[multipathtcp] MPTCP Interim September 10 - Meeting Notes
"Ivancic, William D. (GRC-LCA0)" <william.d.ivancic@nasa.gov> Thu, 10 September 2015 18:15 UTC
Return-Path: <william.d.ivancic@nasa.gov>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 264B01B3E4E for <multipathtcp@ietfa.amsl.com>; Thu, 10 Sep 2015 11:15:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level:
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PD42S7EDD5Th for <multipathtcp@ietfa.amsl.com>; Thu, 10 Sep 2015 11:15:54 -0700 (PDT)
Received: from ndjsvnpf104.ndc.nasa.gov (NDJSVNPF104.ndc.nasa.gov [198.117.1.154]) by ietfa.amsl.com (Postfix) with ESMTP id 32D1D1AC432 for <multipathtcp@ietf.org>; Thu, 10 Sep 2015 11:15:53 -0700 (PDT)
Received: from ndjsppt105.ndc.nasa.gov (ndjsppt105.ndc.nasa.gov [198.117.1.199]) by ndjsvnpf104.ndc.nasa.gov (Postfix) with ESMTP id 642BC4063232 for <multipathtcp@ietf.org>; Thu, 10 Sep 2015 13:15:52 -0500 (CDT)
Received: from NDJSCHT112.ndc.nasa.gov (ndjscht112-pub.ndc.nasa.gov [198.117.1.212]) by ndjsppt105.ndc.nasa.gov (8.15.0.59/8.15.0.59) with ESMTP id t8AIFqYb010239 for <multipathtcp@ietf.org>; Thu, 10 Sep 2015 13:15:52 -0500
Received: from NDJSMBX203.ndc.nasa.gov ([169.254.2.14]) by NDJSCHT112.ndc.nasa.gov ([198.117.1.212]) with mapi id 14.03.0248.002; Thu, 10 Sep 2015 13:15:52 -0500
From: "Ivancic, William D. (GRC-LCA0)" <william.d.ivancic@nasa.gov>
To: "multipathtcp@ietf.org" <multipathtcp@ietf.org>
Thread-Topic: MPTCP Interim September 10 - Meeting Notes
Thread-Index: AQHQ6/S51TQ5Yvq/h0mu8e6yQOieJA==
Date: Thu, 10 Sep 2015 18:15:51 +0000
Message-ID: <D217405D.35070%william.d.ivancic@nasa.gov>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.5.3.150624
x-originating-ip: [139.88.111.195]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <51486B0122A2D34E9A7F5F814C8207A7@mail.nasa.gov>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2015-09-10_05:, , signatures=0
Archived-At: <http://mailarchive.ietf.org/arch/msg/multipathtcp/UIfl_hx8XKZHUyNyBRsPmMgU7xA>
Subject: [multipathtcp] MPTCP Interim September 10 - Meeting Notes
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Sep 2015 18:15:57 -0000
IETF - MPTCPSlides are here at bottom of page: https://tools.ietf.org/wg/mptcp/trac/wiki/Interim_Sept_2015 Note Taker: Will Ivancic Note, I did not try and capture names to questions. * Agenda * Status * Removing Charter item, ³Implementation advice (Informational) to IESG² * MPTCP use cases - Enhancement Opportunities * Short Flows vs Long Flow - really need to have some strategy / demarcation. * Elastic vs Inelastic Applications * MPTCP path selections * high packet loss and high latency * multiple profiles * roaming * Controlling number of sub flow getting created * Can this be controlled? How? * Security has many open issues - TBD * Discussion * Choice of path selection is interesting area to explore * Some tools already exist in MPTCP - how to use them requires communication of deployment experience * Looking more from ISP point of view than end-user point of view * MPTCP for Channel Bonding - NASA Atmospheric research * Uses 4 Iridium Modems at 2.4 kbps each (9600 bps total) * Discussion * Which kind of stack are you going to use? Existing or otherwise * Will Ivancic - we plan on using the existing implementations. * What is the schedule? * Will - we are currently working with PPP-MP, which has a lot of options that can be tweaked, we will then move on to MPTCP * Matt Sargent - We have not installed a MPTCP stack yet, but we have been seeing that PPP has issue with the length of time needed to detect a loss. So it will be interesting to see how MPTCP handles the same problem of detection of the lost link. * Will - Results will be published. * This is an interesting use case of MPTCP * * Will Ivancic- Yes it should be interesting to see how it compares as it might be tough with the environment. * Chair - Yes it was *really* interesting to hear about the use case as it is a *really* low bit rate. * MPTCP Proxy Considerations * support use of MPTCP when one or both peers are not capable of MPTCP. * Traffic aggregation * Firewalls may disable MPTCP * traffic aggregation could break security deployments * Next Steps * welcome comments * looking for people interested in forming design team * Discussion * Bits to set proxy (should those be in updated MPTCP draft, RFC6825bis?) * Open Issues * 8 bit vs 16 bit for mptcp-exp-option * Original was 16 vs 32 - why so large (32) * 8 bits seems to small, 16 appears fine for vendor experimental options and/or deployments. * Do not want vendor specific deployments - for experimentation, OK, but not operations or no interoperability. * Paasch - 8 bits keeps options down and reduces chance of incompatible implementations * 8-bit will be sent to list * ADD_ADDR2 Flags field format will be sent to mail list. * Making MPTCP robust for stateless webserveres * Used to handle SYN-flooding attacks * Currently loss of third ACK in MPTCP will result in a fallback to regular TCP * Problem for lossy path (where MPTCP would/should provide benefit) * Suggestions - Make MP_CAPABLE reliable * merge MP_CAPABLE with DSS-option * MP_CAPABLE implementation would reduce MP_CAPABLE by 4 bytes * Should this be included in RFC6824bis? * Nigel Wiolliams - should have been in original version but was oversight - in favor of inclusion. * What happens if client does not send data? * Need to look at load balance issues regarding this solution. * Load Balancer and MPTCP * Intro on how load balancers operate. * multiple servers represented by single IP address * adding or removing servers requires different solution then ECMP so stageful layer-4 load balancer (stageful) is used * in reality, multiple layer-4 load balancers are used. * Tutorial on how MPTCP interacts with load balancers. * Layer-4 load balancer need to track <token-to-server> mapping * Token collision of different servers are possible * Problem increases of multiple load balancers are used. * MPTCP- session may reach different load balancers * Solution Space * Need to make token-generation locally meaningful * How does one signal the token? Two current proposals * different token generation by splitting MPTCP-key into two 32bit sections. * No wire-change, but reduces entropy by 32 bits. * Explicitly generate token. * Token not related to key * consumes 4 more bytes * server needs to act stately * Conclusion Token should be locally meaningful * Guarantees uniqueness * Enables layer-4 load balancers * Signaling is open question. * Discussion * Paasch - Reuse keys looks promising * Strong assumption on attacker model. assumption is that attacker cannot eves drop on initial handshake. May not be a good assumption. * Take discussion to list and reiterate.
- [multipathtcp] MPTCP Interim September 10 - Meeti… Ivancic, William D. (GRC-LCA0)
- Re: [multipathtcp] MPTCP Interim September 10 - M… Appanasamy, Palanivelan