Re: [multipathtcp] Preparing for Prague meeting - things to delete or add to MPTCP protocol bis

Christoph Paasch <cpaasch@apple.com> Wed, 15 July 2015 15:44 UTC

Return-Path: <cpaasch@apple.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D5291ACE80 for <multipathtcp@ietfa.amsl.com>; Wed, 15 Jul 2015 08:44:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.311
X-Spam-Level:
X-Spam-Status: No, score=-4.311 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6yAiFk82woy7 for <multipathtcp@ietfa.amsl.com>; Wed, 15 Jul 2015 08:44:14 -0700 (PDT)
Received: from mail-in4.apple.com (mail-out4.apple.com [17.151.62.26]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D5CF41ACE7C for <multipathtcp@ietf.org>; Wed, 15 Jul 2015 08:44:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=apple.com; s=mailout2048s; c=relaxed/simple; q=dns/txt; i=@apple.com; t=1436975054; x=2300888654; h=From:Sender:Reply-To:Subject:Date:Message-id:To:Cc:MIME-version:Content-type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-reply-to:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=HcnHI99FqGhVS99OvuPxuyJXaOKmsasgcAlCGd2YbBo=; b=VkaOYyNMH9tU1a0QXWW8r+hIfUw7bnO8ScmbW9idli1CAiNeo7e9C1N8mOqxeNMl sNLKNEsjYqQ+ebLd4i9XUB2KSSxmDs/YdEd7vgABbRPIuyZgzrLXHiF7UnRUfyE6 k72kkubQGy8uuY3ioZ5sF1OPOFNxW21WCJgTB+O9JAFsEXsx3F34k//zt+01PKSc RINY5F9uXu+57uUV5dMCS7wtNdQjhGYicsKhpqYRPWCcxqjYQMIIoys/ePavGTQm jCIcfQvDeorGTo31XRztkbap8kpLBoel0FTH8SJOl4Uzp/f+LBHqSLJJRLBew+tN TW2guuf/Kv43U/4FUHhEHg==;
Received: from relay6.apple.com (relay6.apple.com [17.128.113.90]) by mail-in4.apple.com (Apple Secure Mail Relay) with SMTP id F8.DF.18963.ECF76A55; Wed, 15 Jul 2015 08:44:14 -0700 (PDT)
X-AuditID: 11973e12-f79456d000004a13-2f-55a67fce3b15
Received: from cardamom.apple.com (cardamom.apple.com [17.128.115.94]) (using TLS with cipher RC4-MD5 (128/128 bits)) (Client did not present a certificate) by relay6.apple.com (Apple SCV relay) with SMTP id A7.2A.14452.16176A55; Wed, 15 Jul 2015 07:42:41 -0700 (PDT)
Received: from localhost ([17.153.60.253]) by cardamom.apple.com (Oracle Communications Messaging Server 7.0.5.30.0 64bit (built Oct 22 2013)) with ESMTPSA id <0NRJ00E55D1PBX30@cardamom.apple.com> for multipathtcp@ietf.org; Wed, 15 Jul 2015 08:44:13 -0700 (PDT)
Date: Wed, 15 Jul 2015 08:44:13 -0700
From: Christoph Paasch <cpaasch@apple.com>
To: Olivier Bonaventure <Olivier.Bonaventure@uclouvain.be>
Message-id: <20150715154413.GF15860@Chimay.local>
References: <1436204168109.20146@bt.com> <1436205703501.53882@bt.com> <787AE7BB302AE849A7480A190F8B933005359DAA@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <559FD6FF.3040003@uclouvain.be> <787AE7BB302AE849A7480A190F8B93300535BCE9@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <55A672C8.7060901@uclouvain.be>
MIME-version: 1.0
Content-type: text/plain; charset="us-ascii"
Content-disposition: inline
In-reply-to: <55A672C8.7060901@uclouvain.be>
User-Agent: Mutt/1.5.23 (2014-03-12)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrMLMWRmVeSWpSXmKPExsUi2FAYpXuuflmowfvbfBafV19nc2D0WLLk J1MAYxSXTUpqTmZZapG+XQJXxtWFjewFW2Urtq9+yNzA+F6si5GTQ0LARGLxhC+MELaYxIV7 69m6GLk4hAT2Mko0zzrPCFPU8HkZI0RiIpPEwlfb2UASQgLdTBKXDiaC2CwCqhLXP8xhBbHZ BLQk3t5uB7NFBKwkTp2ezg7SzCzQxiixccVVsISwQJZEf+dSFhCbV8BQ4vuyBywQG3YySUyf uZMdIiEo8WPyPbAiZqCp63ceZ4KwpSUe/Z0BVMPBwSmgI/FmghVIWFRAReLKhLdgyyQEvrJK zGvbyzqBUXgWklGzkIyahWTUAkbmVYxCuYmZObqZeSZ6iQUFOal6yfm5mxhBoTzdTmgH46lV VocYBTgYlXh4byxZGirEmlhWXJl7iFGag0VJnPdG6rJQIYH0xJLU7NTUgtSi+KLSnNTiQ4xM HJxSDYyGNkndnR9/TlsvNKM74XpXm+Umh/hX+SbvPTQZHwpJV3D6zbugoD/p52bml/sUW+eY BPG/vWCVnmewWnXOHYntLjMZlZ/9asl6G3H/3VwDvZwFxZ2f52r+8xHdkq0VtuQNv/7hqozd 82VOfJE79PiHx5SHa6ZeSduxfn7Iqgd7Dxe9ZVu8wPyBEktxRqKhFnNRcSIAgmyfnUYCAAA=
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrGLMWRmVeSWpSXmKPExsUi2FAcp5tYuCzU4NUnfYvPq6+zOTB6LFny kymAMYrLJiU1J7MstUjfLoEr4+rCRvaCrbIV21c/ZG5gfC/WxcjJISFgItHweRkjhC0mceHe erYuRi4OIYGJTBILX21nA0kICXQzSVw6mAhiswioSlz/MIcVxGYT0JJ4e7sdzBYRsJI4dXo6 O0gzs0Abo8TGFVfBEsICWRL9nUtZQGxeAUOJ78sesEBs2MkkMX3mTnaIhKDEj8n3wIqYgaau 33mcCcKWlnj0dwZQDQcHp4COxJsJViBhUQEViSsT3rJPYBSYhaR7FpLuWUi6FzAyr2IUKErN Saw000ssKMhJ1UvOz93ECA69wqgdjA3LrQ4xCnAwKvHwFkxZGirEmlhWXJl7iFGCg1lJhPdQ 9bJQId6UxMqq1KL8+KLSnNTiQ4zSHCxK4rz7W6eECgmkJ5akZqemFqQWwWSZODilGhh1bm0O qqxxKeV9w3fc6MJtOYZ/7H99yiN1Fnhl/jV7e+fKgcUVZ0L35lW0SVx9sbPi3EznwzdCzgZH TdTu8067dXfjWrWV7HnSZjdPqT+fev1Rg9iSuIm3DB8km62IEy659kH8ha9z4NlvavZ595nn Zru//5j1eNMjkZPlbVusFRiKTeacvmWuxFKckWioxVxUnAgAam8ssjkCAAA=
Archived-At: <http://mailarchive.ietf.org/arch/msg/multipathtcp/6V-Waj-Z_rAw2uGY5rozICYtcKM>
Cc: "multipathtcp@ietf.org" <multipathtcp@ietf.org>
Subject: Re: [multipathtcp] Preparing for Prague meeting - things to delete or add to MPTCP protocol bis
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jul 2015 15:44:16 -0000

Hello,

On 15/07/15 - 16:48:40, Olivier Bonaventure wrote:
> >>>                                          +-+-+-+-+
> >>>
> >>>        Flags is a set of 4 flags:        |C|r|r|r|
> >>>
> >>>                                          +-+-+-+-+
> >>>
> >>>        C flag MUST be set to 1 when the address/port are checked.
> >>>
> >>>        "rrr" are for future assignment as additional flag bits.
> >>>
> >>>        r bits MUST each be sent as zero and MUST be ignored on receipt.
> >>>
> >>
> >>However, I'm stil not convinced by the usefulness of using the C bit
> >>that you propose. If a host knows that it cannot receive a SYN over a
> >>given address, then the best solution is to not advertise this address.
> >
> >[Med] Agree. An implementation that supports the "C" flag is likely to advertise addresses/ports for which pinholes have been created in NATs/FWs and address/ports that can be used to receive incoming packets successfully.
> 
> 
> >The issue with the implicit approach (i.e., no C-flag) is at the server side: should the server interpret the advertisement of an address/port as an indication that packets can be sent without experiencing reachability issues or not?
> 
> This is what RFC6824 assumes today. ADD_ADDR is only a hint about the
> possibility of trying to reach this address. Anyway it will be a SYN and the
> host will wait for a SYN+ACK to confirm the reachability

I think, concerning the reachability, what is rather interesting is to
advertise the secondary address without wanting the peer to even try
establishing a new subflow to this address. This advertisement is done in
case the "primary" subflow becomes unreachable. If it becomes unreachable,
then the peer can use the advertised address to create a new subflow.

It's a little bit like the "handover"-mode we did some time ago in the Cellnet,
but the other way around (peer creates the subflows not the client).


Cheers,
Christoph

> >The experience has shown that only the endpoint who initiated the first subflow can create new ones even if addresses/ports have been announced to the remote peer.
> 
> AFAIK, there has been no experience on letting the server create subflows on
> the Internet and see what happens. The existing implementation have assumed
> that this would be difficult and they have not implemented the code to allow
> the server to create subflows, but this could be done. It will likelly work
> in private networks or datacenters
> 
> >
> >The explicit approach (c-flag) explores an alternate approach that is worth to be investigated, IMHO.
> 
> We should probably first try to create subflows from the server. We might be
> able to install a test server to analyse this on
> multipath-tcp.org after the holidays. This could give use data on the
> possibility of creating subflows from the server and the problems that such
> a feature could cause.
> >
> >>This will typically be the case when a host is behind a NAT or a
> >>firewall (I guess that at some point middlebox vendors will include
> >>software to parse ADD_ADDR and remove the ADD_ADDR that correspond to
> >>addresses that are not reachable accoring to their policies)
> >
> >[Med] We can also consider some middleboxes (read CPEs) that will set the C-flag on behalf of an endpoints for a better quality of experience.
> 
> I'm not sure that expecting middleboxes to change the content of the
> ADD_ADDR is a good approach in the long term. We've seen various problems
> with middleboxes that change the content of packets
> 
> 
> Olivier
> 
> 
> _______________________________________________
> multipathtcp mailing list
> multipathtcp@ietf.org
> https://www.ietf.org/mailman/listinfo/multipathtcp