[multipathtcp] Key Exchange

Klemens Schragel <klemens.schragel@mailbox.org> Tue, 23 April 2019 08:31 UTC

Return-Path: <klemens.schragel@mailbox.org>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 86C1712023C; Tue, 23 Apr 2019 01:31:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mailbox.org header.b=AxkkVNjC; dkim=pass (2048-bit key) header.d=mailbox.org header.b=mqqGzO6I
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BPAzsX4FlMyK; Tue, 23 Apr 2019 01:31:07 -0700 (PDT)
Received: from mx2.mailbox.org (mx2a.mailbox.org [IPv6:2001:67c:2050:104:0:2:25:2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 01E801202D2; Tue, 23 Apr 2019 01:31:06 -0700 (PDT)
Received: from smtp1.mailbox.org (smtp1.mailbox.org [IPv6:2001:67c:2050:105:465:1:1:0]) (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256/256 bits)) (No client certificate requested) by mx2.mailbox.org (Postfix) with ESMTPS id 002F3A10A7; Tue, 23 Apr 2019 10:31:04 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=mailbox.org; h= content-transfer-encoding:content-type:content-type:mime-version :subject:subject:references:in-reply-to:message-id:from:from :date:date:received; s=mail20150812; t=1556008262; bh=wBbzxLi/97 6kMNLDmlaCUvSODNvOADi+Upu3gpF8uHw=; b=AxkkVNjCMjgsBMqlcYKG/MSkgO E8npUHuZbDs316mKJ06eOt2kW7zRamJD4tDXwYYmul0J4nkf3TslzMZiKQTAtBTO kry6J+ZcNH4j6FfJaMoRdo7d+HYoUBsvYrzI+Reo+8RupzfUa1Vf8wOXAsCtRUim 02ceXLU7O0spILPLoQyPOzl6zqa8uOSs6ZIi9ipdESInQ4lVG1c5nMf2TABCpv64 ipLg70EN1LAy2ASsfTppR/DQ3Z3Xn3jgazVl+UjnmxMtp3vWAbAjGvFUy5RVp9dK rDWj1qHNh9bkCH3EojQLnB916OTdmAw8x3UEN/Tfc1MvwjnmUttf9VKwgNmw==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mailbox.org; s=mail20150812; t=1556008263; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=bMCM8hoYiLsiosJp4nlLLu9T1cIvk449rniYOo00X/o=; b=mqqGzO6I5J72o+ekdKv3tbCMhAiUMfiOvmyY4bs1ws2VSpaUpRRnehU9/OB5ATsbMs0K6y luuj/WrXQ22ptIvN/f8AekI1KNjypoR2aSWwSZoiTqLLW5JHovrDMw3Pms9CPeDXdBylFu t04fhdv3amTJhgNvTXQEMwqifhH8BHCKArbRu2E8N42yHK3vXUsub/ESgytQ4BwBwgRVPA NvRXgTJDOFIzUEx4VVCNP94OAaYjgmPHn/hpnbHIndznHoEH7cTVR7kpHNdS7seSsJVU+O BwXcoZVXR45im3FjCjXh+4hMNvuOWDOudD5f+edCjJqFmQcbodp2nT/JWTBYFQ==
X-Virus-Scanned: amavisd-new at heinlein-support.de
Received: from smtp1.mailbox.org ([80.241.60.240]) by spamfilter06.heinlein-hosting.de (spamfilter06.heinlein-hosting.de [80.241.56.125]) (amavisd-new, port 10030) with ESMTP id FZeHOLESM2rO; Tue, 23 Apr 2019 10:31:02 +0200 (CEST)
Date: Tue, 23 Apr 2019 10:31:01 +0200
From: Klemens Schragel <klemens.schragel@mailbox.org>
To: draft-ietf-mptcp-rfc6824bis.all@ietf.org
Cc: multipathtcp@ietf.org
Message-ID: <1727071574.54811.1556008261822@office.mailbox.org>
In-Reply-To: <1749087198.10105.1552294615030@office.mailbox.org>
References: <1749087198.10105.1552294615030@office.mailbox.org>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Priority: 3
Importance: Medium
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/0VJQkjZb7OGOC_MzBUI8WpgGimg>
Subject: [multipathtcp] Key Exchange
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 23 Apr 2019 08:31:10 -0000

Hi all, (sorry for potential double-notification, after Mirja's mail I noticed I probably used the wrong mailing list)

The motivation for (changing) the key exchange concept is expressed only in the Appendix:
“
Appendix E.  Changes from RFC6184
[...]
   o  Connection initiation, through the exchange of the MP_CAPABLE
      MPTCP option, is different from RFC6824.  In order to permit
      servers to act statelessly, the SYN doesn't include A's key (it is
      still sent in the ACK).
“

I would expect this ("servers to act statelessy") to be mentioned also somewhere in the main text and not just in the appendix, especially considering that this different behavior (with regards to experimental v0) is introduced in the currend draft-version as a caveat for version negotiation. Something like this:
“
3.1.  Connection Initiation
[...]
The MP_CAPABLE exchange in this specification (v1) is different to
that specified in v0 [RFC6824] to support server statelessness (see
Appedix E).
[...]
”

(ideally there should be also an own section elaborating the motivation in more detail; to me it seems a bit in contrast to the tendency I see to tune toward minimum RTT communication. But I guess it's a bit late for that)

Thanks and rgds, Klemens