Re: [multipathtcp] RFC6824bis edits based on implementation feedback

<philip.eardley@bt.com> Thu, 23 January 2020 10:51 UTC

Return-Path: <philip.eardley@bt.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F461120024 for <multipathtcp@ietfa.amsl.com>; Thu, 23 Jan 2020 02:51:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=bt.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3MM6-aB7Tm2Y for <multipathtcp@ietfa.amsl.com>; Thu, 23 Jan 2020 02:51:17 -0800 (PST)
Received: from smtpe1.intersmtp.com (smtpe1.intersmtp.com [213.121.35.75]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28CB512001E for <multipathtcp@ietf.org>; Thu, 23 Jan 2020 02:51:17 -0800 (PST)
Received: from tpw09926dag15g.domain1.systemhost.net (10.9.212.31) by BWP09926080.bt.com (10.36.82.111) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1713.5; Thu, 23 Jan 2020 10:51:00 +0000
Received: from tpw09926dag04h.domain1.systemhost.net (10.9.202.31) by tpw09926dag15g.domain1.systemhost.net (10.9.212.31) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 23 Jan 2020 10:51:13 +0000
Received: from bwp09926083.bt.com (10.36.82.114) by tpw09926dag04h.domain1.systemhost.net (10.9.202.31) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Thu, 23 Jan 2020 10:51:13 +0000
Received: from GBR01-CWL-obe.outbound.protection.outlook.com (104.47.20.54) by smtpe1.intersmtp.com (10.36.82.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1713.5; Thu, 23 Jan 2020 10:51:12 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FmFqElsHtt8o0xIlrze1EPSFaVdAFVgJY2JYEQuk+hOfpKnNxzo3EEpa3HNeVHXXNhGDmfqw6jbabAMKgZWUpG298CIsLAMwB1y084vTj5zqbAN4C3hjy7Xtue7MAOPO+7M/R9loLA9XRhoBuwmIuWnvVyHPbhSMG1bx8WKxXipqEg4lVWrhCkuurwKbhl4f/HNN01RUNYblA5S6xFlAIzluKTowWd4oTFd1pqffdKTqLEZ+Ezm8csxfYO/4AaTCsIhLnWAZANmtlUxoyCKTvmpaEeiYduSuOoOQ7Ddx1f68CvEyIppJu5Vt0ak7lVoJ/A9PFLzWeqNHUqbzzqkeNQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Pbi01XcIsNPf/VtmoRuIIkonpjTkYFMjNyOc67lNrPI=; b=dppqgMTgNRd7GYcqjcaHCTbCxQhC/AwzRC4SbaEtpNPOIotAKMeXVFBLroG9Gy+C7wrpw0u8ObljKyAdSyv6J1TqI8Wik7LJTZLxzp22zMmfhmSUnV/nPRvgiksWweSx+bAS5H4IzBBLeKNaBQg1oUt82jEJ4pX0KIi5ppBeCQk/xmaMtCBjHXpH/l2dc9pre+/+7d7etqUlZN8yC7U8uzX/OmQiC29Qi+XvfLP4SQzpAfcnJtlf23oZb9FXybY003TKGuKOu7E6QKB7xyH+ItHlzQmSC4HvITIdLqRajLHJBpYYeUoMy8iFigPZieNq2+PQ6H/1ALTyxW24pjX6cw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=bt.com; dmarc=pass action=none header.from=bt.com; dkim=pass header.d=bt.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bt.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Pbi01XcIsNPf/VtmoRuIIkonpjTkYFMjNyOc67lNrPI=; b=K4Shhrrt4UbR9w6sDaw6JCot5v654olOMlVPiL7IpWXv9I3OQvfK5TxUNk5qjS1bWtF/x/r3UIJ+9cHY4MrdszuXszfTkCvogNIeUoYwN63PcZbzqiZhDPAVQyXAG7PcW6w62WcbLttkCCeSwjWtaFTi64oN6UkKWFF0qogCyGg=
Received: from LNXP123MB2587.GBRP123.PROD.OUTLOOK.COM (20.179.128.78) by LNXP123MB2603.GBRP123.PROD.OUTLOOK.COM (20.179.129.14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2644.19; Thu, 23 Jan 2020 10:51:12 +0000
Received: from LNXP123MB2587.GBRP123.PROD.OUTLOOK.COM ([fe80::a047:560f:3d4a:c70e]) by LNXP123MB2587.GBRP123.PROD.OUTLOOK.COM ([fe80::a047:560f:3d4a:c70e%6]) with mapi id 15.20.2644.027; Thu, 23 Jan 2020 10:51:11 +0000
From: philip.eardley@bt.com
To: anil@csir4pi.in, alan.ford@gmail.com
CC: multipathtcp@ietf.org
Thread-Topic: RFC6824bis edits based on implementation feedback
Thread-Index: AQHVyj80o8M/FtfyR0CjWYqRt2DWKKf4ITHw
Date: Thu, 23 Jan 2020 10:51:11 +0000
Message-ID: <LNXP123MB258741FFFC614B1640A00C5AEB0F0@LNXP123MB2587.GBRP123.PROD.OUTLOOK.COM>
References: <C36D742F-6D76-48FA-B6D8-44DE484A9E2C@gmail.com> <882106347.533187.1578939921488@csir4pi.in>
In-Reply-To: <882106347.533187.1578939921488@csir4pi.in>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=philip.eardley@bt.com;
x-originating-ip: [193.113.37.9]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ef8ee711-94a6-49a4-71bc-08d79ff22942
x-ms-traffictypediagnostic: LNXP123MB2603:
x-microsoft-antispam-prvs: <LNXP123MB2603BCF50D02D090A9D1A3F2EB0F0@LNXP123MB2603.GBRP123.PROD.OUTLOOK.COM>
x-antispam-2: 1
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 029174C036
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(136003)(366004)(396003)(346002)(39860400002)(376002)(199004)(189003)(86362001)(316002)(2906002)(5660300002)(186003)(110136005)(66556008)(9686003)(81166006)(52536014)(66446008)(55016002)(8936002)(64756008)(66476007)(76116006)(66946007)(8676002)(81156014)(26005)(53546011)(33656002)(966005)(4326008)(6506007)(478600001)(71200400001)(7696005); DIR:OUT; SFP:1101; SCL:1; SRVR:LNXP123MB2603; H:LNXP123MB2587.GBRP123.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: bt.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 7CNyPLQdPMJTvtydMGDzvaMUv0Wdu7RExe9jInZZTNAUtECRTMrtx3HYjgr8iYgWk9Vd78xv0fDIjTOWX8jOLZZJFRAyEsJRgSOzGA60aer3M9hyHG8as61bulHe63qXrlbbIHKBRSpZ9390kY+1J8NcDyR5qZjHhdtwar2K8ogR0NKd099B7RQGt61VhVp+1kRoEYh8X6ydJbKR5v4rBsENlFVvvDT9xMXZ+vv+LxbTlbUMnDdS4iQWn/UJQEDlEccRBJ86pujfM7xBKyk0HGxCMPBjHOM26tHRU9zOOgCrbnUIaGmVCP/9LEvHS1e4HF+m1Mh+COBl0XRb+CLftC/qvhLaS1bwLa5nK/0j24hpdK2IHlmcWI0Rk9ZUk7Ngjl3/7f7znxnqazGNB/MIGRQDs058XuWr43fL+mLfSg6PqERpdYalSTUo1vz9SJlJ7r/MAzrnFwDSsd9vR9T5R5SSnc05IkMeOzd3FI040yk=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_LNXP123MB258741FFFC614B1640A00C5AEB0F0LNXP123MB2587GBRP_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: ef8ee711-94a6-49a4-71bc-08d79ff22942
X-MS-Exchange-CrossTenant-originalarrivaltime: 23 Jan 2020 10:51:11.7747 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: a7f35688-9c00-4d5e-ba41-29f146377ab0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: hMjAot/i+7Ec/UhQtq/UrInATJFOOirwxx2nsZZ9iSEetwMxEUTkdjWWvbHlZ5drIz0SsiW18lFo/n4w5aMY3A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LNXP123MB2603
X-OriginatorOrg: bt.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/9uXQvp8VgOHHo_VskJhm9uFqZ5s>
Subject: Re: [multipathtcp] RFC6824bis edits based on implementation feedback
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Jan 2020 10:51:22 -0000

I haven’t seen any responses about this. Please follow-up if you care about the issue.

Alan – please consider Change 1 as agreed.


From: multipathtcp <multipathtcp-bounces@ietf.org> On Behalf Of V Anil Kumar
Sent: 13 January 2020 18:25
To: alan ford <alan.ford@gmail.com>
Cc: multipathtcp@ietf.org
Subject: Re: [multipathtcp] RFC6824bis edits based on implementation feedback

Hi,

I have some points related to the  modifications (Change 2) being proposed on data sequence map. Please see them inline. Though I am putting forward the below points, if the consensus is in favour of the proposed change for reducing implementation complexity, I am also OK with that as well.

________________________________
From: "alan ford" <alan.ford@gmail.com<mailto:alan.ford@gmail.com>>
To: multipathtcp@ietf.org<mailto:multipathtcp@ietf.org>
Sent: Thursday, January 2, 2020 4:21:32 AM
Subject: [multipathtcp] RFC6824bis edits based on implementation feedback

Hi all,

We’d love to get this to a state of completion as soon as possible, and to this end I am starting a new thread on this topic. In discussion with the chairs, it is possible to make the desired changes in AUTH48 as long as there is WG consensus. The discussion so far has been fairly limited in terms of participation.

I would ask the chairs please if it was possible to specify a time bound for this discussion and a default conclusion.

Regarding the changes, in summary, there are two areas where changes have been requested by the implementation community. As we are the IETF we obviously have strong focus on “running code” and so ease of implementing standards-compliant code is strongly desirable. However, we do not wish to reduce functionality agreed by the IETF community if it is considered a required feature by the community.


Change 1

Change the sentence reading:

   If B has data to send first, then the reliable delivery of the ACK + MP_CAPABLE can be inferred by the receipt of this data with an MPTCP Data Sequence Signal (DSS) option (Section 3.3).

To:

   If B has data to send first, then the reliable delivery of the ACK + MP_CAPABLE is ensured by the receipt of this data with an MPTCP Data Sequence Signal (DSS) option (Section 3.3) containing a DATA_ACK for the MP_CAPABLE (which is the first octet of the data sequence space).
What this means:

The current text is concerned only with ensuring a path is MPTCP capable, and so only cares that DSS option occurs on a data packet. However, the MP_CAPABLE option is defined to occupy the first octet of data sequence space and thus, if analogous to TCP, must be acknowledged. >From an implementation point of view it would make sense not to have this hanging around forever and instead define it is acknowledged at the connection level as soon as received. This change ensures the first data packet also DATA_ACKs this MP_CAPABLE octet.


Change 2

Change the sentence reading:

   A Data Sequence Mapping does not need to be included in every MPTCP packet, as long as the subflow sequence space in that packet is covered by a mapping known at the receiver.

To:

   The mapping provided by a Data Sequence Mapping MUST apply to some or all of the subflow sequence space in the TCP segment which carries the option. It does not need to be included in every MPTCP packet, as long as the subflow sequence space in that packet is covered by a mapping known at the receiver.

What this means:

The current text does not place any restrictions on where a mapping could appear. In theory a sender could define a thousand different mappings up front, send them all, and expect a receiver to store this and reassemble data according to these mappings as it arrives. Indeed, this was never explicitly disallowed since it “might have been useful”. The implementation community, however, has expressed concerns over the difficulty of implementing this open-endedly. How many mappings is it reasonable to store? Is there a DoS risk here? Instead, it has been requested that thee specification restricts the placement of the DSS option to being within the subflow sequence space to which it applies.

Below are my comments on this. I had shared some of these points in a previous thread that you had initiated in the same context.

Transmitting large number of non-contiguous data sequence maps could be a misbehaviour (map-flooding), though it is not clear whether this can go to the extent of causing a potential DoS to the data receiver. So some sort of restriction on this could be useful.  One approach could be to insist that the data sender should ensure that the map being transmitted is for in-window data, as per the receiver advertised window. A receiver should anyhow be willing to store the maps for in-window data to deal with packet loss. For example, when a window of data segments (say 1 to 64) is transmitted, each carrying its corresponding map, and segment-1 is lost, the maps for the remaining 63 need to be stored till the lost segment is retransmitted. Of course, in this case the maps will be stored at the receiver side along with their corresponding data. But the need to store multiple maps for in-window data would still be there.

The problem with the proposed change (restriction) is that a data sender may find it difficult, in case a need arise to slightly delay the map delivery by few segments, i.e., sending some data first without map, and then send the corresponding map in a later segment, as shown below:


subflow-1:      segment-1                   segment-3                    segment-4                       segment-7
                      bytes:1-100                 bytes:201-300              bytes:301-400                 bytes:601-700
                      no map                        map for 1-100              map for 201-400             map for 601-700





subflow-2:       segment-2                  segment-5                     segment-6                       segment-8
                       bytes: 101-200           bytes:401-500               bytes: 501-600                bytes:701-800
                       map for 101-200       map for 401-600            no map                            map for 701-800


In the above case, segment-1 goes without map and its map is included later in segment-3, the next data segment in the same subflow. Further,  in the above scheduling pattern, the map in segment-3 cannot cover the  data in segment-1 and segment-3, as some  data in between (segment-2) is transmitted through another subflow.  With the proposed change, the map in segment-3 will become invalid and this will eventually break subflow-1, though this could be a corner case.

The question at this stage is why would segment-1 be transmitted without its map. In the case of bidirectional data transfer, there could be a need to pack both timestamp and SACK  options in a data segment, i.e., piggybacking of  SACK with data. If we consider that timestamp takes 12 bytes and SACK, even with single block,  takes another 10 bytes, the remaining 18 bytes option space is not adequate to carry data sequence signal with map, especially when DSN is 64 bit long. So the delivery of either of the two (SACK or map) would be delayed.

As far as I understand, RFC 2018 (TCP Selective Acknowledgement Options) implies that SACK should not be delayed. It states "If sent at all, SACK options SHOULD be included in all ACKs which do not ACK the highest sequence number in the data receiver's queue". It also says "If data receiver generates SACK options under any circumstance, it SHOULD generate them under all permitted circumstances".   So, as part of meeting the RFC 2018 requirements, if the combination of SACK and timestamp is given preference over DSS, data segments could be transmitted without their map.

Another case of delaying map could arise if the data sender prefers to send ADD_ADDR option, instead of map, in a data segment. It is nice that ADD_ADDR option can be delivered reliably in a pure ACK, but I think this is not the case with DSS at present.

If we adopt the proposed change, I think it might also be helpful to spell out how the receiver is supposed to behave, if it gets maps not meeting the MUST condition in the proposed change.  For example termination of the subflow with MP_TCPRST option (section 3.6 in RFC 6824-bis) with appropriate reason code and T flag value to intimate the data sender the cause for subflow termination.

With regards,

Anil
Please can members of the WG express whether they are happy with these changes, or concerned.

Best regards,
Alan


_______________________________________________
multipathtcp mailing list
multipathtcp@ietf.org<mailto:multipathtcp@ietf.org>
https://www.ietf.org/mailman/listinfo/multipathtcp