Re: [multipathtcp] Preparing for Prague meeting - things to delete or add to MPTCP protocol bis

<mohamed.boucadair@orange.com> Thu, 16 July 2015 05:42 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A59771B3140 for <multipathtcp@ietfa.amsl.com>; Wed, 15 Jul 2015 22:42:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qkhmHH8JZALF for <multipathtcp@ietfa.amsl.com>; Wed, 15 Jul 2015 22:42:40 -0700 (PDT)
Received: from relais-inet.francetelecom.com (relais-ias92.francetelecom.com [193.251.215.92]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A97261B313B for <multipathtcp@ietf.org>; Wed, 15 Jul 2015 22:42:39 -0700 (PDT)
Received: from omfedm06.si.francetelecom.fr (unknown [xx.xx.xx.2]) by omfedm13.si.francetelecom.fr (ESMTP service) with ESMTP id EFB8A324B8B; Thu, 16 Jul 2015 07:42:37 +0200 (CEST)
Received: from localhost.localdomain (unknown [127.0.0.1]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id E29A727C066; Thu, 16 Jul 2015 07:42:37 +0200 (CEST)
Received: from omfedm06.si.francetelecom.fr by omfedm06.si.francetelecom.fr with queue id 349408-32; Thu, 16 Jul 2015 05:42:37 GMT
Received: from Exchangemail-eme2.itn.ftgroup (unknown [10.114.31.2]) by omfedm06.si.francetelecom.fr (ESMTP service) with ESMTP id C9F5527C058; Thu, 16 Jul 2015 07:42:37 +0200 (CEST)
Received: from OPEXCLILMA3.corporate.adroot.infra.ftgroup ([fe80::60a9:abc3:86e6:2541]) by OPEXCLILM21.corporate.adroot.infra.ftgroup ([fe80::e92a:c932:907e:8f06%19]) with mapi id 14.03.0235.001; Thu, 16 Jul 2015 07:42:36 +0200
From: mohamed.boucadair@orange.com
To: "Olivier.Bonaventure@uclouvain.be" <Olivier.Bonaventure@uclouvain.be>, "philip.eardley@bt.com" <philip.eardley@bt.com>, "multipathtcp@ietf.org" <multipathtcp@ietf.org>
Thread-Topic: [multipathtcp] Preparing for Prague meeting - things to delete or add to MPTCP protocol bis
Thread-Index: AQHQvw1a6fUEmCoE7ki6K9btSJ/JUZ3dkapA
Date: Thu, 16 Jul 2015 05:42:36 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B93300535C5A7@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
References: <1436204168109.20146@bt.com> <1436205703501.53882@bt.com> <787AE7BB302AE849A7480A190F8B933005359DAA@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <559FD6FF.3040003@uclouvain.be> <787AE7BB302AE849A7480A190F8B93300535BCE9@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55A672C8.7060901@uclouvain.be>
In-Reply-To: <55A672C8.7060901@uclouvain.be>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.168.234.1]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-PMX-Version: 6.2.1.2478543, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2015.7.16.45415
Archived-At: <http://mailarchive.ietf.org/arch/msg/multipathtcp/29BbYTYQFEpEiFqjWvFfWPrESww>
Subject: Re: [multipathtcp] Preparing for Prague meeting - things to delete or add to MPTCP protocol bis
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Jul 2015 05:42:41 -0000

Hi Olivier, 

Please see inline.

Cheers,
Med

> -----Message d'origine-----
> De : Olivier Bonaventure [mailto:Olivier.Bonaventure@uclouvain.be]
> Envoyé : mercredi 15 juillet 2015 16:49
> À : BOUCADAIR Mohamed IMT/OLN; philip.eardley@bt.com;
> multipathtcp@ietf.org
> Objet : Re: [multipathtcp] Preparing for Prague meeting - things to delete
> or add to MPTCP protocol bis
> 
> Med,
> 
> >>
> >>>                                           +-+-+-+-+
> >>>
> >>>         Flags is a set of 4 flags:        |C|r|r|r|
> >>>
> >>>                                           +-+-+-+-+
> >>>
> >>>         C flag MUST be set to 1 when the address/port are checked.
> >>>
> >>>         "rrr" are for future assignment as additional flag bits.
> >>>
> >>>         r bits MUST each be sent as zero and MUST be ignored on
> receipt.
> >>>
> >>
> >> However, I'm stil not convinced by the usefulness of using the C bit
> >> that you propose. If a host knows that it cannot receive a SYN over a
> >> given address, then the best solution is to not advertise this address.
> >
> > [Med] Agree. An implementation that supports the "C" flag is likely to
> advertise addresses/ports for which pinholes have been created in NATs/FWs
> and address/ports that can be used to receive incoming packets
> successfully.
> 
> 
> > The issue with the implicit approach (i.e., no C-flag) is at the server
> side: should the server interpret the advertisement of an address/port as
> an indication that packets can be sent without experiencing reachability
> issues or not?
> 
> This is what RFC6824 assumes today. ADD_ADDR is only a hint about the
> possibility of trying to reach this address. Anyway it will be a SYN and
> the host will wait for a SYN+ACK to confirm the reachability

[Med] when multiple alternate addresses are available, having the c-flag will help the remote side decide which address to pick rather than try-and-see approach that may not be optimal. c-flag can be considered an additional hint.

> 
> > The experience has shown that only the endpoint who initiated the first
> subflow can create new ones even if addresses/ports have been announced to
> the remote peer.
> 
> AFAIK, there has been no experience on letting the server create
> subflows on the Internet and see what happens. The existing
> implementation have assumed that this would be difficult and they have
> not implemented the code to allow the server to create subflows, but
> this could be done. It will likelly work in private networks or
> datacenters
> 
> >
> > The explicit approach (c-flag) explores an alternate approach that is
> worth to be investigated, IMHO.
> 
> We should probably first try to create subflows from the server. We
> might be able to install a test server to analyse this on
> multipath-tcp.org after the holidays. This could give use data on the
> possibility of creating subflows from the server and the problems that
> such a feature could cause.
> >
> >> This will typically be the case when a host is behind a NAT or a
> >> firewall (I guess that at some point middlebox vendors will include
> >> software to parse ADD_ADDR and remove the ADD_ADDR that correspond to
> >> addresses that are not reachable accoring to their policies)
> >
> > [Med] We can also consider some middleboxes (read CPEs) that will set
> the C-flag on behalf of an endpoints for a better quality of experience.
> 
> I'm not sure that expecting middleboxes to change the content of the
> ADD_ADDR is a good approach in the long term. We've seen various
> problems with middleboxes that change the content of packets
> 
> 
> Olivier
>