[multipathtcp] RFC6824bis edits based on implementation feedback

Alan Ford <alan.ford@gmail.com> Wed, 01 January 2020 22:51 UTC

Return-Path: <alan.ford@gmail.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 727B912004C for <multipathtcp@ietfa.amsl.com>; Wed, 1 Jan 2020 14:51:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W_efxKIFSc3p for <multipathtcp@ietfa.amsl.com>; Wed, 1 Jan 2020 14:51:37 -0800 (PST)
Received: from mail-wr1-x42d.google.com (mail-wr1-x42d.google.com [IPv6:2a00:1450:4864:20::42d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 41D6112000F for <multipathtcp@ietf.org>; Wed, 1 Jan 2020 14:51:37 -0800 (PST)
Received: by mail-wr1-x42d.google.com with SMTP id j42so37724176wrj.12 for <multipathtcp@ietf.org>; Wed, 01 Jan 2020 14:51:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:mime-version:subject:message-id:date:to; bh=Hofi4Ue2ue8fIOClr8fzjLXAFP9650mzT+DZ0DgqR00=; b=Pf/+B0Uejcr99VEnry5nGPIk4/7icKjbLlvkQWeLnGlWYRW1M/8UxaKs4GJ1Icg+sO rEmisR66RjNyzDC8zEZmCjhowYvzz47ystdS/QeJ5THTgQw0UWJw5N2De8NwNOjJElpc KMm3mF4hbRZ/OF1HAkFnEhJygzhOoQ7oJXkrdDFl2O5NRymFOW75Ah/qvrdfvahLMHkT 9bhdfpGAEVFZa4eL9BTJt8ESM4cZPB3nsvk0trZkUTX1cy9Jm0m3kUDS6zqknzGbUIsx 5VqBejaZVR9pb2UK/WXJSmqPft1CLuqX/JKlxcbRv/b6KZXb8oAtUnYXcQ1i+eG8Eh6F 2tsA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:subject:message-id:date:to; bh=Hofi4Ue2ue8fIOClr8fzjLXAFP9650mzT+DZ0DgqR00=; b=VvyyuXkVQgl9oxZqTu72JlA1OhmSJQXWk8JOVygMKprFvaCAEVSTRoAW/GzCmCoK0D X5nux513v9ymMqkeosS2k3MyaLPInG4QRoCkolDwacsawRlmLd966D2/DX+lcwQJRKTi MDglxdSs2hP54MUrskWeUGRqOijWfxCd6F/PQuKjsu07Ur6rviqhSqRCtGPqU73mixbK z56qznninV7+dg7R4i9LzWqizC1fCCXqvONz0gRpmAj6MW8S1QlMTChWQdZJ1lz2AjeI 5DZH86Df01vSf6zuAIosf5dMN6OpwJoqAAodgjFs/TAalGg4cI6+H/A1dKnDF7M89hkA VtJw==
X-Gm-Message-State: APjAAAXR+tdrFtpeDX1LCrzXgkcA0nLSV1GcSfeq0FmqDp58LGDIBDyw OJh/i6NqOldOLfS1+V3C54W6LLN6
X-Google-Smtp-Source: APXvYqw/8OtoREf9fvxDgPEf1RIw64PcMbog3rjCFz7Z4WUAPQw+A0X36o7pcVejmK1dg0GCU3yu+w==
X-Received: by 2002:a5d:6ac3:: with SMTP id u3mr81597417wrw.25.1577919095432; Wed, 01 Jan 2020 14:51:35 -0800 (PST)
Received: from alan-mbp.lan ([213.31.70.254]) by smtp.gmail.com with ESMTPSA id 5sm58171516wrh.5.2020.01.01.14.51.33 for <multipathtcp@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 01 Jan 2020 14:51:34 -0800 (PST)
From: Alan Ford <alan.ford@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_BB221462-1149-4913-A0E6-4F03983155CB"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Message-Id: <C36D742F-6D76-48FA-B6D8-44DE484A9E2C@gmail.com>
Date: Wed, 01 Jan 2020 22:51:32 +0000
To: MultiPath TCP - IETF WG <multipathtcp@ietf.org>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/-QOd6j9OaCY3NGB2eq0m1xfkAyE>
Subject: [multipathtcp] RFC6824bis edits based on implementation feedback
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Jan 2020 22:51:39 -0000

Hi all,

We’d love to get this to a state of completion as soon as possible, and to this end I am starting a new thread on this topic. In discussion with the chairs, it is possible to make the desired changes in AUTH48 as long as there is WG consensus. The discussion so far has been fairly limited in terms of participation.

I would ask the chairs please if it was possible to specify a time bound for this discussion and a default conclusion.

Regarding the changes, in summary, there are two areas where changes have been requested by the implementation community. As we are the IETF we obviously have strong focus on “running code” and so ease of implementing standards-compliant code is strongly desirable. However, we do not wish to reduce functionality agreed by the IETF community if it is considered a required feature by the community.


Change 1

Change the sentence reading:

   If B has data to send first, then the reliable delivery of the ACK + MP_CAPABLE can be inferred by the receipt of this data with an MPTCP Data Sequence Signal (DSS) option (Section 3.3). 

To:

   If B has data to send first, then the reliable delivery of the ACK + MP_CAPABLE is ensured by the receipt of this data with an MPTCP Data Sequence Signal (DSS) option (Section 3.3) containing a DATA_ACK for the MP_CAPABLE (which is the first octet of the data sequence space).

What this means:

The current text is concerned only with ensuring a path is MPTCP capable, and so only cares that DSS option occurs on a data packet. However, the MP_CAPABLE option is defined to occupy the first octet of data sequence space and thus, if analogous to TCP, must be acknowledged. From an implementation point of view it would make sense not to have this hanging around forever and instead define it is acknowledged at the connection level as soon as received. This change ensures the first data packet also DATA_ACKs this MP_CAPABLE octet.


Change 2

Change the sentence reading:

   A Data Sequence Mapping does not need to be included in every MPTCP packet, as long as the subflow sequence space in that packet is covered by a mapping known at the receiver.

To:

   The mapping provided by a Data Sequence Mapping MUST apply to some or all of the subflow sequence space in the TCP segment which carries the option. It does not need to be included in every MPTCP packet, as long as the subflow sequence space in that packet is covered by a mapping known at the receiver.

What this means:

The current text does not place any restrictions on where a mapping could appear. In theory a sender could define a thousand different mappings up front, send them all, and expect a receiver to store this and reassemble data according to these mappings as it arrives. Indeed, this was never explicitly disallowed since it “might have been useful”. The implementation community, however, has expressed concerns over the difficulty of implementing this open-endedly. How many mappings is it reasonable to store? Is there a DoS risk here? Instead, it has been requested that thee specification restricts the placement of the DSS option to being within the subflow sequence space to which it applies.


Please can members of the WG express whether they are happy with these changes, or concerned.

Best regards,
Alan