Re: [multipathtcp] MPTCP implementation feedback for RFC6824bis

Christoph Paasch <cpaasch@apple.com> Thu, 28 November 2019 19:49 UTC

Return-Path: <cpaasch@apple.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CCEB81208C8 for <multipathtcp@ietfa.amsl.com>; Thu, 28 Nov 2019 11:49:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z3wHnqHwSLDc for <multipathtcp@ietfa.amsl.com>; Thu, 28 Nov 2019 11:49:29 -0800 (PST)
Received: from nwk-aaemail-lapp03.apple.com (nwk-aaemail-lapp03.apple.com [17.151.62.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CDC351208C7 for <multipathtcp@ietf.org>; Thu, 28 Nov 2019 11:49:29 -0800 (PST)
Received: from pps.filterd (nwk-aaemail-lapp03.apple.com [127.0.0.1]) by nwk-aaemail-lapp03.apple.com (8.16.0.27/8.16.0.27) with SMTP id xASJlJHj043857; Thu, 28 Nov 2019 11:49:15 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=sender : from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=zPVh1NPE53OsPPN+scQqX6uenVO1h+EoPfAqDdweefQ=; b=A0L8ONRpMr5WAdnSi5vWtx4eH7UQzmQOma/LAHpgdQRRMA4MtSgCKFmx/oqZUf0eyNco IWce1tdUpVhKk5G2fboLXJIWiuknQfxwscTWlE8I/Hv+bjimdS5rs4V8U4KqqWG/K5hD Vwj0kAdwdVFVsxSfq58GtT3dFdSBsdyMzIjZ/rlqVqqjF2Ht6QnjzuM6qUMzwQ3mXnjB 9FOKHvAbKmZ7rBfZsVlyRqXQITY/D3s9mdjVdJufvdmBQgxWtjQQcAP+8+cKaTRxTUDP otp8wjJvpRoQpkla/VRUIL/9VEVFckD/4PU0XSirbj/dbC2JtmWmrk6QPxV+hgilQyxB wQ==
Received: from ma1-mtap-s01.corp.apple.com (ma1-mtap-s01.corp.apple.com [17.40.76.5]) by nwk-aaemail-lapp03.apple.com with ESMTP id 2wfnvqhkm8-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Thu, 28 Nov 2019 11:49:15 -0800
Received: from nwk-mmpp-sz10.apple.com (nwk-mmpp-sz10.apple.com [17.128.115.122]) by ma1-mtap-s01.corp.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPS id <0Q1P00H4Y322IM10@ma1-mtap-s01.corp.apple.com>; Thu, 28 Nov 2019 11:49:14 -0800 (PST)
Received: from process_milters-daemon.nwk-mmpp-sz10.apple.com by nwk-mmpp-sz10.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) id <0Q1P000002K0A400@nwk-mmpp-sz10.apple.com>; Thu, 28 Nov 2019 11:49:14 -0800 (PST)
X-Va-A:
X-Va-T-CD: 3617872cb080ac0182d9b2453d56adc6
X-Va-E-CD: 5a5a60e6f040669a01f467acbb8066aa
X-Va-R-CD: 3858de275c7eacb246074420dbf98e80
X-Va-CD: 0
X-Va-ID: af08df6a-0b9a-4e7d-946d-0177027845e8
X-V-A:
X-V-T-CD: 3617872cb080ac0182d9b2453d56adc6
X-V-E-CD: 5a5a60e6f040669a01f467acbb8066aa
X-V-R-CD: 3858de275c7eacb246074420dbf98e80
X-V-CD: 0
X-V-ID: 998c604a-e63c-4cbe-b17c-a31b3bc2bb6e
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-11-28_06:,, signatures=0
Received: from [17.234.55.227] by nwk-mmpp-sz10.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPSA id <0Q1P00K8L3202G20@nwk-mmpp-sz10.apple.com>; Thu, 28 Nov 2019 11:49:14 -0800 (PST)
Sender: cpaasch@apple.com
From: Christoph Paasch <cpaasch@apple.com>
Message-id: <3F1F1135-D2C0-48E2-9B6E-A83DDC11DF4F@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_2C15FA0F-F36B-445F-801F-48CF9134A510"
MIME-version: 1.0 (Mac OS X Mail 13.0 \(3601.0.10\))
Date: Thu, 28 Nov 2019 11:49:12 -0800
In-reply-to: <D070F2D5-6E8C-4551-86DD-E50B4ADF11B7@gmail.com>
Cc: MultiPath TCP - IETF WG <multipathtcp@ietf.org>, Yoshifumi Nishida <nsd.ietf@gmail.com>, Philip Eardley <philip.eardley@bt.com>, Mirja Kuehlewind <ietf@kuehlewind.net>, mptcp Upstreaming <mptcp@lists.01.org>
To: Alan Ford <alan.ford@gmail.com>
References: <17233788-D98B-4484-B785-2F58D43EA7CA@apple.com> <D070F2D5-6E8C-4551-86DD-E50B4ADF11B7@gmail.com>
X-Mailer: Apple Mail (2.3601.0.10)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-11-28_06:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/SwbuxeKdvqPRn6gK6ryh7YNoyoU>
Subject: Re: [multipathtcp] MPTCP implementation feedback for RFC6824bis
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Nov 2019 19:49:32 -0000

Hello Alan,

> On Nov 28, 2019, at 8:16 AM, Alan Ford <alan.ford@gmail.com> wrote:
> 
> Hi Christoph,
> 
> Thank you for the feedback. Comments inline...
> 
>> On 27 Nov 2019, at 19:29, Christoph Paasch <cpaasch@apple.com <mailto:cpaasch@apple.com>> wrote:
>> 
>> Hello,
>> 
>> as I mentioned during the meeting last week in Singapore, the team working on upstreaming MPTCP into the Linux Kernel has some feedback on RFC6824bis that would be good to be factored into the RFC before publication.
>> 
>> Here is the list of comments/changes the team is suggesting:
>> 
>> Section 3.1, page 19, "If B has data to send first,..."
>> 
>> The first phrase states that when A receives a DSS from B it indicates successful delivery of the MP_CAPABLE. However, it is not the DSS but rather the DATA_ACK that indicates this. Digging through some past e-mail exchanges I had with Alan I see that that was indeed the intention.
>> 
>> We are thus suggesting to change this text to:
>> If B has data to send first, then the reliable delivery of the ACK+MP_CAPABLE can be inferred by the receipt of this data with a MPTCP Data Sequence Signal (DSS) option that includes a DATA_ACK (Section 3.3). Further, whenever A receives a DATA_ACK from B it is a signal of the reliable delivery of A's MP_CAPABLE. After this, A can send data to B with a regular DSS option.
> 
> That seems entirely logical clarification, and was the intention anyway. A developer probably infers the meaning but clarification is no bad thing.

Sounds good! It would be good to clarify this.

> 
>> Section 3.3.1, page 32 & 33, "A data sequence mapping does not need..."
>> 
>> This paragraph states that it is permissive to send a mapping in advance. Late-mapping is specified a bit higher around the sentence 
>> "Implementations MAY hold onto such unmapped data for a short while in the expectation that a mapping will arrive shortly"
>> 
>> This kind of early/late mapping announcements are difficult to handle in an implementation. The Linux Kernel implementation of multipath-tcp.org <http://multipath-tcp.org/> has always disallowed such kind of mappings. Meaning, whenever a DSS-option is received such that the range specified by the relative subflow-sequence number in the DSS-option and the data-length does not (partially) cover the TCP sequence number of the packet itself, the subflow will be killed with a TCP-RST. The problem around handling such early/late mappings is that it is unclear for how long the stack needs to remember these mappings (in the early-mapping case), or for how long he needs to hold on to the data (in the late-mapping case).
>> 
>> We thus suggest to change this to the following:
>> Whenever a DSS-option is received on a packet such that the mapping of the subflow-sequence space does not partially cover the TCP-sequence number of  the packet itself, the host MUST discard this mapping and MAY destroy the subflow with a TCP-RST. It should be noted that a DATA_FIN that does not come with data has a relative subflow-sequence number of 0 and thus should be handled separately.
> 
> This one I do have an issue with:
> 
> - It is a technical change
> - Wording to this effect has been in the document since pretty much the beginning
> - It is a MAY which might as well say “there is no guarantee this would work”

The problem with the MAY is that the sender can't really know if the receiver accepts it (more regarding this below)

> Most importantly, the replacement text seems not to address this issue at all. If I read it correctly, it says that the data sequence mapping option MUST partially cover the subflow sequence space of the packet itself. But that has nothing to do with late or early mapping, both could partially cover the subflow sequence space and preceding data.
> 
> Can you clarify exactly what you want to permit and prevent, here?

Let me try to clarify what exactly we mean with early/late mapping so that we are all on the same terms here:

Early mapping:

A TCP-segment with sequence-number 1 holds a DSS-option with subflow-sequence number 1001 and data-length 100. This means we need to allocate space to store this DSS-option so that when the TCP-segment with seqno 1001 arrives we can know the mapping. There may be coming more of these DSS-options which all need to be stored in allocated memory. It is unclear what the limit to this is and there is no way to communicate this limit to the sender.

Late mapping:

The receiver receives data without DSS-options with TCP-sequence 1 to 1001. The corresponding DSS-option however arrives with the TCP-segment with seqno 2001. Here, the receiver needs to hold on to this data, waiting for the TCP-segment with the DSS-option. At one point the receiver needs to drop the data due to memory limits. Again, the sender has no way for knowing what this limit is.


When the DSS-option comes together with the corresponding TCP-sequence it is straight-forward to store it together with the data. There are no issues with memory-allocation,... as all of this is accounted together with the announced window (yes, the memory is not counted against the window, but the receiver can foresee the DSS-option overhead when computing what window he should announce).

When a receiver gets data without a DSS-option, he can store it for up to 64KB of data as that is the maximum data-level length and the last segment of the 64KB-train could be holding the DSS-option. After that he has to drop the data.

When the mapping partially covers the segment it also isn't a problem as the unmapped part can safely be dropped and the mapped part can be passed on to the MPTCP-layer.

All of this does not imply that every segment of a mapping needs to hold the DSS-option. Just one of them needs to have it.


Does this help? It is all about making things more deterministic as it is very hard for the receiver to handle these late/early mappings.

Thanks,
Christoph