Re: [multipathtcp] MPTCP implementation feedback for RFC6824bis

Alan Ford <alan.ford@gmail.com> Tue, 10 December 2019 16:09 UTC

Return-Path: <alan.ford@gmail.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E364E120024 for <multipathtcp@ietfa.amsl.com>; Tue, 10 Dec 2019 08:09:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LRbCyZR1QRXc for <multipathtcp@ietfa.amsl.com>; Tue, 10 Dec 2019 08:09:12 -0800 (PST)
Received: from mail-lf1-x131.google.com (mail-lf1-x131.google.com [IPv6:2a00:1450:4864:20::131]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD48B120100 for <multipathtcp@ietf.org>; Tue, 10 Dec 2019 08:09:11 -0800 (PST)
Received: by mail-lf1-x131.google.com with SMTP id m30so14145189lfp.8 for <multipathtcp@ietf.org>; Tue, 10 Dec 2019 08:09:11 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=d3vVyfrHHdgocdf4uvVNri058nAzfb+5GH3vsCOq3Q0=; b=Dta7qwszc3pJATTCfTo79yc9LAzcDjlw7v0hDqwTc9oiaiAClCheYz8JVNk9ONecSc tA0eZDmbTHGZr/3pGhLaNeg32UgjDzzzJ7U2yKlC4aGwRnZhpP3k0zCggp6cSoLiDQFY PDXoKjOJHjN2ngfHMl4BDo1Zn/rorjdTUAt6ZOviuQqqoSButEbNiruH1MaXyZT7y/3b 5PtLy6S9vpjYJRqaoCMc06Xw+CvwhO6+7Js9f4bDJOId00zBfvZVzj/PG7ieklkSAoji g0s/U72qj1VZZ3VTEe7SWZBXUL5M2IbXYIbJ+xZlZTcwUnvcDx9LyvvO123DzYdykhby z+Sw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=d3vVyfrHHdgocdf4uvVNri058nAzfb+5GH3vsCOq3Q0=; b=jU3M0vt/Aht7JGfXIinm54z4Ne+aPjfLC+tG15vpSiT2ELs0JHi7kvUeuMgDKRIMtC qgTcLYvpbavla8gIIchdAM1VRMTQjF8E839xNPQZL0cS65s4lDX+g3wygG0DupRVER0p /Dyz1mFP5iHYhVOughJWS8XRCSqGTph9e104SgZfViIcaRcraQ97OJs2zX+jqL7Vcd9R uFp4lX2V13Dxo+5FDo2oDvl6MP9CBh8jqQYInG6A1Iss4DZxtvXEHBnPgP3iQetja9gu jcEsLWneL00u9lRelS9Zn5INLik+qNrYcqRJYsFE0xgiOow+XO0/GRi2DrDiz6/vAppI MAHg==
X-Gm-Message-State: APjAAAXWwPt94VoTHZFYUEx4SHZfleeFf1aJ9eQl2JAHzRCCZvJaQfjC QynJDf4pNqY7ykOmqr39crgrENDB9z8=
X-Google-Smtp-Source: APXvYqw3aakFnpg9n2C2EzE37IhY8CgWFtQHctZaRUGcaWj82cqdy1hakC6cnDx+iyhQUs0jYvddqA==
X-Received: by 2002:ac2:420e:: with SMTP id y14mr19802116lfh.145.1575994149969; Tue, 10 Dec 2019 08:09:09 -0800 (PST)
Received: from [10.247.250.190] ([91.205.184.18]) by smtp.gmail.com with ESMTPSA id q12sm2049316ljc.74.2019.12.10.08.09.07 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 10 Dec 2019 08:09:07 -0800 (PST)
From: Alan Ford <alan.ford@gmail.com>
Message-Id: <63E04612-7410-4E38-BE19-F2351C23C7F7@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_A1AEFF7C-33C0-442B-BFD9-9D144ACC2383"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Date: Tue, 10 Dec 2019 16:09:04 +0000
In-Reply-To: <CAAK044RLUJSZEcyuv1FmPGmOA0pCMKLBD8EzXZn9h23ZCfaYWA@mail.gmail.com>
Cc: Christoph Paasch <cpaasch@apple.com>, MultiPath TCP - IETF WG <multipathtcp@ietf.org>, Philip Eardley <philip.eardley@bt.com>, Mirja Kuehlewind <ietf@kuehlewind.net>, mptcp Upstreaming <mptcp@lists.01.org>
To: Yoshifumi Nishida <nsd.ietf@gmail.com>
References: <17233788-D98B-4484-B785-2F58D43EA7CA@apple.com> <D070F2D5-6E8C-4551-86DD-E50B4ADF11B7@gmail.com> <3F1F1135-D2C0-48E2-9B6E-A83DDC11DF4F@apple.com> <83BFBFD6-255E-4022-96D4-BE183B709CB2@gmail.com> <20191202172757.GA84163@MacBook-Pro-64.local> <CF3EBAFD-E24E-4233-8FCE-775396E747A2@gmail.com> <D784F90C-5027-4753-9088-00CF25D22DFD@apple.com> <3278EB11-686A-4E0F-9DE4-321B239F8913@gmail.com> <DEE3E51B-373C-40BE-A296-8517FB23A7B7@apple.com> <6978C97F-24D5-4CF0-8CEB-2F58BE26D174@gmail.com> <CAAK044RLUJSZEcyuv1FmPGmOA0pCMKLBD8EzXZn9h23ZCfaYWA@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/K0YejV3cFeel8VF6bw8cOOFp7nc>
Subject: Re: [multipathtcp] MPTCP implementation feedback for RFC6824bis
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Dec 2019 16:09:14 -0000

Hi Yoshifumi,

> On 10 Dec 2019, at 05:30, Yoshifumi Nishida <nsd.ietf@gmail.com> wrote:
> 
> Hi Alan,
> 
> The texts look fine to me, but I have a few questions on them.
> 
> On Fri, Dec 6, 2019 at 7:58 AM Alan Ford <alan.ford@gmail.com <mailto:alan.ford@gmail.com>> wrote:
> Hi all,
> 
> Following on from the discussion of implementation feedback with Christoph, I propose the following edits to RFC6824bis - which is currently in AUTH48 - as clarifications.
> 
> ADs, please can you confirm you consider these edits sufficiently editorial to fit into AUTH48.
> 
> WG participants, please speak up if you have any concerns.
> 
> 
> Edit 1, clarifying reliability of MP_CAPABLE
> 
> Change the sentence reading:
> 
>    The SYN with MP_CAPABLE occupies the first octet of data sequence space, although this does not need to be acknowledged at the connection level until the first data is sent (see Section 3.3).
> 
> To:
> 
>    The SYN with MP_CAPABLE occupies the first octet of data sequence space, and this MUST be acknowledged at the connection level at or before the time the first data is sent or received (see Section 3.3).
> 
> What implementations should do when they receive the first data before MP_CAPABLE is acked?
> They should terminate the connection or discard the data?

By asking this question you have made me realise that this text is in fact incompatible with the case when A (the initiator) is also the first sender of data.

Given the problem is only with B sending data first, let us forget this change, and revert to Christoph’s original problem text, and use only the below change:

> Change the sentence reading:
> 
>    If B has data to send first, then the reliable delivery of the ACK + MP_CAPABLE can be inferred by the receipt of this data with an MPTCP Data Sequence Signal (DSS) option (Section 3.3). 
> 
> To:
> 
>    If B has data to send first, then the reliable delivery of the ACK + MP_CAPABLE is ensured by the receipt of this data with an MPTCP Data Sequence Signal (DSS) option (Section 3.3) containing a DATA_ACK for the MP_CAPABLE (which is the first octet of the data sequence space).

This will resolve the ambiguity in the case of B sending first.

> In my personal opinion either one of these edits would be sufficient for making the point, however clearly this has caused some confusion amongst the implementor community so making both these changes should make it absolutely clear as to the expected behaviour here.
> 
> 
> Edit 2, mapping constraint
> 
> Change the sentence reading:
> 
>    A Data Sequence Mapping does not need to be included in every MPTCP packet, as long as the subflow sequence space in that packet is covered by a mapping known at the receiver.
> 
> To:
> 
>    A Data Sequence Mapping MUST appear on a TCP segment which is covered by the mapping. It does not need to be included in every MPTCP packet, as long as the subflow sequence space in that packet is covered by a mapping known at the receiver.
> 
> 
> What implementations should do when a Data Sequence Mapping doesn't cover the TCP segment that carries this option?

There are a number of cases where the MUST does not have a consequence; it should be obvious from the text for similar failures that it can close it with a RST.

> BTW, This is not a strong opinion, but I may prefer a text like: "A Data Sequence Mapping MUST provide the mapping for the segment that carries this option.” 

OK how about: "A Data Sequence Mapping MUST provide the mapping which includes the segment that carries this option.” 

Regards,
Alan