[multipathtcp] MPTCP Interim September 10 - Meeting Notes

"Ivancic, William D. (GRC-LCA0)" <william.d.ivancic@nasa.gov> Thu, 10 September 2015 18:15 UTC

Return-Path: <william.d.ivancic@nasa.gov>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 264B01B3E4E for <multipathtcp@ietfa.amsl.com>; Thu, 10 Sep 2015 11:15:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level:
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PD42S7EDD5Th for <multipathtcp@ietfa.amsl.com>; Thu, 10 Sep 2015 11:15:54 -0700 (PDT)
Received: from ndjsvnpf104.ndc.nasa.gov (NDJSVNPF104.ndc.nasa.gov [198.117.1.154]) by ietfa.amsl.com (Postfix) with ESMTP id 32D1D1AC432 for <multipathtcp@ietf.org>; Thu, 10 Sep 2015 11:15:53 -0700 (PDT)
Received: from ndjsppt105.ndc.nasa.gov (ndjsppt105.ndc.nasa.gov [198.117.1.199]) by ndjsvnpf104.ndc.nasa.gov (Postfix) with ESMTP id 642BC4063232 for <multipathtcp@ietf.org>; Thu, 10 Sep 2015 13:15:52 -0500 (CDT)
Received: from NDJSCHT112.ndc.nasa.gov (ndjscht112-pub.ndc.nasa.gov [198.117.1.212]) by ndjsppt105.ndc.nasa.gov (8.15.0.59/8.15.0.59) with ESMTP id t8AIFqYb010239 for <multipathtcp@ietf.org>; Thu, 10 Sep 2015 13:15:52 -0500
Received: from NDJSMBX203.ndc.nasa.gov ([169.254.2.14]) by NDJSCHT112.ndc.nasa.gov ([198.117.1.212]) with mapi id 14.03.0248.002; Thu, 10 Sep 2015 13:15:52 -0500
From: "Ivancic, William D. (GRC-LCA0)" <william.d.ivancic@nasa.gov>
To: "multipathtcp@ietf.org" <multipathtcp@ietf.org>
Thread-Topic: MPTCP Interim September 10 - Meeting Notes
Thread-Index: AQHQ6/S51TQ5Yvq/h0mu8e6yQOieJA==
Date: Thu, 10 Sep 2015 18:15:51 +0000
Message-ID: <D217405D.35070%william.d.ivancic@nasa.gov>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.5.3.150624
x-originating-ip: [139.88.111.195]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <51486B0122A2D34E9A7F5F814C8207A7@mail.nasa.gov>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:, , definitions=2015-09-10_05:, , signatures=0
Archived-At: <http://mailarchive.ietf.org/arch/msg/multipathtcp/UIfl_hx8XKZHUyNyBRsPmMgU7xA>
Subject: [multipathtcp] MPTCP Interim September 10 - Meeting Notes
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Sep 2015 18:15:57 -0000

IETF - MPTCPSlides are here at bottom of page:
https://tools.ietf.org/wg/mptcp/trac/wiki/Interim_Sept_2015

Note Taker: Will Ivancic
Note, I did not try and capture names to questions.

* Agenda
* Status
     * Removing Charter item, ³Implementation advice (Informational) to
IESG²

* MPTCP use cases - Enhancement Opportunities
     * Short Flows vs Long Flow - really need to have some strategy /
demarcation.
     * Elastic vs Inelastic Applications
     * MPTCP path selections
          * high packet loss and high latency
          * multiple profiles
          * roaming
     * Controlling number of sub flow getting created
          * Can this be controlled? How?
     * Security has many open issues - TBD
     * Discussion
          * Choice of path selection is interesting area to explore
          * Some tools already exist in MPTCP - how to use them requires
communication of deployment experience
          * Looking more from ISP point of view than end-user point of view
* MPTCP for Channel Bonding - NASA Atmospheric research
     * Uses 4 Iridium Modems at 2.4 kbps each (9600 bps total)
     * Discussion
          *  Which kind of stack are you going to use?  Existing or
otherwise
               * Will Ivancic - we plan on using the existing
implementations.
          * What is the schedule?
               * Will - we are currently working with PPP-MP, which has a
lot of options that can be tweaked, we will then move on to MPTCP
               * Matt Sargent - We have not installed a MPTCP stack yet,
but we have been seeing that PPP has issue with the length of time needed
to detect a loss.  So it will be interesting to see how MPTCP handles the
same problem of detection of the lost link.
               * Will - Results will be published.
          * This is an interesting use case of MPTCP
     * * Will Ivancic- Yes it should be interesting to see how it compares
as it might be tough with the environment.
* Chair - Yes it was *really* interesting to hear about the use case as it
is a *really* low bit rate.


     * MPTCP Proxy Considerations
          * support use of MPTCP when one or both peers are not capable of
MPTCP.
          * Traffic aggregation
               * Firewalls may disable MPTCP
               * traffic aggregation could break security deployments
          * Next Steps
               * welcome comments
               * looking for people interested in forming design team
          * Discussion
               * Bits to set proxy (should those be in updated MPTCP
draft, RFC6825bis?)
     * Open Issues
               * 8 bit vs 16 bit for mptcp-exp-option
                    * Original was 16 vs 32 - why so large (32)
                    * 8 bits seems to small, 16 appears fine for vendor
experimental options and/or deployments.
                         * Do not want vendor specific deployments - for
experimentation, OK, but not operations or no interoperability.
                    * Paasch - 8 bits keeps options down and reduces
chance of incompatible implementations
                    * 8-bit will be sent to list
               * ADD_ADDR2  Flags field format will be sent to mail list.
          * Making MPTCP robust for stateless webserveres
               * Used to handle SYN-flooding attacks
               * Currently loss of third ACK in MPTCP will result in a
fallback to regular TCP
                    * Problem for lossy path (where MPTCP would/should
provide benefit)
               * Suggestions - Make MP_CAPABLE reliable
                    * merge MP_CAPABLE with DSS-option
                    * MP_CAPABLE implementation would reduce MP_CAPABLE by
4 bytes
                    * Should this be included in RFC6824bis?
                         * Nigel Wiolliams - should have been in original
version but was oversight - in favor of inclusion.
                         * What happens if client does not send data?
                         * Need to look at load balance issues regarding
this solution.
          * Load Balancer and MPTCP
               * Intro on how load balancers operate.
                    * multiple servers represented by single IP address
                    * adding or removing servers requires different
solution then ECMP so stageful layer-4 load balancer (stageful) is used
                    * in reality, multiple layer-4 load balancers are used.
               * Tutorial on how MPTCP interacts with load balancers.
                    * Layer-4 load balancer need to track
<token-to-server> mapping
                    * Token collision of different servers are possible
                    * Problem increases of multiple load balancers are
used.  
                         * MPTCP- session may reach different load
balancers
                    * Solution Space
                         * Need to make token-generation locally meaningful
                         * How does one signal the token?  Two current
proposals
                              * different token generation by splitting
MPTCP-key into two 32bit sections.
                                   * No wire-change, but reduces entropy
by 32 bits.
                              * Explicitly generate token.
                                   * Token not related to key
                                   * consumes 4 more bytes
                                   * server needs to act stately
                              * Conclusion Token should be locally
meaningful
                                   * Guarantees uniqueness
                                   * Enables layer-4 load balancers
                                   * Signaling is open question.
                         * Discussion
                              * Paasch - Reuse keys looks promising
                              * Strong assumption on attacker model.
assumption is that attacker cannot eves drop on initial handshake.  May
not be a good assumption.
                              * Take discussion to list and reiterate.