Re: [multipathtcp] WG Last Call for draft-ietf-mptcp-rfc6824bis

Christoph Paasch <cpaasch@apple.com> Sun, 15 July 2018 20:21 UTC

Return-Path: <cpaasch@apple.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A13B130DF4 for <multipathtcp@ietfa.amsl.com>; Sun, 15 Jul 2018 13:21:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.311
X-Spam-Level:
X-Spam-Status: No, score=-4.311 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SsUPEk0OcRO3 for <multipathtcp@ietfa.amsl.com>; Sun, 15 Jul 2018 13:21:07 -0700 (PDT)
Received: from mail-in6.apple.com (mail-out6.apple.com [17.151.62.28]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD7C4130E7E for <multipathtcp@ietf.org>; Sun, 15 Jul 2018 13:21:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=apple.com; s=mailout2048s; c=relaxed/simple; q=dns/txt; i=@apple.com; t=1531686067; x=2395599667; h=From:Sender:Reply-To:Subject:Date:Message-id:To:Cc:MIME-version:Content-type: Content-transfer-encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-reply-to:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=rbW8wHkuVZ4VeBdDYeMFI4uL0uQkcGINPqGTvPl/Ezc=; b=HQiM8/bMACg2M/0ILJesto1loAsjxrvT2mNe3A6D1dabTd7J2Yo96eRIZBv03Kn5 9GUMqQWIhPLatnDa9yOO5umesnfBPx5CQGplsDh3OCZj+pBWmJqk+u1wUId1e62j DMSOZY5MkIu9HTh+u8Jpiuf6boadMCQ10Pzos5zOS2Ck70H6f/fdxV0/dMpo9Zp2 9MetyG7a9lShbUSMI06+xuUHrIBuBmPnY8hnZELL2pC7U4RMUp0nqjcmBSQ446iw pX5N0l1nbINRS3E7YcXORClienurMUAiEuYLoY80xnaYbPRqIv2kVjSYnJ6ZJ7RO Z6JtpdbZKWejTX9Ems8Aqw==;
X-AuditID: 11973e15-bdfff70000007130-1e-5b4bacb3a1ef
Received: from mr2-mtap-s02.rno.apple.com (mr2-mtap-s02.rno.apple.com [17.179.226.134]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mail-in6.apple.com (Apple Secure Mail Relay) with SMTP id 16.79.28976.3BCAB4B5; Sun, 15 Jul 2018 13:21:07 -0700 (PDT)
MIME-version: 1.0
Content-transfer-encoding: 7bit
Content-disposition: inline
Content-type: text/plain; CHARSET="US-ASCII"
Received: from ma1-mmpp-sz09.apple.com (ma1-mmpp-sz09.apple.com [17.171.128.183]) by mr2-mtap-s02.rno.apple.com (Oracle Communications Messaging Server 8.0.2.3.20180614 64bit (built Jun 14 2018)) with ESMTPS id <0PBX008DYCJ6P330@mr2-mtap-s02.rno.apple.com>; Sun, 15 Jul 2018 13:21:07 -0700 (PDT)
Received: from process_viserion-daemon.ma1-mmpp-sz09.apple.com by ma1-mmpp-sz09.apple.com (Oracle Communications Messaging Server 8.0.2.3.20180614 64bit (built Jun 14 2018)) id <0PBX00600BYNX500@ma1-mmpp-sz09.apple.com>; Sun, 15 Jul 2018 13:21:06 -0700 (PDT)
X-Va-A:
X-Va-T-CD: 858e2f4dae29a6016c98c8320829244c
X-Va-E-CD: 3bbd785c51ace3f981efd92bc4e82048
X-Va-R-CD: 2b9cdb0e57a359d759a3675f8c35d2a7
X-Va-CD: 0
X-Va-ID: 6a83795e-5a90-4719-9363-cfc54e16bf64
X-V-A:
X-V-T-CD: 858e2f4dae29a6016c98c8320829244c
X-V-E-CD: 3bbd785c51ace3f981efd92bc4e82048
X-V-R-CD: 2b9cdb0e57a359d759a3675f8c35d2a7
X-V-CD: 0
X-V-ID: 5d2f317a-5c67-4f06-9f4b-9f75cf1a013a
Received: from process_milters-daemon.ma1-mmpp-sz09.apple.com by ma1-mmpp-sz09.apple.com (Oracle Communications Messaging Server 8.0.2.3.20180614 64bit (built Jun 14 2018)) id <0PBX00600BYMX400@ma1-mmpp-sz09.apple.com>; Sun, 15 Jul 2018 13:21:05 -0700 (PDT)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-07-15_08:,, signatures=0
X-Proofpoint-Scanner-Instance: ma-grpmailp-qapp22.corp.apple.com-10000_instance1
Received: from localhost ([17.234.233.123]) by ma1-mmpp-sz09.apple.com (Oracle Communications Messaging Server 8.0.2.3.20180614 64bit (built Jun 14 2018)) with ESMTPSA id <0PBX00I1PCJ4KU20@ma1-mmpp-sz09.apple.com>; Sun, 15 Jul 2018 13:21:05 -0700 (PDT)
Sender: cpaasch@apple.com
Date: Sun, 15 Jul 2018 16:21:04 -0400
From: Christoph Paasch <cpaasch@apple.com>
To: philip.eardley@bt.com
Cc: alan.ford@gmail.com, multipathtcp@ietf.org
Message-id: <20180715202104.GW1471@MacBook-Pro-19.local>
References: <0dd5e48298ed4b4fb7344630abc794b7@rew09926dag03b.domain1.systemhost.net> <f64af1576d994d888a7b82fb75dc8318@rew09926dag03b.domain1.systemhost.net> <ACB25C6F-1E4B-45A5-82A1-E219ECEDD40E@gmail.com> <f75acf78bc4c4a419433569bf5acde4f@rew09926dag03b.domain1.systemhost.net>
In-reply-to: <f75acf78bc4c4a419433569bf5acde4f@rew09926dag03b.domain1.systemhost.net>
User-Agent: Mutt/1.9.4 (2018-02-28)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrLIsWRmVeSWpSXmKPExsUiuPlRm+7mNd7RBkcXi1usPLeC2eLz6uts FsvWrmB0YPZo+zKZyWPnrLvsHkuW/GQKYI7isklJzcksSy3St0vgyjjxsYW94HhVxez739ga GB/GdjFyckgImEi8WP6VsYuRi0NI4ACTxKUvR5hBErwCghI/Jt9j6WLk4GAWkJc4eF4WJMws IC3x6O8MdghbS+L7o1YWiN71TBJnW08yQThdTBILV7xngtjALvHn1w4WCFtb4vTjaWww9t/l EJNA7AO/70LFuSQWbD3NCmHrSix8dQsqziax/sQSqJlaEkcXHmKEsa+9mcgKY9++/5EZwuaU OP9lItR8HYknJ76B9QoJdDJJTP1XDhHPlpg85QvUzACJeZvnM0M80MQkceTaJ7BmYQFJie47 d5hBIcEioCpx55gkSJgNaNfb2+1ge0WASlZsX8UGCRU9ibXbTjFDtHpIPL88lx0SoBYSX652 Q82fzyRx+fJrpgmMSrOQAnsWIrBnIQX2LKTAXsDIsopRKDcxM0c3M89ML7GgICdVLzk/dxMj KH1MtxPdwXhmldUhRgEORiUeXoap3tFCrIllxZW5hxilOViUxHk7DT2jhQTSE0tSs1NTC1KL 4otKc1KLDzEycXBKNTCyVZ+a7BAd7HC364x8WfCaNalzOwp4Qz70cc/Z5dF0lU/jYcuca7qH 2c2nGBr8erYpLdFt8Y+VqyXZm6rsdB7fTzadzBf7wSDcKL46ium9x1rRX/wNu+TZVHrNX6os 8P4dwX7tk9+Zvbq5n1JyLULrLky61VQY++mA1puwf4cOHU7bdUS7jEuJpTgj0VCLuag4EQA6 J4GDAAMAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/Vj_O6MpWm6bUjSm1dZ4h7Pdc-PQ>
Subject: Re: [multipathtcp] WG Last Call for draft-ietf-mptcp-rfc6824bis
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 15 Jul 2018 20:21:11 -0000

Hello,

On 14/07/18 - 11:08:25, philip.eardley@bt.com wrote:
> Hi,
> 
> Apart from the pure clarifications, there are a few comments from me and Yoshi that may be worth discussing:
> 
> --
> 2:  As we have removed AddrID from MP_PRIO, we have a certain problem in the situations like the followings.
> 
> Let's say a server has two address S1, S2 while the client is behind FW. Since the client is behind firewall, the server uses ADD_ADDR to send the info of S2 through S1, but it wants S2 to be used as a backup.
> 
> In this case, if MP_PRIO has addr id field, the server is able to specify S2 is a backup. However, since MP_PRIO doesn't have addr id any more, all the server can do is to wait until the client establishes the connection with S2. But, this connection doesn't look what the server wants. 
> I guess using 1 bit in ADD_ADDR might solve the issue.

I agree - that might be quite useful.

> --
> 
> One other high-level comment:  it would be very good if the bis code, implemented in linux, could be released - to allow testing of the protocol changes in the bis, for instance to make sure that no unexpected issues have been introduced

I will work this week on getting this sorted out.

> --
> 
> Section 2.1 & 3.1 - can you remind me why we changed MP_CAPABLE so that Host A's key is sent only on the ACK (not on the SYN)? Is this so it's only sent when we know host B is MPTCP capable, which is therefore a slight security improvement?  (Just send a link to earlier emails, if that's easier)

The reason for this is because now that we send the keys reliably in the
third ACK / first data-segment, we actually don't need to send the key in
the SYN anymore. Thus, we can reduce the size of the MP_CAPABLE in the
SYN-segment and gain some bytes.

> 
> --
> 
> Section 3.4.1 ... The 'E' bit exists to provide reliability for this option ...
> Not sure - does this open security hole, where an attacker pretends an ADD-ADDR has been received? (the Echo doesn't include an hmac, so is easy to spoof)

I don't think so, but worth discussing.

> --
> 
> We're waiting for this IPR to get added on the tracker
> * one is inherited from draft-paasch-mptcp-syncookies (which got include in rfc6824bis) https://datatracker.ietf.org/ipr/2678/

I am working with Apple's legal team to get the IPR added to RFC6824bis. ETA
is end of July.


Christoph

> 
> --
> 
> -----Original Message-----
> From: Alan Ford [mailto:alan.ford@gmail.com] 
> Sent: 11 July 2018 02:23
> To: Eardley,PL,Philip,TUD1 R <philip.eardley@bt.com>
> Cc: multipathtcp@ietf.org
> Subject: Re: [multipathtcp] WG Last Call for draft-ietf-mptcp-rfc6824bis
> 
> Thank you for your feedback, Phil. All proposed changes look good and we will wrap these into the next version.
> 
> @Everyone - we are however awaiting other WGLC feedback before doing a new revision!
> 
> Best regards,
> Alan
> 
> > On 18 Jun 2018, at 14:59, philip.eardley@bt.com wrote:
> > 
> > More comments:
> > Section 3.5 -
> > Option R (RST) - add (at the end of the bullet) "the Host A enters the 
> > CLOSED state directly" (I think)
> > 
> > << If a host receives a packet with a valid MP_FASTCLOSE option, it
> >   shall process it as follows :>>
> > I think the text that follows (apart from the last bullet) is only relevant for Option A, where the MP_FASTCLOSE is sent on an ACK - it doesn't apply for option R (where it's sent on a RST). Anyway, things could be laid out slightly differently so the section is clearer. 
> > 
> > Section 3.6
> > I wonder if it would be more logical for this section to be before Fast close?
> > 
> > This section could do with a read through. A few things:
> > << As discussed in Section 3.5 above, the MP_FASTCLOSE option provides a
> >   connection-level reset roughly analagous to a TCP RST. Regular TCP
> >   RST options remain used to at the subflow-level to indicate the
> >   receiving host has no knowledge of the MPTCP subflow or TCP
> >   connection to which the packet belongs.>> Can this paragraph be 
> > deleted? at least I found it a bit confusing that this text is not about this section.
> > 
> > "remain used to at" is ugly
> > 
> > << However, in MPTCP, there may be many reasons for rejecting the
> >   opening of a subflow, but these semantics cannot be carried in a
> >   standard TCP RST. It would be beneficial for a host to the reasons
> >   why its subflow has been closed with a RST, and thus whether it
> >   should try to re-establish the subflow immediately, later, or never
> >   again.  These semantics are carried in the MP_TCPRST option that can
> >   be included on a TCP RST packet.>>
> > I presume the new MP_TCPRST can be added to a RST, whenever it's created - the sentence seems to imply it's only when it wants to reject the opening of a subflow (ie in response to MP_JOIN). 
> > I assume inclusion of the MP_TCPRST option is optional?
> > 
> > potential better phrasing:
> > A host sends a TCP RST in order to close a subflow or reject an attempt to open a subflow (MP_JOIN). In order to inform the receiving host why a subflow is being closed or rejected, the TCP RST packet MAY include the MP_TCPRST Option. The host MAY use this information to decide, for example, whether it tries to re-establish the subflow immediately, later, or never. 
> > 
> > <<   o  Unspecified error (code 0x0).  This is the default error implying
> >      the subflow is not longer available.  The receiving host SHOULD
> >      take account of the 'T' bit in deciding whether to re-estbalish
> >      this subflow.  The presence of this option shows that the RST was
> >      generated by a MPTCP-aware device.>>
> > 
> > " The receiving host SHOULD take account of the 'T' bit in deciding whether to re-estbalish this subflow."
> > Only this sub-bullet mentions the T bit, which may suggest that it should not be taken account of with the other reason codes.  I think the sentence should be deleted (using the T flag is mentioned earlier). 
> > 
> > <<enough ressources>>  enough resources
> > 
> > Section 3.7
> > I guess it's OK to refer to it as RST rather than TCP RST?
> > 
> > << The case described above is a specialized case of fallback, for when
> >   the lack of MPTCP support is detected before any data is acknowledged
> >   at the connection level on a subflow.  >> "The case above" - I'm not 
> > sure which of the previous paragraph or paragraphs you're referring to.
> > "specialised" - maybe "specific" [is it really specialised?] "for 
> > when" -> when
> > 
> > S3.9.2
> > << If the two communicating hosts immediately try to set up subflows
> >   from all available addresses to all available addresses on the other
> >   host, this could end up creating two subflows per path.  This is an
> >   inefficient use of resources.>>
> > is two subflows correct? Multiple I think " could end up creating two 
> > subflows per path" -> "could create multiple subflows over the same path"
> > 
> > << If a host does not support TCP simultaneous open, it
> >   is RECOMMENDED that some element of randomization is applied to the
> >   time waited before opening new subflows, so that only one subflow
> >   exists between a given address pair.  If, however, hosts signal
> >   additional ports to use (for example, for leveraging ECMP on-path),
> >   this heuristic need not apply.>>
> > "time waited" - ugly phrase?
> > "exists" -> is created
> > "need not apply" -> is not appropriate
> > 
> > Section 5 - Security
> > This section needs updating to reflect the changes in the bis.:
> > 
> > Add mention of ADD_ADDR, now with HMAC and reliability, Discuss the 
> > revised MP_CAPABLE I'm not sure if the new fast close option (option 
> > R) has any security impact?
> > Discuss the MP_PRIO change (no off path address indication) Discuss 
> > downgrade attacks (to v0) during connection initiation
> > 
> > Section 8 IANA
> > << This document updates [RFC6824] and as such IANA is requested to
> >   update the TCP option space registry to point to this document for
> >   Multipath TCP>>
> > This document obsoletes rather than updates...   I suspect this means all the MPTCP options need to be included in this document, but we can leave IANA to decide that. 
> > 
> > <<  |    C    |   Do not attempt to connect to   |    This document,    |
> >   |         |          source address          |     Section 3.1      |
> >>> 
> > I don't think this is a good summary of flag C's meaning.
> > 
> > << The
> >   contents of this sub-registry are to to this document, as follows:
> >>> 
> > Is this sentence needed?
> > 
> > Appendix B TCP Fast Open
> > Maybe rephrae the title as "TCP Fast Open and MPTCP" or "Considerations about using TCP Fast Open and MPTCP"?
> > 
> > This section could do with a read through, it could do with a few 
> > minor re-phrasings
> > 
> > 
> > <<   TCP Fast Open (TFO) is an experimental TCP extension, described in
> >   [RFC7413], which has been introduced with the objective of gaining
> >   one RTT before transmitting data.>>
> > " gaining one RTT"?  maybe: which allows data to be sent one RTT earlier than with regular TCP. 
> > << It achieves this by sending the SYN-
> >   segment together with data>>
> > re-phrase (I think data is referring ot the cookie - but you havent 
> > yet mentioned it - rather than user data)
> > 
> > "resp." = ?
> > 
> > << TFO and MPTCP can be combined provided that the total length of their
> >   options does not exceed the maximum 40 bytes possible in TCP>> 
> > "their" is wrong, as there may be other options. -> "all the"
> > 
> > << We also note that this does not entail a loss
> >   of functionality, because TFO-data is always sent when only one path
> >   is active.>>
> > -> "TFO-data is only ever sent when only a single path is active"
> > How do you guarantee this? Not sure I understand. 
> > 
> > << To solve this, the TFO data should not be considered part of the Data
> >   Sequence Number space:>>
> > Is this a SHOULD NOT?  Does it imply a change to rfc7413 (the tfo rfc)? I guess this is really a suggestion to the implementer?
> > 
> > Section B.3
> > I assume this sub-section is an example (so no SHOULD or even MAY are 
> > needed)
> > 
> > << client                                                         server
> >     |                                                              |
> >     |    S 0(0) <MP_CAPABLE>, <TFO cookie request>                 |
> >     | -----------------------------------------------------------> |
> >>> 
> > Can you explain the S 0(0) nomenclature/ please.
> > 
> > 
> > Appendix D Finite state machine
> > I presume we don't need similar FSM for fastclose?
> > 
> > 
> > Section 2:
> > Need to add sub-sections on closing subflow & fast close & fallback
> > 
> > S2.7 - I think the third bullet about notable features could be 
> > slightly altered, with enhanced security for ADD_ADDR and MP_CAPABLE. 
> > You could also add a mention of rfc7430
> > 
> > 
> > Section 2.1 & 3.1 - can you remind me why we changed MP_CAPABLE so 
> > that Host A's key is sent only on the ACK (not on the SYN)? Is this so 
> > it's only sent when we know host B is MPTCP capable, which is 
> > therefore a slight security improvement?  (Just send a link to earlier 
> > emails, if that's easier)
> > 
> > Thanks
> > phil
> > -----Original Message-----
> > From: Eardley,PL,Philip,TUD1 R
> > Sent: 14 June 2018 11:56
> > To: 'philip.eardley@bt.com' <philip.eardley@bt.com>; 
> > multipathtcp@ietf.org
> > Subject: RE: WG Last Call for draft-ietf-mptcp-rfc6824bis
> > 
> > A few comments as I work through the document, basically minor so far
> > 
> > Section 3.1
> > << Given the SYN exchange is different between v1 and v0
> >   the exchange cannot be immediately downgraded, and therefore if the
> >   far end has requested a lower version then the initiator SHOULD
> >   respond with an ACK without any MP_CAPABLE option, to fall back to
> >   regular TCP.>>
> > I think it should say "to ensure the exchange cannot..."
> > 
> > 
> > << The first 4 bits of the first octet in the MP_CAPABLE option
> >   (Figure 4) define the MPTCP option subtype (see Section 8; for
> >   MP_CAPABLE, this is 0), and the remaining 4 bits of this octet
> >   specify the MPTCP version in use (for this specification, this is 1).
> >>> 
> > "The first 4 bits of the first octet in the MP_CAPABLE option" Fig 4 shows two earlier octets (Kind & Length) - I know these arent the MP-CAPABLE option, but I think it might be worth spelling out what they are. 
> > 
> > Would it be better strictly to have "0x0" rather than "0"? (ie match 
> > the IANA registry)
> > 
> > Section 3.4.1
> > <<A set of four flags are present after the subtype and before the
> >   Address ID.  Only the rightmost bit - labelled 'E' - is assinged
> >   today.  The other bits are currently unassigned and MUST be set to
> >   zero by a sender and MUST be ignored by the receiver.
> > 
> >   The 'E' bit exists to provide reliability for this option.  Because
> >   this option will often be sent on pure ACKs, there is no guarantee of
> >   reliability.  Therefore, a receiver receiving a fresh ADD_ADDR option
> >   (where E=0), will send the same option back to the sender, but not
> >   including the HMAC, and with E=1.  The lack of this echo can be used
> >   by the initial ADD_ADDR sender to retransmit the ADD_ADDR according
> >   to local policy.
> >>> 
> > 4 comments:
> > Assinged /assigned
> > 
> > The 'E' bit - better to say flag?
> > 
> > Section 2.3 needs to be amended to show the reply /echo message for ADD-ADDR. I suggest the pic in S2.3 also shows the E value. 
> > 
> > Not sure - does this open security hole, where an attacker pretends an 
> > ADD-ADDR has been received? (the Echo doesn't include an hmac, so is 
> > easy to spoof)
> > 
> > And in Fig 12
> > |        Truncated HMAC (8 octets, if length > 10 octets)       |
> > 
> > Could this be made more straightforward? Ie spell out when length is >10 octets ie IPv6 (if I understand it). This also seems to mean that IPv4 doesn't include the HMAC, is this right??
> > 
> > Thanks
> > phil
> > 
> > -----Original Message-----
> > From: multipathtcp [mailto:multipathtcp-bounces@ietf.org] On Behalf Of 
> > philip.eardley@bt.com
> > Sent: 05 June 2018 09:14
> > To: multipathtcp@ietf.org
> > Subject: [multipathtcp] WG Last Call for draft-ietf-mptcp-rfc6824bis
> > 
> > This starts a WG Last Call for draft-ietf-mptcp-rfc6824bis. Please send comments by the end of June. 
> > 
> > Please note there are three IPR disclosures (we're working on getting them added to the rfc6824bis page): 
> > 
> > * two are inherited from RFC6824  https://datatracker.ietf.org/ipr/search/?submit=draft&id=draft-ietf-mptcp-multiaddressed    
> > * one is inherited from draft-paasch-mptcp-syncookies (which got 
> > include in rfc6824bis) https://datatracker.ietf.org/ipr/2678/
> > 
> > Thanks,
> > Phil & Yoshi
> > _______________________________________________
> > multipathtcp mailing list
> > multipathtcp@ietf.org
> > https://www.ietf.org/mailman/listinfo/multipathtcp
> > 
> > _______________________________________________
> > multipathtcp mailing list
> > multipathtcp@ietf.org
> > https://www.ietf.org/mailman/listinfo/multipathtcp
> 
> _______________________________________________
> multipathtcp mailing list
> multipathtcp@ietf.org
> https://www.ietf.org/mailman/listinfo/multipathtcp