Re: [multipathtcp] RFC6824bis edits based on implementation feedback

Christoph Paasch <cpaasch@apple.com> Wed, 05 February 2020 21:59 UTC

Return-Path: <cpaasch@apple.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BAA0712083D for <multipathtcp@ietfa.amsl.com>; Wed, 5 Feb 2020 13:59:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.002
X-Spam-Level:
X-Spam-Status: No, score=-7.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zz1U_9QwdmFG for <multipathtcp@ietfa.amsl.com>; Wed, 5 Feb 2020 13:59:25 -0800 (PST)
Received: from ma1-aaemail-dr-lapp02.apple.com (ma1-aaemail-dr-lapp02.apple.com [17.171.2.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 829571200A4 for <multipathtcp@ietf.org>; Wed, 5 Feb 2020 13:59:25 -0800 (PST)
Received: from pps.filterd (ma1-aaemail-dr-lapp02.apple.com [127.0.0.1]) by ma1-aaemail-dr-lapp02.apple.com (8.16.0.27/8.16.0.27) with SMTP id 015LvQoY063992; Wed, 5 Feb 2020 13:59:18 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=mime-version : content-transfer-encoding : content-type : sender : date : from : to : cc : subject : message-id : references : in-reply-to; s=20180706; bh=DxD6JpmJ3nvPWt1ccV2KBp7eGh2qHuTQO8193j70YaI=; b=hPW/4jdUIwMZFz+x6DA1AXAZBRYvi84LW9S3FkIWpvP0iqfq4IURDtmPMiuvKPG0cThY Sd0X/bzwIek/sml8yYt7p4bnuNBKiJ3UPgSe35aeGl6Ic6INtzd4jwEk/EEFUblZxJX4 Pb9ukeN9ReHYJOihFhVThap0+Ef883Yarz6AAxn3jpBX8VF2nmZSRVZMLryFDaVK5++/ 3NKr5sufuTz2pi47LKIJbYO6mng5uqo/JBj4p8mO2Do3SImGyYPvkhRNPmj3KccgFYh6 2wCpqKUg0UIffVWdQbnAZcZm22N7CYOocG0pm6aXRd2Bw/iamtoWHq9vnmWN58Oo1D8+ fg==
Received: from rn-mailsvcp-mta-lapp02.rno.apple.com (rn-mailsvcp-mta-lapp02.rno.apple.com [10.225.203.150]) by ma1-aaemail-dr-lapp02.apple.com with ESMTP id 2xykb2waes-4 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Wed, 05 Feb 2020 13:59:18 -0800
Received: from nwk-mmpp-sz11.apple.com (nwk-mmpp-sz11.apple.com [17.128.115.155]) by rn-mailsvcp-mta-lapp02.rno.apple.com (Oracle Communications Messaging Server 8.1.0.1.20190704 64bit (built Jul 4 2019)) with ESMTPS id <0Q59001NE12T8CH0@rn-mailsvcp-mta-lapp02.rno.apple.com>; Wed, 05 Feb 2020 13:59:17 -0800 (PST)
Received: from process_milters-daemon.nwk-mmpp-sz11.apple.com by nwk-mmpp-sz11.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) id <0Q59002000FIT400@nwk-mmpp-sz11.apple.com>; Wed, 05 Feb 2020 13:59:17 -0800 (PST)
X-Va-A:
X-Va-T-CD: 3617872cb080ac0182d9b2453d56adc6
X-Va-E-CD: ae422271a38913bbedae93e9e9d60fc7
X-Va-R-CD: a5d4677ae470b25e3a5d2ab1ded2428a
X-Va-CD: 0
X-Va-ID: a7e06e1d-2116-4dd5-9fde-fc247969eef8
X-V-A:
X-V-T-CD: 3617872cb080ac0182d9b2453d56adc6
X-V-E-CD: ae422271a38913bbedae93e9e9d60fc7
X-V-R-CD: a5d4677ae470b25e3a5d2ab1ded2428a
X-V-CD: 0
X-V-ID: 139c962f-aa48-409c-99ca-b95e57152075
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2020-02-05_06:,, signatures=0
MIME-version: 1.0
Content-transfer-encoding: 8bit
Content-disposition: inline
Content-type: text/plain; charset="utf-8"
Received: from localhost ([17.234.37.1]) by nwk-mmpp-sz11.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPSA id <0Q59001DT12QQA20@nwk-mmpp-sz11.apple.com>; Wed, 05 Feb 2020 13:59:15 -0800 (PST)
Sender: cpaasch@apple.com
Date: Wed, 05 Feb 2020 13:59:14 -0800
From: Christoph Paasch <cpaasch@apple.com>
To: Alan Ford <alan.ford@gmail.com>
Cc: V Anil Kumar <anil@csir4pi.in>, multipathtcp <multipathtcp@ietf.org>
Message-id: <20200205215914.GS33105@MacBook-Pro-64.local>
References: <C36D742F-6D76-48FA-B6D8-44DE484A9E2C@gmail.com> <882106347.533187.1578939921488@csir4pi.in> <CAAK044RLsJCFWfeP4XAzMmMhUqH1hCnDs94-3Zkrj3QkJeVx7g@mail.gmail.com> <146023054.25180934.1580661581660@csir4pi.in> <CAAK044QBO4Bjby=fkEiuQ-f-zuZG1Q=8H0p1kJoUaxyjzod3Cg@mail.gmail.com> <620489655.29573797.1580915365031@csir4pi.in> <DA9790A3-134D-4D44-9532-65EE359B0B69@gmail.com>
In-reply-to: <DA9790A3-134D-4D44-9532-65EE359B0B69@gmail.com>
User-Agent: Mutt/1.12.2 (2019-09-21)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2020-02-05_06:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/WJtF6GQiw4-PYUTWTIE3Q2PLLCw>
Subject: Re: [multipathtcp] RFC6824bis edits based on implementation feedback
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Feb 2020 21:59:29 -0000

On 05/02/20 - 21:19:29, Alan Ford wrote:
> Hi Anil,
> 
> This would not be forbidden if the mapping was carried on a pure ACK with no data.
> 
> I do see the point here: if a packet of 1000 bytes contains 500 bytes of one mapping and 500 bytes of another mapping, then only one DSM would appear on one packet, leaving the mapping for the second 500 bytes to be carried somewhere else - the only option being a pure ACK. But this kind of scenario would be extremely rare and I would imagine any implementation would just split into two 500 byte segments each with the PSH flag set. I don’t think we need to spell this out in the spec however.

Yes, an implementation would just send 2 segments each 500 bytes.

Because, if the mapping is sent on a pure ACK, the implementation needs to
retransmit that pure ACK (based on some timer) to make sure that it reaches
the receiver. Which basically means that we are making the pure ACK reliable.
Sure, everything is possible in software but the complexity would be too big.

Thus, easiest solution is to simply send 2 500 byte segments.


Christoph


> 
> Regards,
> Alan
> 
> > On 5 Feb 2020, at 15:09, V Anil Kumar <anil@csir4pi.in> wrote:
> > 
> > Hi Yoshi,
> > 
> > Please see in line.
> > 
> > From: "Yoshifumi Nishida" <nsd.ietf@gmail.com>
> > To: "V Anil Kumar" <anil@csir4pi.in>
> > Cc: "alan ford" <alan.ford@gmail.com>, "multipathtcp" <multipathtcp@ietf.org>
> > Sent: Tuesday, February 4, 2020 1:08:45 PM
> > Subject: Re: [multipathtcp] RFC6824bis edits based on implementation feedback
> > 
> > Hi Anil,
> > 
> > Thanks for pointing it out. I overlooked this one.
> > This looks an interesting point.
> > 
> > It seems to me that whether RST is happen or not depends on the size of receive window according to the text.
> > If the receive window size is big enough to accommodate segment 1 and segment 3, the text "Implementations MAY hold onto such unmapped data for a short while in the expectation that a mapping will arrive shortly. " can be applied to the segment 1. As a result, the segment 1 won't be discarded. 
> > 
> > Yes.  So, segment 1 may be kept in the data receiver's buffer in expectation that its mapping will arrive shortly. And in the example that we are referring to, the data sender will not be able to include the map for the data in segment 1 in segment 3 or any higher segment.
> > 
> > Regards,
> > 
> > Anil
> > 
> > However, this might be contradict with the new texts Alan proposed? Or, am I missing something?
> > 
> > Thanks,
> > --
> > Yoshi
> > 
> > 
> > 
> > On Sun, Feb 2, 2020 at 8:42 AM V Anil Kumar <anil@csir4pi.in <mailto:anil@csir4pi.in>> wrote:
> > Hi Yoshi,
> > 
> > Thanks for this point. In fact, I had initially not thought of a scenario, where the map is being delivered through a retransmitted data packet while its first transmission did not include the map. Now I am just seeing the document (RFC 6824-bis) in this context.
> > 
> > My understanding is that in scenarios like what I described in my previous mail, RST is likely to happen whether we explicitly state so or not. Please see the paragraph containing the below text in RFC 6824-bis.  
> > 
> > "If a mapping for that subflow-level sequence space does not arrive within a receive window of data, that subflow SHOULD be treated as broken, closed with a RST, and any unmapped data silently discarded."
> > 
> > if we assume that the map is included while retransmitting the data (even though the first transmission did not contain the map for some reasons),  we could argue that RST could be avoided provided that the retransmission is triggered within a receive window of data. But the question here would be how and when will the retransmission take place. In this case, the subflow may not initiate the retransmission of data by its own (i.e., no retransmission due to three duplicate ACKs or RTO expiry at subflow level) as there is no segment loss at subflow level sequence space. So there could be a high possibility of RST happening even before the map delivery through retransmission. 
> > 
> > With regards, 
> > 
> > Anil
> >  
> > From: "Yoshifumi Nishida" <nsd.ietf@gmail.com <mailto:nsd.ietf@gmail.com>>
> > To: "V Anil Kumar" <anil@csir4pi.in <mailto:anil@csir4pi.in>>
> > Cc: "alan ford" <alan.ford@gmail.com <mailto:alan.ford@gmail.com>>, "multipathtcp" <multipathtcp@ietf.org <mailto:multipathtcp@ietf.org>>
> > Sent: Saturday, February 1, 2020 3:39:51 AM
> > Subject: Re: [multipathtcp] RFC6824bis edits based on implementation feedback
> > 
> > Hi Anil,
> > 
> > I have a question about your proposed text.
> > I am actually wondering if we really want to terminate connection here. 
> > 
> > The packets without proper mappings will be treated as invalid and will be discarded. 
> > If an implementation failed to attach proper mapping for some reasons (e.g. option space), it might be able to attach the proper one when it retransmits the packets. This also looks ok to me.
> > 
> > I don't have strong preference for this. But, do we have a reason to terminate connection?
> > 
> > Thanks,
> > --
> > Yoshi
> > 
> > On Mon, Jan 13, 2020 at 10:28 AM V Anil Kumar <anil@csir4pi.in <mailto:anil@csir4pi.in>> wrote:
> > Hi,
> > 
> > I have some points related to the  modifications (Change 2) being proposed on data sequence map. Please see them inline. Though I am putting forward the below points, if the consensus is in favour of the proposed change for reducing implementation complexity, I am also OK with that as well. 
> > 
> > From: "alan ford" <alan.ford@gmail.com <mailto:alan.ford@gmail.com>>
> > To: multipathtcp@ietf.org <mailto:multipathtcp@ietf.org>
> > Sent: Thursday, January 2, 2020 4:21:32 AM
> > Subject: [multipathtcp] RFC6824bis edits based on implementation feedback
> > 
> > Hi all,
> > We’d love to get this to a state of completion as soon as possible, and to this end I am starting a new thread on this topic. In discussion with the chairs, it is possible to make the desired changes in AUTH48 as long as there is WG consensus. The discussion so far has been fairly limited in terms of participation.
> > 
> > I would ask the chairs please if it was possible to specify a time bound for this discussion and a default conclusion.
> > 
> > Regarding the changes, in summary, there are two areas where changes have been requested by the implementation community. As we are the IETF we obviously have strong focus on “running code” and so ease of implementing standards-compliant code is strongly desirable. However, we do not wish to reduce functionality agreed by the IETF community if it is considered a required feature by the community.
> > 
> > 
> > Change 1
> > 
> > Change the sentence reading:
> > 
> >    If B has data to send first, then the reliable delivery of the ACK + MP_CAPABLE can be inferred by the receipt of this data with an MPTCP Data Sequence Signal (DSS) option (Section 3.3). 
> > 
> > To:
> > 
> >    If B has data to send first, then the reliable delivery of the ACK + MP_CAPABLE is ensured by the receipt of this data with an MPTCP Data Sequence Signal (DSS) option (Section 3.3) containing a DATA_ACK for the MP_CAPABLE (which is the first octet of the data sequence space).
> > 
> > What this means:
> > 
> > The current text is concerned only with ensuring a path is MPTCP capable, and so only cares that DSS option occurs on a data packet. However, the MP_CAPABLE option is defined to occupy the first octet of data sequence space and thus, if analogous to TCP, must be acknowledged. >From an implementation point of view it would make sense not to have this hanging around forever and instead define it is acknowledged at the connection level as soon as received. This change ensures the first data packet also DATA_ACKs this MP_CAPABLE octet.
> > 
> > 
> > Change 2
> > 
> > Change the sentence reading:
> > 
> >    A Data Sequence Mapping does not need to be included in every MPTCP packet, as long as the subflow sequence space in that packet is covered by a mapping known at the receiver.
> > 
> > To:
> > 
> >    The mapping provided by a Data Sequence Mapping MUST apply to some or all of the subflow sequence space in the TCP segment which carries the option. It does not need to be included in every MPTCP packet, as long as the subflow sequence space in that packet is covered by a mapping known at the receiver.
> > 
> > What this means:
> > 
> > The current text does not place any restrictions on where a mapping could appear. In theory a sender could define a thousand different mappings up front, send them all, and expect a receiver to store this and reassemble data according to these mappings as it arrives. Indeed, this was never explicitly disallowed since it “might have been useful”. The implementation community, however, has expressed concerns over the difficulty of implementing this open-endedly. How many mappings is it reasonable to store? Is there a DoS risk here? Instead, it has been requested that thee specification restricts the placement of the DSS option to being within the subflow sequence space to which it applies.
> > 
> > Below are my comments on this. I had shared some of these points in a previous thread that you had initiated in the same context. 
> > 
> > Transmitting large number of non-contiguous data sequence maps could be a misbehaviour (map-flooding), though it is not clear whether this can go to the extent of causing a potential DoS to the data receiver. So some sort of restriction on this could be useful.  One approach could be to insist that the data sender should ensure that the map being transmitted is for in-window data, as per the receiver advertised window. A receiver should anyhow be willing to store the maps for in-window data to deal with packet loss. For example, when a window of data segments (say 1 to 64) is transmitted, each carrying its corresponding map, and segment-1 is lost, the maps for the remaining 63 need to be stored till the lost segment is retransmitted. Of course, in this case the maps will be stored at the receiver side along with their corresponding data. But the need to store multiple maps for in-window data would still be there.
> > 
> > The problem with the proposed change (restriction) is that a data sender may find it difficult, in case a need arise to slightly delay the map delivery by few segments, i.e., sending some data first without map, and then send the corresponding map in a later segment, as shown below:
> > 
> > subflow-1:      segment-1                   segment-3                    segment-4                       segment-7
> >                       bytes:1-100                 bytes:201-300              bytes:301-400                 bytes:601-700
> >                       no map                        map for 1-100              map for 201-400             map for 601-700
> > 
> > 
> > 
> > subflow-2:       segment-2                  segment-5                     segment-6                       segment-8
> >                        bytes: 101-200           bytes:401-500               bytes: 501-600                bytes:701-800   
> >                        map for 101-200       map for 401-600            no map                            map for 701-800
> > 
> > 
> > In the above case, segment-1 goes without map and its map is included later in segment-3, the next data segment in the same subflow. Further,  in the above scheduling pattern, the map in segment-3 cannot cover the  data in segment-1 and segment-3, as some  data in between (segment-2) is transmitted through another subflow.  With the proposed change, the map in segment-3 will become invalid and this will eventually break subflow-1, though this could be a corner case.
> > 
> > The question at this stage is why would segment-1 be transmitted without its map. In the case of bidirectional data transfer, there could be a need to pack both timestamp and SACK  options in a data segment, i.e., piggybacking of  SACK with data. If we consider that timestamp takes 12 bytes and SACK, even with single block,  takes another 10 bytes, the remaining 18 bytes option space is not adequate to carry data sequence signal with map, especially when DSN is 64 bit long. So the delivery of either of the two (SACK or map) would be delayed.
> > 
> > As far as I understand, RFC 2018 (TCP Selective Acknowledgement Options) implies that SACK should not be delayed. It states "If sent at all, SACK options SHOULD be included in all ACKs which do not ACK the highest sequence number in the data receiver's queue". It also says "If data receiver generates SACK options under any circumstance, it SHOULD generate them under all permitted circumstances".   So, as part of meeting the RFC 2018 requirements, if the combination of SACK and timestamp is given preference over DSS, data segments could be transmitted without their map. 
> > 
> > Another case of delaying map could arise if the data sender prefers to send ADD_ADDR option, instead of map, in a data segment. It is nice that ADD_ADDR option can be delivered reliably in a pure ACK, but I think this is not the case with DSS at present.
> > 
> > If we adopt the proposed change, I think it might also be helpful to spell out how the receiver is supposed to behave, if it gets maps not meeting the MUST condition in the proposed change.  For example termination of the subflow with MP_TCPRST option (section 3.6 in RFC 6824-bis) with appropriate reason code and T flag value to intimate the data sender the cause for subflow termination.  
> >          
> > With regards,
> > 
> > Anil
> > 
> > Please can members of the WG express whether they are happy with these changes, or concerned.
> > 
> > Best regards,
> > Alan
> > 
> > 
> > _______________________________________________
> > multipathtcp mailing list
> > multipathtcp@ietf.org <mailto:multipathtcp@ietf.org>
> > https://www.ietf.org/mailman/listinfo/multipathtcp <https://www.ietf.org/mailman/listinfo/multipathtcp>
> > 
> > 
> > _______________________________________________
> > multipathtcp mailing list
> > multipathtcp@ietf.org <mailto:multipathtcp@ietf.org>
> > https://www.ietf.org/mailman/listinfo/multipathtcp <https://www.ietf.org/mailman/listinfo/multipathtcp>
> > 
> > 
> > 
> > 
> > 
> 

> _______________________________________________
> multipathtcp mailing list
> multipathtcp@ietf.org
> https://www.ietf.org/mailman/listinfo/multipathtcp