Re: TCPMUX (RFC 1078) status

Joe Touch <touch@isi.edu> Fri, 16 August 2013 18:08 UTC

Return-Path: <touch@isi.edu>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E9D0011E8186 for <ietf@ietfa.amsl.com>; Fri, 16 Aug 2013 11:08:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bJHyAxZSwZn4 for <ietf@ietfa.amsl.com>; Fri, 16 Aug 2013 11:08:01 -0700 (PDT)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161]) by ietfa.amsl.com (Postfix) with ESMTP id 14ACB11E81E3 for <ietf@ietf.org>; Fri, 16 Aug 2013 11:08:01 -0700 (PDT)
Received: from [128.9.160.166] (abc.isi.edu [128.9.160.166]) (authenticated bits=0) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id r7GI7INO009052 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Fri, 16 Aug 2013 11:07:18 -0700 (PDT)
Message-ID: <520E6A55.6010802@isi.edu>
Date: Fri, 16 Aug 2013 11:07:17 -0700
From: Joe Touch <touch@isi.edu>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130801 Thunderbird/17.0.8
MIME-Version: 1.0
To: Martin Sustrik <sustrik@250bpm.com>
Subject: Re: TCPMUX (RFC 1078) status
References: <5205D2FB.8010205@250bpm.com> <52069498.1000604@mti-systems.com> <520D3779.4050106@isi.edu> <520D7F0D.10905@mti-systems.com> <520DBABA.2000506@250bpm.com>
In-Reply-To: <520DBABA.2000506@250bpm.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: draft-ietf-tcpm-tcp-rfc4614bis@tools.ietf.org, IETF-Discussion <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Aug 2013 18:08:07 -0000

On 8/15/2013 10:38 PM, Martin Sustrik wrote:
> On 16/08/13 03:23, Wesley Eddy wrote:
>
>>> There are semantics issues to; see draft-touch-tcp-portnames-00 for
>>> information (this is being revised for resubmission shortly, FWIW).
>>>
>> I totally agree.  In fact, in the update to the TCP roadmap [1], we
>> added TCPMUX to the section on "Historic and Undeployed Extensions",
>> though it definitely bears further discussion than is currently in
>> the roadmap.  I think we should add a reference to your portnames doc
>> to explain why this should be Historic plus check a bit more to see if
>> the code that's out there is really being used or whether it's just
>> hanging out like a vestigal limb in the various inetd packages.
>>
>> If it's fair to ask Martin ... I'm kind of curious why you might want
>> to be using it or think it sounds useful?  I think a lot of admins
>> would be concerned that it could be used to get around port-based
>> firewall rules, etc.
>
> Ok, let me explain.
>
> I am coming from enterprise messaging world (think of IBM MQ series,
> JMS, ActiveMQ, RabbitMQ et c.)
>
> Once I was participating on AMQP protocol development (now at OASIS).
> So, what AMQP and other enterprise messaging products do is exposing a
> "message broker" on a single TCP port, which then forwards messages to
> any connected services. As can be seen, single open firewall port can be
> used to access any internal service.

I don't understand that statement.

Services are currently indicated by the destination port. If there is 
only one destination port available, there is only one service provided 
- because very few services can be identified solely by in-band information.

> That being obviously the *wrong* way to do things, I've written ZeroMQ
> later which takes the strict approach: If you want to expose a new
> service, you have to use a separate TCP port number.
>
> Since then it turned out that this as a limitation that people are most
> complaining about.

It would be useful if you could be more specific about the problem you 
are trying to solve.

So far I hear "people want one port that serves multiple services". I'd 
like a pony ;-) I.e., just because they want it, doesn't mean it either 
makes sense or should get it.

> Now, the reason seems to be that ZeroMQ requires you to use different
> TCP connections for doing different kinds of stuff to avoid head-of-line
> blocking et c. (think of SCTP channels simulated via TCP)

Different connections don't have anything to do with the use of a single 
port. A single port can serve multiple connections, and yes - that's a 
useful way to avoid HOL blocking.

> What that means is that you have a lot of fine-grained services and as
> the development of your application proceeds you add more of them,
> remove them and so on.
>
> That in turn requires admins (and the corporate approval process!) to
> get into the deployment cycle and open the TCP ports as appropriate. The
> result is that the development basically grinds to halt.

That sounds a lot like the desires of admins is in conflict with the 
desires of your users. I.e., an admin that wants to block anything they 
don't explicitly allow WANTS to block this sort of mechanism too.

> The solution IMO is to preserve the port-based services functionality
> for those that truly care about security and -- optionally -- support
> some kind of multiplexer such as TCPMUX for those that care more about
> short deployment cycle.

TCPMUX won't do what you're asking - if you're asking to block based on 
the service type. If it did, then the sysadmin would just block TCPMUX 
connections to services they didn't know, and you'd be right back where 
you are now (i.e., without TCPMUX).

Again, what is the goal?

(note: the goal of the portnames approach is NOT to provide a single 
multiplexing port; it's to decouple the dest port's two uses - demux 
info and service identifier. the primary reason for portnames is to 
allow more than 65K concurrent/timewait connections to a single service; 
FWIW, I cited it because of its description of the limitations of 
TCPMUX, not because the approach there was relevant here).

> That being said, IIRC, there's such functionality in WebSockets as well.
> Open a connection to fixed pot (80) and particular URL (string), then
> after the initial negotiation, switch to raw TCP mode and hand the
> connection to whatever application is suppose to handle it. The reason I
> don't like that solution is that you have to have web server installed
> to work as a multiplexer, which is kind of strange.

If you want a multiplexer to serve different connections from a single 
service port, you need a multiplexer server (tcpmux daemon, websockets, 
whatever you want to call it).

Joe