="initial"/> provided in <xref target="causes"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>If the "pen" is not set to 0, then the reason code refers to a registry of the entity identified by the "pen" parameter.</t>
          </dd>
          <dt>pen:</dt>
          <dd>
            <t>Includes a Private Enterprise Number (PEN) <xref target="Private-Enterprise-Numbers"/>.</t>
          </dd>
          <dt/>
          <dd>
            <t>The reserved PEN value "0" is used to indicate that the reason code refers to the IANA-maintained registry (<xref target="causes"/>).</t>
          </dd>
        </dl>
        <t>SEG.LEN <bcp14>MUST</bcp14> be 8 for an RST with diagnostic payload.</t>
      </section>
      <section anchor="behavior">
        <name>Behavior</name>
        <t>Malformed RST diagnostic payloads that include the magic
   numbers 0x33AA <bcp14>MUST</bcp14> be silently ignored by the receiver.
   RSTs that carry such malformed diagnostic payloads are handled like an RST without payload.</t>
        <t>A peer that receives a valid diagnostic payload may pass the reset
   reason information to the local application in addition to the
   information (<bcp14>MUST</bcp14>-12) described in <xref section="3.6" sectionFormat="of" target="RFC9293"/>. The reset reason
   information may also be logged locally, unless a local policy
   specifies otherwise.  How the reset reason information is passed to an application
   and how it is stored locally is implementation-specific.</t>
        <t>Because new codes may be supported by a sender, receivers <bcp14>SHOULD NOT</bcp14>
   discard received RST diagnostic payloads with an unknown reason code unless
   configured otherwise.</t>
        <t>Vendor-specific registries may be maintained by applications. It is out of scope to describe
   how an implementation associates a PEN with a vendor-specific registry.</t>
      </section>
    </section>
    <section anchor="examples">
      <name>Some Examples</name>
      <t><xref target="fig-1"/> depicts an example of an RST diagnostic payload that is
   generated to inform the peer that the TCP connection is reset because
   an ACK was received from that peer while the connection is still in
   the LISTEN state (<xref section="3.10.7.2" sectionFormat="of" target="RFC9293"/>).</t>
      <figure anchor="fig-1">
        <name>Example of an RST Diagnostic Payload with Reason Code</name>
        <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |             0x33AA            |               0x02            |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                              0x00                             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t>An RST diagnostic payload may also be sent by an on-path service
   function.  For example, the following diagnostic payload is returned
   by a NAT function upon expiry of the mapping entry to which the TCP
   connection is bound (<xref target="fig-2"/>).</t>
      <figure anchor="fig-2">
        <name>Example of an RST Diagnostic Payload to Report Connection Timeout</name>
        <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |             0x33AA            |              0x0E             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                              0x00                             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t><xref target="fig-3"/> illustrates an RST diagnostic payload that is returned by a
   peer that resets a TCP connection for a reason code 1234 (0x4D2) defined by a
   vendor with the private enterprise number 32473 (0x7ED9).</t>
      <figure anchor="fig-3">
        <name>Example of an RST Diagnostic Payload to Report Vendor-Specific Reason Code</name>
        <artwork><![CDATA[
    0                   1                   2                   3
    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |             0x33AA            |              0x4D2            |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   |                            0x7ED9                             |
   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork>
      </figure>
      <t><xref target="fig-3"/> uses the Enterprise Number 32473 defined for documentation
   use <xref target="RFC5612"/>.</t>
    </section>
    <section anchor="ops-cons">
      <name>Operational Considerations</name>
      <section anchor="bc">
        <name>Backward Compatibility</name>
        <t>Returning diagnostic data in an RST segment is consistent with
   the provision in <xref section="3.5.3" sectionFormat="of" target="RFC9293"/> for RST segments, especially:</t>
        <blockquote>
          <t>TCP implementations <bcp14>SHOULD</bcp14> allow a received RST segment to
include data (SHLD-2).</t>
        </blockquote>
        <t>Also, this document does not change the conditions under which an RST
   segment is generated (<xref section="3.5.2" sectionFormat="of" target="RFC9293"/>).</t>
      </section>
      <section anchor="multiple-rsts">
        <name>Multiple RSTs</name>
        <t>Per <xref section="3.6" sectionFormat="of" target="RFC9293"/>, one or more RST segments can be sent
   to reset a connection.</t>
        <t>Sending more RST segments to reset a connection can be used
   to mitigate deployment contexts where some on-path devices may
   discard RSTs with payload data.</t>
        <t>Whether a TCP endpoint elects to send more
   than one RST with only a subset of them that include the diagnostic
   payload is implementation-specific for clients and policy-based for servers (see <xref target="sec-man"/>).</t>
      </section>
      <section anchor="sec-man">
        <name>Manageability</name>
        <t>TCP server implementations should support the following parameters:</t>
        <ul spacing="normal">
          <li>
            <t>A parameter to control the activation of RSTs with diagnostic payload.</t>
          </li>
          <li>
            <t>A parameter to expose the set of reason codes that are supported by an implementation.</t>
          </li>
          <li>
            <t>A parameter to control whether "empty" RSTs are also sent together with an RST with diagnostic payload.</t>
          </li>
          <li>
            <t>A rate-limit of RSTs with diagnostic payload.</t>
          </li>
          <li>
            <t>Counters to track sent/received RSTs with diagnostic payload.</t>
          </li>
          <li>
            <t>Counters to track received invalid RSTs with diagnostic payload.</t>
          </li>
        </ul>
      </section>
      <section anchor="maintenance">
        <name>Maintenance</name>
        <t>As new reason codes may be added to the IANA registry, there is a risk that the codes
  that are supported by an implementation do not match the latest version in the registry. Deviations can be detected using the exposure parameter in <xref target="sec-man"/>.</t>
        <t>It is <bcp14>RECOMMENDED</bcp14> to proceed with regular software updates to align with the latest version in the registry.</t>
      </section>
    </section>
    <section anchor="socket-api">
      <name>Socket API Considerations (Informative)</name>
      <t>This section describes how the socket API  can  be extended to provide a way
for an application to use the functionality described in this document.</t>
      <t>This section is informational only.</t>
      <t>The API described in this section can change in a non-backwards compatible way
during the evolution of this document due to changed functionality or gained
experience during the implementation.</t>
      <section anchor="socket-options">
        <name>Socket Options</name>
        <t><xref target="socket-options-table"/> provides an overview of the <tt>IPPROTO_TCP</tt>-level socket
options defined in this section.</t>
        <table anchor="socket-options-table">
          <name>Socket Options</name>
          <thead>
            <tr>
              <th align="left">Option Name</th>
              <th align="left">Data Type</th>
              <th align="left">Set</th>
              <th align="left">Get</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">
                <tt>TCP_RST_REASON_ENABLE</tt></td>
              <td align="left">
                <tt>uint32_t</tt></td>
              <td align="left">X</td>
              <td align="left"> </td>
            </tr>
            <tr>
              <td align="left">
                <tt>TCP_RST_REASON_CODE</tt></td>
              <td align="left">
                <tt>struct tcp_rst_reason</tt></td>
              <td align="left">X</td>
              <td align="left">X</td>
            </tr>
          </tbody>
        </table>
        <section anchor="enable-the-sending-of-the-diagnostic-payload-tcprstreasonenable">
          <name>Enable the Sending of the Diagnostic Payload (<tt>TCP_RST_REASON_ENABLE</tt>)</name>
          <t>Using <tt>setsockopt()</tt> with the <tt>IPPROTO_TCP</tt>-level socket option with the
name <tt>TCP_RST_REASON_ENABLE</tt> enables or disables the sending of the
diagnostic payload using a reason-code and pen.
The <tt>option_value</tt> of type <tt>uint32_t</tt> specifies the pen in host byte order
to use.
When 0 is used (<xref section="3" sectionFormat="of" target="RFC9371"/>), the reason-codes from the registry
specified in <xref target="causes"/> are used.
When 0xffffffff is used (<xref section="3" sectionFormat="of" target="RFC9371"/>), the sending is disabled.
The default is that the sending of a diagnostic payload is disabled.
An implementation might not support the use of PENs different from zero and
0xffffffff.</t>
        </section>
        <section anchor="get-or-set-the-diagnostic-payload-as-code-tcprstreasoncode">
          <name>Get or Set the Diagnostic Payload as Code (<tt>TCP_RST_REASON_CODE</tt>)</name>
          <t>Using <tt>getsockopt()</tt> with the <tt>IPPROTO_TCP</tt>-level socket option with the
name <tt>TCP_RST_REASON_CODE</tt> allows the caller to retrieve the reason-code and
the pen of the diagnostic payload in the received RST segment, which terminated
the corresponding TCP connection.</t>
          <t>Using <tt>setsockopt()</tt> with this socket option allows the caller to provide
reason-code and pen to be sent as part of the diagnostic payload when the
application triggers the sending of a RST segment by using <tt>close()</tt>.
In addition to using <tt>close()</tt> in combination with the <tt>SOL_SOCKET</tt>-level
socket option with name <tt>SO_LINGER</tt>, the application can just provide the
<tt>TCP_RR_RST_ON_CLOSE</tt> flag in <tt>trr_flags</tt>. This way the application can
trigger the sending of a RST segment by calling <tt>setsockopt()</tt> once followed
by <tt>close()</tt>.</t>
          <t>For accepted sockets, this socket option is inherited from the listening socket.</t>
          <t>The following structure is used as the <tt>option_value</tt>:</t>
          <sourcecode type="c"><![CDATA[
struct tcp_rst_reason {
        uint16_t trr_flags;
        uint16_t trr_code;
        uint32_t trr_pen;
};
]]></sourcecode>
          <dl>
            <dt><tt>trr_flags</tt>:</dt>
            <dd>
              <dl>
                <dt>This field is reported as 0 for <tt>getsockopt()</tt> calls. For <tt>setsockopt()</tt></dt>
                <dd>
                  <t/>
                </dd>
                <dt>calls, the following flag can be used:</dt>
                <dd>
                  <t/>
                </dd>
                <dt><tt>TCP_RR_RST_ON_CLOSE</tt>:</dt>
                <dd>
                  <t>When this flag is set, calling <tt>close()</tt> triggers the sending of a RST segment
similar to case, where the <tt>SOL_SOCKET</tt>-level socket option with name
<tt>SO_LINGER</tt> is used to enable lingering with the linger time of 0.
When this flag is cleared, the corresponding functionality is disabled.</t>
                </dd>
              </dl>
            </dd>
            <dt><tt>trr_code</tt>:</dt>
            <dd>
              <t>The reason-code in host byte order to be interpreted in combination with
the PEN provided in <tt>trr_pen</tt>. In case of <tt>trr_pen</tt> being
zero, <tt>trr_code</tt> refers to a value in the registry defined in
<xref target="causes"/>.</t>
            </dd>
            <dt><tt>trr_pen</tt>:</dt>
            <dd>
              <t>The PEN in host byte order to is used in combination with the reason-code
specified in <tt>trr_code</tt>.
When this socket option is used with <tt>setsockopt()</tt>, it is an error to use
zero as a value for <tt>trr_pen</tt> as long as <tt>trr_code</tt> is not
zero.</t>
            </dd>
          </dl>
          <t>When <tt>getsockopt()</tt> with this socket option is performed on a socket, which
has not received a RST with a diagnostic payload containing a reason-code and
pen, zero is provided as the <tt>trr_code</tt> and <tt>trr_pen</tt>.
When <tt>setsockopt()</tt> with a <tt>trr_code</tt> and <tt>trr_pen</tt> of zero
is performed, the special handling of RST segments sent during the ungraceful
termination of the TCP connection is disabled.</t>
        </section>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t><xref target="RFC9293"/> discusses TCP-related security considerations. In
   particular, RST-specific attacks and their mitigations are discussed
   in <xref section="3.10.7.3" sectionFormat="of" target="RFC9293"/>.</t>
      <t>The presence of vendor-specific reason codes may be used
   to fingerprint hosts.  Such a concern does not apply if the reason
   codes are taken from the IANA-maintained registry.  Implementers are,
   thus, encouraged to register new codes within IANA instead of
   maintaining specific registries.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="causes">
        <name>New Registry for TCP Failure Causes</name>
        <t>This document requests IANA to create a new registry entitled "TCP
   Failure Causes" under the "Transmission Control Protocol (TCP)
   Parameters" registry group <xref target="IANA-TCP"/>.</t>
        <t>Values are taken from the 1-65535 range.</t>
        <t>The assignment policy for this registry is "Expert Review"
   (<xref section="4.5" sectionFormat="of" target="RFC8126"/>). See more guidance at <xref target="de"/>.</t>
        <t>The registry is initially populated with the values listed in
   <xref target="initial"/>.</t>
        <table anchor="initial">
          <name>Initial TCP Failure Causes</name>
          <thead>
            <tr>
              <th align="center">Value</th>
              <th align="left">Description</th>
              <th align="left">Specification (if available)</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="center">0</td>
              <td align="left">Reserved</td>
              <td align="left">ThisDocument</td>
            </tr>
            <tr>
              <td align="center">1</td>
              <td align="left">Illegal option length</td>
              <td align="left">
                <xref section="3.1" sectionFormat="of" target="RFC9293"/></td>
            </tr>
            <tr>
              <td align="center">2</td>
              <td align="left">Desynchronized state</td>
              <td align="left">
                <xref section="3.5.1" sectionFormat="of" target="RFC9293"/></td>
            </tr>
            <tr>
              <td align="center">3</td>
              <td align="left">New data is received after CLOSE is called</td>
              <td align="left">Sections 3.6.1 and  3.10.7.1 of <xref target="RFC9293"/></td>
            </tr>
            <tr>
              <td align="center">4</td>
              <td align="left">ABORT process</td>
              <td align="left">
                <xref section="3.10.5" sectionFormat="of" target="RFC9293"/></td>
            </tr>
            <tr>
              <td align="center">5</td>
              <td align="left">Unexpected ACK received by non-synchronized state connection</td>
              <td align="left">
                <xref section="3.10.7" sectionFormat="of" target="RFC9293"/></td>
            </tr>
            <tr>
              <td align="center">6</td>
              <td align="left">Unexpected SYN in the window</td>
              <td align="left">
                <xref section="3.10.7" sectionFormat="of" target="RFC9293"/></td>
            </tr>
            <tr>
              <td align="center">7</td>
              <td align="left">Unexpected security compartment</td>
              <td align="left">
                <xref section="A.1" sectionFormat="of" target="RFC9293"/></td>
            </tr>
            <tr>
              <td align="center">8</td>
              <td align="left">Malformed message</td>
              <td align="left">ThisDocument</td>
            </tr>
            <tr>
              <td align="center">9</td>
              <td align="left">Not authorized</td>
              <td align="left">ThisDocument</td>
            </tr>
            <tr>
              <td align="center">10</td>
              <td align="left">Resource exceeded</td>
              <td align="left">ThisDocument</td>
            </tr>
            <tr>
              <td align="center">11</td>
              <td align="left">Network failure</td>
              <td align="left">ThisDocument</td>
            </tr>
            <tr>
              <td align="center">12</td>
              <td align="left">Reset received from the peer</td>
              <td align="left">ThisDocument</td>
            </tr>
            <tr>
              <td align="center">13</td>
              <td align="left">Destination unreachable</td>
              <td align="left">ThisDocument</td>
            </tr>
            <tr>
              <td align="center">14</td>
              <td align="left">Connection timeout</td>
              <td align="left">ThisDocument</td>
            </tr>
            <tr>
              <td align="center">15</td>
              <td align="left">Too much outstanding data</td>
              <td align="left">
                <xref section="3.6" sectionFormat="of" target="RFC8684"/></td>
            </tr>
            <tr>
              <td align="center">16</td>
              <td align="left">Unacceptable performance</td>
              <td align="left">
                <xref section="3.6" sectionFormat="of" target="RFC8684"/></td>
            </tr>
            <tr>
              <td align="center">17</td>
              <td align="left">Middlebox interference</td>
              <td align="left">
                <xref section="3.6" sectionFormat="of" target="RFC8684"/></td>
            </tr>
          </tbody>
        </table>
        <t>Note that codes in the 8-14 range can be used by service functions (CGN, firewall, proxy, etc.).</t>
        <ul empty="true">
          <li>
            <t>Note to the RFC Editor: Please replace ThisDocument with the RFC number assigned to this document.</t>
          </li>
        </ul>
      </section>
      <section anchor="de">
        <name>Guidelines for the Designated Experts</name>
        <t>Criteria that should be applied by the designated experts include
   determining whether the proposed registration duplicates existing
   entries and whether the registration description is clear and fits
   the purpose of this registry.</t>
        <t>The designated experts may approve registration once they checked
   that the new requested code is not covered by an existing code and if
   the provided reasoning to register the new code is acceptable.  A
   registration request may supply a pointer to a specification where
   that code is defined.  However, a registration may be accepted even
   if no permanent and readily available public specification is
   available.</t>
        <t>Registration requests are to be sent to <eref target="mailto:rst-diag-review@ietf.org">rst-diag-review@ietf.org</eref>
   and are evaluated within a three-week review period on the advice of
   one or more designated experts.  Within the review period, the
   designated experts will either approve or deny the registration
   request, communicating this decision to the review list and IANA.
   Denials should include an explanation and, if applicable, suggestions
   as to how to make the request successful.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="IANA-TCP" target="https://www.iana.org/assignments/tcp-parameters/tcp-parameters.xhtml#">
          <front>
            <title>Transmission Control Protocol (TCP) Parameters</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Private-Enterprise-Numbers" target="https://www.iana.org/assignments/enterprise-numbers">
          <front>
            <title>Private Enterprise Numbers</title>
            <author>
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="RFC9293">
          <front>
            <title>Transmission Control Protocol (TCP)</title>
            <author fullname="W. Eddy" initials="W." role="editor" surname="Eddy"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document specifies the Transmission Control Protocol (TCP). TCP is an important transport-layer protocol in the Internet protocol stack, and it has continuously evolved over decades of use and growth of the Internet. Over this time, a number of changes have been made to TCP as it was specified in RFC 793, though these have only been documented in a piecemeal fashion. This document collects and brings those changes together with the protocol specification from RFC 793. This document obsoletes RFC 793, as well as RFCs 879, 2873, 6093, 6429, 6528, and 6691 that updated parts of RFC 793. It updates RFCs 1011 and 1122, and it should be considered as a replacement for the portions of those documents dealing with TCP requirements. It also updates RFC 5961 by adding a small clarification in reset handling while in the SYN-RECEIVED state. The TCP header control bits from RFC 793 have also been updated based on RFC 3168.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="7"/>
          <seriesInfo name="RFC" value="9293"/>
          <seriesInfo name="DOI" value="10.17487/RFC9293"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC8684">
          <front>
            <title>TCP Extensions for Multipath Operation with Multiple Addresses</title>
            <author fullname="A. Ford" initials="A." surname="Ford"/>
            <author fullname="C. Raiciu" initials="C." surname="Raiciu"/>
            <author fullname="M. Handley" initials="M." surname="Handley"/>
            <author fullname="O. Bonaventure" initials="O." surname="Bonaventure"/>
            <author fullname="C. Paasch" initials="C." surname="Paasch"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>TCP/IP communication is currently restricted to a single path per connection, yet multiple paths often exist between peers. The simultaneous use of these multiple paths for a TCP/IP session would improve resource usage within the network and thus improve user experience through higher throughput and improved resilience to network failure.</t>
              <t>Multipath TCP provides the ability to simultaneously use multiple paths between peers. This document presents a set of extensions to traditional TCP to support multipath operation. The protocol offers the same type of service to applications as TCP (i.e., a reliable bytestream), and it provides the components necessary to establish and use multiple TCP flows across potentially disjoint paths.</t>
              <t>This document specifies v1 of Multipath TCP, obsoleting v0 as specified in RFC 6824, through clarifications and modifications primarily driven by deployment experience.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8684"/>
          <seriesInfo name="DOI" value="10.17487/RFC8684"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC6888">
          <front>
            <title>Common Requirements for Carrier-Grade NATs (CGNs)</title>
            <author fullname="S. Perreault" initials="S." role="editor" surname="Perreault"/>
            <author fullname="I. Yamagata" initials="I." surname="Yamagata"/>
            <author fullname="S. Miyakawa" initials="S." surname="Miyakawa"/>
            <author fullname="A. Nakagawa" initials="A." surname="Nakagawa"/>
            <author fullname="H. Ashida" initials="H." surname="Ashida"/>
            <date month="April" year="2013"/>
            <abstract>
              <t>This document defines common requirements for Carrier-Grade NATs (CGNs). It updates RFC 4787.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="127"/>
          <seriesInfo name="RFC" value="6888"/>
          <seriesInfo name="DOI" value="10.17487/RFC6888"/>
        </reference>
        <reference anchor="RFC6146">
          <front>
            <title>Stateful NAT64: Network Address and Protocol Translation from IPv6 Clients to IPv4 Servers</title>
            <author fullname="M. Bagnulo" initials="M." surname="Bagnulo"/>
            <author fullname="P. Matthews" initials="P." surname="Matthews"/>
            <author fullname="I. van Beijnum" initials="I." surname="van Beijnum"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document describes stateful NAT64 translation, which allows IPv6-only clients to contact IPv4 servers using unicast UDP, TCP, or ICMP. One or more public IPv4 addresses assigned to a NAT64 translator are shared among several IPv6-only clients. When stateful NAT64 is used in conjunction with DNS64, no changes are usually required in the IPv6 client or the IPv4 server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6146"/>
          <seriesInfo name="DOI" value="10.17487/RFC6146"/>
        </reference>
        <reference anchor="RFC7857">
          <front>
            <title>Updates to Network Address Translation (NAT) Behavioral Requirements</title>
            <author fullname="R. Penno" initials="R." surname="Penno"/>
            <author fullname="S. Perreault" initials="S." surname="Perreault"/>
            <author fullname="M. Boucadair" initials="M." role="editor" surname="Boucadair"/>
            <author fullname="S. Sivakumar" initials="S." surname="Sivakumar"/>
            <author fullname="K. Naito" initials="K." surname="Naito"/>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document clarifies and updates several requirements of RFCs 4787, 5382, and 5508 based on operational and development experience. The focus of this document is Network Address Translation from IPv4 to IPv4 (NAT44).</t>
              <t>This document updates RFCs 4787, 5382, and 5508.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="127"/>
          <seriesInfo name="RFC" value="7857"/>
          <seriesInfo name="DOI" value="10.17487/RFC7857"/>
        </reference>
        <reference anchor="RFC5612">
          <front>
            <title>Enterprise Number for Documentation Use</title>
            <author fullname="P. Eronen" initials="P." surname="Eronen"/>
            <author fullname="D. Harrington" initials="D." surname="Harrington"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes an Enterprise Number (also known as SMI Network Management Private Enterprise Code) for use in documentation. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5612"/>
          <seriesInfo name="DOI" value="10.17487/RFC5612"/>
        </reference>
        <reference anchor="RFC9371">
          <front>
            <title>Registration Procedures for Private Enterprise Numbers (PENs)</title>
            <author fullname="A. Baber" initials="A." surname="Baber"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="March" year="2023"/>
            <abstract>
              <t>This document describes how Private Enterprise Numbers (PENs) are registered by IANA. It shows how to request a new PEN and how to modify a current PEN. It also gives a brief overview of PEN uses.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9371"/>
          <seriesInfo name="DOI" value="10.17487/RFC9371"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
      </references>
    </references>
    <?line 503?>

<section anchor="sec-validation">
      <name>Implementation and Experimental Validation in Linux</name>
      <t>Questions and concerns have been raised regarding whether RST with payload affects the normal termination of flows across different software platforms, operating systems, middleboxes, etc. Even though <xref section="3.5.3" sectionFormat="of" target="RFC9293"/> explicitly allows this behavior, a full implementation is needed to widely verify if unexpected cases can happen in the real world.</t>
      <t>The overall design in Linux is to pre-allocate a large enough zeroed buffer, put a reset reason code in the first byte and sent it out to verify whether the RST with payload can be possibly declined by any equipment in between two sides and the other side successfully parses the RST with payload.</t>
      <section anchor="implementation">
        <name>Implementation</name>
        <t>The following implementation is accomplished on top of Linux 6.16:</t>
        <dl>
          <dt><strong>Payload Attachment</strong>:</dt>
          <dd>
            <t>Allocate a 1000-byte data payload attached to all generated RST packets.</t>
          </dd>
          <dt><strong>Reason Code Encoding</strong>:</dt>
          <dd>
            <t>The first byte of the payload is used to store a predefined reset reason code that is listed in include/net/rstreason.h file, while the remainder of the payload is zero-padded. The reason code is generated by the existing mechanism called <eref target="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d5115a55ffb52">TCP reset reasons</eref>.</t>
          </dd>
          <dt><strong>Handling of Reset Types</strong>:</dt>
          <dd>
            <t>The implementation distinguishes between the two primary reset scenarios in <tt>tcp_send_active_reset()</tt> and <tt>tcp_v4_send_reset()</tt> respectively:
</t>
            <ul spacing="normal">
              <li>
                <t>For an <strong>Active Reset</strong>, initiated proactively by the local system, the payload is placed in the linear area of the socket buffer (<tt>sk_buff</tt>).</t>
              </li>
              <li>
                <t>For a <strong>Passive Reset</strong>, sent in response to an unexpected or invalid incoming packet, the payload is stored in the non-linear (paged) area of the <tt>sk_buff</tt>.</t>
              </li>
            </ul>
          </dd>
        </dl>
        <t>Complete patch is shown in <xref target="patch"/>.</t>
        <figure anchor="patch">
          <name>Complete Patch</name>
          <artwork><![CDATA[
diff --git a/include/net/tcp.h b/include/net/tcp.h
index b3815d104340..0b32257774c8 100644
--- a/include/net/tcp.h
+++ b/include/net/tcp.h
@@ -62,6 +62,7 @@ void tcp_time_wait(struct sock *sk, int state, int timeo);
 #define MAX_TCP_OPTION_SPACE 40
 #define TCP_MIN_SND_MSS                48
 #define TCP_MIN_GSO_SIZE       (TCP_MIN_SND_MSS - MAX_TCP_OPTION_SPACE)
+#define PAYLOAD_LEN 1000

 /*
  * Never offer a window over 32767 without using window scaling. Some
diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c
index 84d3d556ed80..49250e6bd6a1 100644
--- a/net/ipv4/tcp_ipv4.c
+++ b/net/ipv4/tcp_ipv4.c
@@ -741,6 +741,7 @@ static bool tcp_v4_ao_sign_reset(const struct sock *sk, struct sk_buff *skb,
 static void tcp_v4_send_reset(const struct sock *sk, struct sk_buff *skb,
                              enum sk_rst_reason reason)
 {
+       u32 len = sizeof(struct tcphdr) + REPLY_OPTIONS_LEN + PAYLOAD_LEN;
        const struct tcphdr *th = tcp_hdr(skb);
        struct {
                struct tcphdr th;
@@ -757,6 +758,7 @@ static void tcp_v4_send_reset(const struct sock *sk, struct sk_buff *skb,
 #endif
        u64 transmit_time = 0;
        struct sock *ctl_sk;
+       char buffer[len];
        struct net *net;
        u32 txhash = 0;

@@ -786,7 +788,8 @@ static void tcp_v4_send_reset(const struct sock *sk, struct sk_buff *skb,
        }

        memset(&arg, 0, sizeof(arg));
-       arg.iov[0].iov_base = (unsigned char *)&rep;
+       memset(&buffer, 0, len);
+       arg.iov[0].iov_base = (unsigned char *)buffer;
        arg.iov[0].iov_len  = sizeof(rep.th);

        net = sk ? sock_net(sk) : skb_dst_dev_net_rcu(skb);
@@ -911,6 +914,10 @@ static void tcp_v4_send_reset(const struct sock *sk, struct sk_buff *skb,
                ctl_sk->sk_mark = 0;
                ctl_sk->sk_priority = 0;
        }
+       memcpy(buffer, (char *)&rep, arg.iov[0].iov_len);
+       /* put rst reason into the first byte in payload */
+       buffer[arg.iov[0].iov_len] = reason;
+       arg.iov[0].iov_len += PAYLOAD_LEN;
        ip_send_unicast_reply(ctl_sk, sk,
                              skb, &TCP_SKB_CB(skb)->header.h4.opt,
                              ip_hdr(skb)->saddr, ip_hdr(skb)->daddr,
diff --git a/net/ipv4/tcp_output.c b/net/ipv4/tcp_output.c
index b616776e3354..c07dd009a0de 100644
--- a/net/ipv4/tcp_output.c
+++ b/net/ipv4/tcp_output.c
@@ -3628,12 +3628,14 @@ void tcp_send_fin(struct sock *sk)
 void tcp_send_active_reset(struct sock *sk, gfp_t priority,
                           enum sk_rst_reason reason)
 {
+       u32 len = MAX_TCP_HEADER + PAYLOAD_LEN;
+       char payload[PAYLOAD_LEN];
        struct sk_buff *skb;

        TCP_INC_STATS(sock_net(sk), TCP_MIB_OUTRSTS);

        /* NOTE: No TCP options attached and we never retransmit this. */
-       skb = alloc_skb(MAX_TCP_HEADER, priority);
+       skb = alloc_skb(len, priority);
        if (!skb) {
                NET_INC_STATS(sock_net(sk), LINUX_MIB_TCPABORTFAILED);
                return;
@@ -3641,8 +3643,13 @@ void tcp_send_active_reset(struct sock *sk, gfp_t priority,

        /* Reserve space for headers and prepare control bits. */
        skb_reserve(skb, MAX_TCP_HEADER);
+       skb_put(skb, PAYLOAD_LEN);
        tcp_init_nondata_skb(skb, tcp_acceptable_seq(sk),
                             TCPHDR_ACK | TCPHDR_RST);
+       memset(payload, 0, PAYLOAD_LEN);
+       payload[0] = reason;
+       skb_store_bits(skb, 0, payload, PAYLOAD_LEN);
+       TCP_SKB_CB(skb)->end_seq += PAYLOAD_LEN;
        tcp_mstamp_refresh(tcp_sk(sk));
        /* Send it off. */
        if (tcp_transmit_skb(sk, skb, 0, priority))
]]></artwork>
        </figure>
      </section>
      <section anchor="experimental-validation">
        <name>Experimental Validation</name>
        <t>To ensure a thorough evaluation, a multi-layered experimental methodology was designed, progressing from basic functional checks to complex, real-world compatibility and stability tests. The whole implementation has been deployed in Tencent's production environment for almost six months.</t>
        <section anchor="functional-verification">
          <name>Functional Verification</name>
          <t>The basic functionality test is using iperf or iperf3 to construct a normal termination senario. The <tt>tcpdump</tt> tool with <tt>-X</tt> option effectively helps to show the <tt>[RST+]</tt> flag and the 1000-byte payload, confirming that the kernel correctly generated and transmitted the augmented RST packets.</t>
          <t>Two servers, designated as Client A and Server B. The test is conducted as following:</t>
          <ol spacing="normal" type="1"><li>
              <t>Start the <tt>iperf3</tt> server on Server B (<tt>iperf3 -s</tt>).</t>
            </li>
            <li>
              <t>Initiate a connection from Client A to Server B (<tt>iperf3 -c [IP_of_B]</tt>).</t>
            </li>
            <li>
              <t>After the connection is established, one of the <tt>iperf3</tt> processes is terminated using the <tt>kill</tt> command, triggering the kernel to send an RST packet.</t>
            </li>
            <li>
              <t>Simultaneously, <tt>tcpdump</tt> is run on either host to capture the reset packet using the filter: <tt>'tcp[tcpflags] &amp; tcp-rst != 0' -X -nn -vv -S</tt>.</t>
            </li>
          </ol>
        </section>
        <section anchor="compatibility-verification">
          <name>Compatibility Verification</name>
          <dl>
            <dt><strong>Hardwares and Kernels</strong>:</dt>
            <dd>
              <t>Tests were conducted on various Linux distributions (e.g., Ubuntu or CentOS) with different kernel versions. The physical hosts were equipped with a range of network interface cards (NICs), including Intel <tt>i40e</tt>, <tt>ixgbe</tt>, and Mellanox <tt>mlx5</tt>.</t>
            </dd>
            <dt><strong>Virtualization</strong>:</dt>
            <dd>
              <t>The mechanism was tested in a virtualized environment where the VM used a <tt>virtio_net</tt> driver and the host employed DPDK to redirect packets in the host.</t>
            </dd>
            <dt><strong>Middleboxes</strong>:</dt>
            <dd>
              <t>Tests were performed with Layer 4 (L4) and Layer 7 (L7) gateways placed between the client and server to verify correct packet parsing and forwarding.</t>
            </dd>
            <dt><strong>Wide Area Network (WAN)</strong>:</dt>
            <dd>
              <t>The setup was tested over long-haul international links to simulate complex conditions, including China-to-Singapore (RTT &gt; 30ms) and China-to-Germany (RTT &gt; 200ms).</t>
            </dd>
          </dl>
          <t>In conclusion, across all complex environment tests, the RST packets with payloads were successfully received by the peer. No instances of packets being dropped or mishandled by intermediate middleboxes, gateways, or diverse hardware and software configurations were observed.</t>
        </section>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The "diagnostic payload" name is inspired by <xref section="5.5.2" sectionFormat="of" target="RFC7252"/>
  that was cited by Carsten Bormann in the tcpm mailing list.</t>
      <t>Thanks to Jon Shallow, Neal Cardwell, Lars Eggert, Eric Dumazet, Rick Jones, Yoshifumi Nishida, Li Jinghui, and Gleb Smirnoff for the review and comments.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Michael Tüxen">
        <organization/>
        <address>
          <email>tuexen@fh-muenster.de</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
