Re: [multipathtcp] Consensus call on potential MPTCP proxy work

Joe Touch <touch@isi.edu> Wed, 19 April 2017 01:18 UTC

Return-Path: <touch@isi.edu>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA018129462 for <multipathtcp@ietfa.amsl.com>; Tue, 18 Apr 2017 18:18:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RP_MATCHES_RCVD=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hPKoVgWZuNJ7 for <multipathtcp@ietfa.amsl.com>; Tue, 18 Apr 2017 18:18:56 -0700 (PDT)
Received: from nitro.isi.edu (nitro.isi.edu [128.9.208.207]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3F399129409 for <multipathtcp@ietf.org>; Tue, 18 Apr 2017 18:18:56 -0700 (PDT)
Received: from [128.9.184.37] ([128.9.184.37]) (authenticated bits=0) by nitro.isi.edu (8.13.8/8.13.8) with ESMTP id v3J1IafH016620 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Tue, 18 Apr 2017 18:18:37 -0700 (PDT)
To: Yoshifumi Nishida <nishida@sfc.wide.ad.jp>
References: <8c5ffa879686472594bfd3db2fa06076@rew09926dag03b.domain1.systemhost.net> <99affa00-5118-1a0f-227a-b3f4b751ffd4@isi.edu> <CAO249ye4Yz2Fgf5=XG5F3JkODym1AXrZV3pXyVLgG-h2iVhLVw@mail.gmail.com> <8cd97018-1104-c647-45fc-9135097e7420@isi.edu> <CAO249ycQqVweB5TaQNa2s8uFvQhSQrESrNmF1+8a8_ZO+Yqkyg@mail.gmail.com>
Cc: multipathtcp <multipathtcp@ietf.org>
From: Joe Touch <touch@isi.edu>
Message-ID: <8bef96b7-1b7d-94eb-2e59-7323c2a9b866@isi.edu>
Date: Tue, 18 Apr 2017 18:18:36 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <CAO249ycQqVweB5TaQNa2s8uFvQhSQrESrNmF1+8a8_ZO+Yqkyg@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------367BE55E0CDE54025D670BA3"
X-MailScanner-ID: v3J1IafH016620
X-ISI-4-69-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/aY-uWLnLOr6zqcl-OucRmPEABfw>
Subject: Re: [multipathtcp] Consensus call on potential MPTCP proxy work
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Apr 2017 01:18:58 -0000


On 4/18/2017 6:12 PM, Yoshifumi Nishida wrote:
> Hi Joe,
>
> On Tue, Apr 18, 2017 at 2:56 PM, Joe Touch <touch@isi.edu
> <mailto:touch@isi.edu>> wrote:
>
>
>
>     On 4/18/2017 2:44 PM, Yoshifumi Nishida wrote:
>     > Hi Joe,
>     >
>     > It's not tunneling. The proxy converts a tcp connection into a mptcp
>     > connection and converts it back to a tcp connection (if necessary)
>     > So, it won't be tcp over tcp.
>     OK, but that's not proxying either.
>
>     That's (at best) connection hijacking.
>
>
> I won't deny it as I'm not 100% sure whether proxy is a good name or not. 
> But, I am thinking you might want to call NAT hijacking as well.
Yes, but we do know what a NAT is responsible for - i.e., it is 1:1
translation of only addresses and ports.

Doing more than that has never been part of an IETF standard, AFAICT -
for many reasons.

>
>     > MPTCP will convey control data for application (proxy) in payload.
>     > But, MPTCP of course doesn't care the contents of payload.
>     > It just carries data and app will parse the data. Putting data
>     in SYN
>     > is trying to reduce the latency and no other meaning as far as I
>     > understand.
>
>     MPTCP is TCP. Putting the data in the SYN of a TCP connection is
>     hazardous. The goal is irrelevant.
>
>  
> In TCP, we already have a precedence such as TFO.

Sorry, to be more clear:
    Data in the SYN has been part of TCP since it was standardized.

Using the SYN data as control information is the hazardous part.

> I think what the solution does won't exceed what TFO does.
TFO changes when the SYN data is delivered, based on the fact that past
cookie information "accelerates" the 3WHS.

It does not put control plane information in the data area of the SYN.

Joe