Re: [multipathtcp] MPTCP implementation feedback for RFC6824bis

Christoph Paasch <cpaasch@apple.com> Fri, 20 December 2019 08:43 UTC

Return-Path: <cpaasch@apple.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8F72120091 for <multipathtcp@ietfa.amsl.com>; Fri, 20 Dec 2019 00:43:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7
X-Spam-Level:
X-Spam-Status: No, score=-7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m7Z3dwyp8TE7 for <multipathtcp@ietfa.amsl.com>; Fri, 20 Dec 2019 00:43:03 -0800 (PST)
Received: from ma1-aaemail-dr-lapp02.apple.com (ma1-aaemail-dr-lapp02.apple.com [17.171.2.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ED082120026 for <multipathtcp@ietf.org>; Fri, 20 Dec 2019 00:43:02 -0800 (PST)
Received: from pps.filterd (ma1-aaemail-dr-lapp02.apple.com [127.0.0.1]) by ma1-aaemail-dr-lapp02.apple.com (8.16.0.27/8.16.0.27) with SMTP id xBK8gDvE023072; Fri, 20 Dec 2019 00:42:55 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=sender : from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=N29AMS8RpXutWjWti+2om2Joq8juKSTZjLx6EvqOdCg=; b=Dwc523QCQHgKC3pLowCjWIORomc1hNyhi0TW6JmuEsLCOdorgV/xXOeLTXYEauYpfdhi BM8UfH1KSCIl449Vfqy3IiLbjJlVFuJDYW8rCpQdRW3BPf+O+f1s3BCPCpaUJ0SqKrqt An6mcwSLXMZlEwnIVv5y3cG84XXziLBXLoZZJsjouhjhxlVyBBPcewiTS0yv3F4yn89b QZe42YE8NHYODYyd+WINUR8/CsrhuKZGRQmyht+c4bwLrH8OwuRTFflYP4lqNQ/qVma9 vxqAjeZYx7uJebLrR1CmBMCvyasExERZwJnBBMeWiGN2oLjkjSj/74MFDds4ykThWqWe Rg==
Received: from crk-mtap-sz04.euro.apple.com (crk-mtap-sz04.euro.apple.com [17.66.12.166]) by ma1-aaemail-dr-lapp02.apple.com with ESMTP id 2wyypd21gb-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Fri, 20 Dec 2019 00:42:54 -0800
Received: from crk-mmpp-sz03.euro.apple.com (crk-mmpp-sz03.euro.apple.com [17.66.12.165]) by crk-mtap-sz04.euro.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPS id <0Q2S0019VYV4CO10@crk-mtap-sz04.euro.apple.com>; Fri, 20 Dec 2019 08:42:40 +0000 (GMT)
Received: from process_milters-daemon.crk-mmpp-sz03.euro.apple.com by crk-mmpp-sz03.euro.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) id <0Q2S00D00YAATW00@crk-mmpp-sz03.euro.apple.com>; Fri, 20 Dec 2019 08:42:40 +0000 (GMT)
X-Va-A:
X-Va-T-CD: 180e5e1b6a6fda3f9ba414022b920652
X-Va-E-CD: 1267ad930a5510df15e8bf1401474564
X-Va-R-CD: d1bec3bf3ba8d66d42ac99ad7d4c4b7f
X-Va-CD: 0
X-Va-ID: f14c1822-0d0a-4ad5-b15b-e8ef8c6d96fe
X-V-A:
X-V-T-CD: 180e5e1b6a6fda3f9ba414022b920652
X-V-E-CD: 1267ad930a5510df15e8bf1401474564
X-V-R-CD: d1bec3bf3ba8d66d42ac99ad7d4c4b7f
X-V-CD: 0
X-V-ID: 36155e89-793b-4d34-b289-0ab2e5d6c602
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-12-19_08:,, signatures=0
Received: from [17.67.207.60] by crk-mmpp-sz03.euro.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPSA id <0Q2S005MOYUZF150@crk-mmpp-sz03.euro.apple.com>; Fri, 20 Dec 2019 08:42:38 +0000 (GMT)
Sender: cpaasch@apple.com
From: Christoph Paasch <cpaasch@apple.com>
Message-id: <79E2BA51-D593-4FEB-9FEC-66FCDD191873@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_88CBE486-6E1C-446A-BBC0-F153A1661394"
MIME-version: 1.0 (Mac OS X Mail 13.0 \(3601.0.10\))
Date: Fri, 20 Dec 2019 09:42:35 +0100
In-reply-to: <fa96b8487de1.5dfa0170@nic.in>
Cc: Yoshifumi Nishida <nsd.ietf@gmail.com>, MultiPath TCP - IETF WG <multipathtcp@ietf.org>, Mirja Kuehlewind <ietf@kuehlewind.net>, mptcp Upstreaming <mptcp@lists.01.org>
To: V Anil Kumar <anil@csir4pi.in>
References: <CAAK044SYBVQjk3ch5B_+oUewHvihTFFcWThr9RLP=Wxz_wjFyw@mail.gmail.com> <969B2D5D-83E7-41B8-A8DE-1D2036567401@apple.com> <fa96b8487de1.5dfa0170@nic.in>
X-Mailer: Apple Mail (2.3601.0.10)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-12-19_08:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/RmsY5AsdeqejEsJy85eWfLxhs44>
Subject: Re: [multipathtcp] MPTCP implementation feedback for RFC6824bis
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Dec 2019 08:43:06 -0000


> On Dec 18, 2019, at 6:07 AM, V Anil Kumar <anil@csir4pi.in> wrote:
> 
> Hi,
> 
> On 12/15/19 10:35 PM, Christoph Paasch <cpaasch@apple.com <mailto:cpaasch@apple.com>> wrote:
>> 
>> Hello,
>> 
>> 
>>> On Dec 15, 2019, at 12:05 PM, Yoshifumi Nishida <nsd.ietf@gmail.com <mailto:nsd.ietf@gmail.com>> wrote:
>>> 
>>> Hi,
>>> One concern I have here is this may mean we end up want all implementations to support late mapping feature.
>>> Because if an implementation that supports the feature uses it to send data, the receiver who doesn't support it will discard the packets. To avoid it, we need to mandate receivers to support it.
>> 
>> that is indeed the problem. Once we allow the sender to do late/early mappings, a receiver has to implement it to be interoperable with all implementations.
>> 
>> More inline:
>> 
>>> On Sat, Dec 14, 2019 at 5:40 AM V Anil Kumar <anil@csir4pi.in <mailto:anil@csir4pi.in>> wrote:
>>> Hi Christoph,
>>> 
>>> On 12/13/19 11:54 PM, Christoph Paasch <cpaasch@apple.com <mailto:cpaasch@apple.com>> wrote:
>>>> 
>>>> 
>> [...]
>>>> > Well it could just be due to the lack of option space insegment-1. For
>>>> > example, the sender ofsegment-1 at that instant wants to transmit multiple
>>>> > TCP options (e.g.timestamp, SACK, DSS and ADD_ADDR). Obviously, they all
>>>> > cannot fit into optionfield of one segment, and eventually the DSS
>>>> > transmission got slightly delayedby a segment or two.
>>>> 
>>>> The implementation needs to enforce a strict priority of DSS over SACK and ADD_ADDR.
>>> TCP options have evolved over a period of time, and I do not think as such any document/guidelines exist on  enforcing priority for one over the other, though it turns out be an interesting topic.  Also, more TCP options could come up in future for implementing  new features.  So, it is likely that implementations would follow different strategy when it come to option priority. 
>> 
>> This is purely an implementation choice. I don't think it is necessary to document this.
>> For example, when TCP-MD5 is used, Linux disables the TCP Timestamp option, thus enforcing priority of TCP-MD5 over Timestamps.
>> 
>> 
>> To re-iterate my earlier point: Unless there is real data about the performance benefits,... of enabling early/late mapping, my vote is to not allow these kind of mappings as they complexify implementations.
>> 
> 
> When MPTCP is used for data transfer in both directions, the need to carry both timestamp and SACK options in a data segment may not be a rare case, as data loss or out-of-order reception can happen in both directions. On such a data segment, once timestamp and SACK options are included, packing DSS with map is not feasible. Should the data segment in such case include SACK or DSS? How does the Linux implementation of MPTCP deal with such a case?
> 
It should include a DSS and fill up the remainder of the option-space with SACK-blocks. That is also what Linux does.


Christoph


>  
> 
> Anil
> 
>> 
>> 
>> 
>> 
>> Christoph
>> 
>> 
>>>> 
>>>> 
>>>> If the ADD_ADDR does not fit in the TCP-option space, it can send the
>>>> ADD_ADDR on a pure ACK. The echo-bit in the ADD_ADDR guarantee the reliable
>>>> delivery of it.
>>> I noticed this new feature in RFC 6824-bis to deliver ADD_ADDR in pure ACK and still achieve the reliability. The ability to deliver MPTCP options in pure ACK will be useful, especially for options like ADD_ADDR.   
>>>> 
>>>> 
>>>> Sure, one could argue that favoring SACK over DSS is more important. But I
>>>> think we would need data to justify that. Only very specific traffic
>>>> patterns will fall in this use-case.
>>> The bottomline is that in the event of a map being slightly delayed, i.e., delivered late with respect to the corresponding data, should  it result in resetting the subflow? 
>>> 
>>> As far as the specification is concerned, it could be liberal on accepting such maps, rather than being restrictive. Even if a current implementation cannot support this, future implementations may like to, provided the specification permits this and the implementation is willing to cop up with the associated complexity. 
>>> 
>>> Best regards,
>>> 
>>> Anil
>>>> 
>>>> 
>>>> Christoph
>>>> 
>>>> > 
>>>> >  
>>>> > 
>>>> > With regards,
>>>> > 
>>>> >  
>>>> > 
>>>> > Anil
>>>> > 
>>>> >  
>>>> > 
>>>> > > 
>>>> > > 
>>>> > > 
>>>> > > 
>>>> > > 
>>>> > > 
>>>> > > 
>>>> > > Christoph
>>>> > > 
>>>> > > 
>>>> > > > 
>>>> > > > 
>>>> > > > 
>>>> > > > Further, segment-3 cannot combine/cover the data in segment-1 and segment-3 in a "single map", as the data sequence space is not continuous, i.e., some in between data (segment-2) is mapped and transmitted through subflow-2. Here, the map in segment-3 does not even partially cover the data it carries. 
>>>> > > > 
>>>> > > > 
>>>> > > >  
>>>> > > > 
>>>> > > > Both RFC 6824 and the 6824-bis do not restrict the above scenario, and I guess the change proposed now does not permit this to happen. 
>>>> > > > 
>>>> > > > 
>>>> > > >  
>>>> > > > 
>>>> > > > Best regards, 
>>>> > > > 
>>>> > > > 
>>>> > > >  
>>>> > > > 
>>>> > > > Anil 
>>>> > > > 
>>>> > > > 
>>>> > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > That's the reason why we (the MPTCP-upstreaming community) vouch to have this case restricted.
>>>> > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > Cheers,
>>>> > > > > Christoph
>>>> > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > > 
>>>> > > > > > 
>>>> > > > > > 
>>>> > > > > > 
>>>> > > > > > 
>>>> > > > > > 
>>>> > > > > > Anil 
>>>> > > > > > 
>>>> > > > > > > 
>>>> > > > > > > 
>>>> > > > > > > 
>>>> > > > > > > 
>>>> > > > > > > 
>>>> > > > > > > 
>>>> > > > > > > 
>>>> > > > > > > 
>>>> > > > > > > 
>>>> > > > > > > 
>>>> > > > > > > 
>>>> > > > > > > Best regards,
>>>> > > > > > > 
>>>> > > > > > > Alan
>>>> > > > > > > 
>>>> > > > > > > 
>>>> > > > > > >  
>>>> > > > > > > 
>>>> > > > > > 
>>>> > > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > > 
>>>> > > > >  
>>>> > > > > 
>>>> > > > 
>>>> > > > 
>>>> > > 
>>>> > > 
>>>> > > 
>>>> > >  
>>>> > >
>>> _______________________________________________
>>> multipathtcp mailing list
>>> multipathtcp@ietf.org <mailto:multipathtcp@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/multipathtcp <https://www.ietf.org/mailman/listinfo/multipathtcp>