Re: [multipathtcp] RFC6824bis edits based on implementation feedback

<philip.eardley@bt.com> Wed, 08 January 2020 09:42 UTC

Return-Path: <philip.eardley@bt.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 038F7120848 for <multipathtcp@ietfa.amsl.com>; Wed, 8 Jan 2020 01:42:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=bt.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fXKh62v-_A4S for <multipathtcp@ietfa.amsl.com>; Wed, 8 Jan 2020 01:42:16 -0800 (PST)
Received: from smtpe1.intersmtp.com (smtpe1.intersmtp.com [213.121.35.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3E17D120803 for <multipathtcp@ietf.org>; Wed, 8 Jan 2020 01:42:15 -0800 (PST)
Received: from tpw09926dag07f.domain1.systemhost.net (10.9.202.38) by BWP09926083.bt.com (10.36.82.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.1.1713.5; Wed, 8 Jan 2020 09:42:12 +0000
Received: from tpw09926dag11g.domain1.systemhost.net (10.9.212.27) by tpw09926dag07f.domain1.systemhost.net (10.9.202.38) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Wed, 8 Jan 2020 09:42:12 +0000
Received: from RDW083A009ED65.bt.com (10.187.98.35) by tpw09926dag11g.domain1.systemhost.net (10.9.212.27) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Wed, 8 Jan 2020 09:42:12 +0000
Received: from GBR01-CWL-obe.outbound.protection.outlook.com (104.47.20.59) by smtpe1.intersmtp.com (62.239.224.236) with Microsoft SMTP Server (TLS) id 14.3.439.0; Wed, 8 Jan 2020 09:36:29 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LxOuzZPvpSSczZW4BcVDYTI9i9ZvLOOMikKW2TXXMZ/Ddt1Gs3xXH/q6qFFZUUjD5/m6M2CKGoORfnJpXdwmZw+vYXTteBiCK2azvWib45wPvdNT7Ckzkp2M9jiJRpwqpwnhgTu1pkB/oLpVvVtxOMxBA/SyH5OLJ6/4cBZ2pX1jtWtYPj8Hz/czUKYCq1H7ubDs0wqo4pUCSpIb3six4ds4Vhz6Ckjb85GDmVwaWUqL6F2qZFSXbc1D95vQ5oRXy0gUHabZdgTa4kLr0w0gKUULoYd5z8r2KMwr/jSGsGAL99fQvzDU9ICL+VVi2aPBth9v7kAAS7QZtCbCh+ZrKw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zDBJnT6MFahIzIcl5P4aqRKi6UcG7n+t3o+BxlnlzkM=; b=lJhs3GTq1KAzUFQEN/F46Keo5fyJLPESyxCECaYbWKcQkM2NTJ2MsT4YRlX5iqlfAMK2napAiibkOMAUFxRh7aSr17DKVaXtiRbsPw7HkXVcA7HpeYz7PDnMZrc37gPI5+2Vhp0c1W0uhGhX6fupYEZsEOLi8eTqbwyUZM2FiJEjZ/RsjgQMN93NrQskj/oeXLnKXQ3XEGLh4VZepcPnT5we2g/VR/9frVTgfoXX5AN27efYw6o0zHMcrIgsFyGOK4sg6dLfc4SWeGW7HrD80upfl8cxw31a2B1sDEOmFh+VzN0daZsljr1H+hFw5Ko2owvd70rzGgmPB1KcBybrkA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=bt.com; dmarc=pass action=none header.from=bt.com; dkim=pass header.d=bt.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bt.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zDBJnT6MFahIzIcl5P4aqRKi6UcG7n+t3o+BxlnlzkM=; b=bc47UiP0+vGvxdjL397unp7+gqdatSD36kMh5P5i7byTAIJq6Z8H0F5DxiiuiFiSTOKbgFXmZQ7R0AUOe939qpgKiZvBe1KAZyhMPI5ekR7vle4D2aulm55jxqhQ8UrgHtpefjoCAgcpdEeBYf7GZYv8G2k1zxVRk1YJgFTZcjw=
Received: from LNXP123MB2587.GBRP123.PROD.OUTLOOK.COM (20.179.128.78) by LNXP123MB2011.GBRP123.PROD.OUTLOOK.COM (20.179.128.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2602.14; Wed, 8 Jan 2020 09:42:06 +0000
Received: from LNXP123MB2587.GBRP123.PROD.OUTLOOK.COM ([fe80::55cf:bb6d:1c37:673a]) by LNXP123MB2587.GBRP123.PROD.OUTLOOK.COM ([fe80::55cf:bb6d:1c37:673a%6]) with mapi id 15.20.2602.015; Wed, 8 Jan 2020 09:42:06 +0000
From: <philip.eardley@bt.com>
To: <cpaasch=40apple.com@dmarc.ietf.org>, <alan.ford@gmail.com>
CC: <multipathtcp@ietf.org>, <mptcp@lists.01.org>
Thread-Topic: [multipathtcp] RFC6824bis edits based on implementation feedback
Thread-Index: AQHVwPYNpG55P1BKk0yzzh0gLHif56fXsn+AgAjaWaA=
Date: Wed, 8 Jan 2020 09:42:05 +0000
Message-ID: <LNXP123MB2587B06B8226C92AF33F583FEB3E0@LNXP123MB2587.GBRP123.PROD.OUTLOOK.COM>
References: <C36D742F-6D76-48FA-B6D8-44DE484A9E2C@gmail.com> <20200102182655.GB44237@MacBook-Pro-64.local>
In-Reply-To: <20200102182655.GB44237@MacBook-Pro-64.local>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=philip.eardley@bt.com;
x-originating-ip: [193.113.37.9]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8a9d40e3-e316-4028-c72c-08d7941f0607
x-ms-traffictypediagnostic: LNXP123MB2011:
x-microsoft-antispam-prvs: <LNXP123MB2011DEF2C2E3A34E30F44CC1EB3E0@LNXP123MB2011.GBRP123.PROD.OUTLOOK.COM>
x-antispam-2: 1
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 02760F0D1C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(396003)(346002)(39860400002)(366004)(136003)(376002)(199004)(189003)(53754006)(13464003)(55016002)(33656002)(5660300002)(52536014)(9686003)(2906002)(86362001)(4326008)(26005)(6506007)(53546011)(186003)(81166006)(66476007)(966005)(7696005)(66446008)(66556008)(81156014)(316002)(76116006)(8676002)(66946007)(478600001)(8936002)(71200400001)(64756008)(54906003)(110136005); DIR:OUT; SFP:1101; SCL:1; SRVR:LNXP123MB2011; H:LNXP123MB2587.GBRP123.PROD.OUTLOOK.COM; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: bt.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 8a9d40e3-e316-4028-c72c-08d7941f0607
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jan 2020 09:42:06.0415 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: a7f35688-9c00-4d5e-ba41-29f146377ab0
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: gTCg5lJG7AdbLbCmjQw5Nkzzf+C9Fa13yo7PxzeICwmyYdHQseFEix4SmD8qtLagRvQRkazloipqjrA4oD+iSQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: LNXP123MB2011
X-OriginatorOrg: bt.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/bR6s6RIeZ6hphDnH-cQxd8YAs-w>
Subject: Re: [multipathtcp] RFC6824bis edits based on implementation feedback
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Jan 2020 09:42:26 -0000

All - if you have any concerns, please send your comments as soon as possible. The deadline is 14th January. Given there's already been some discussion on the list, silence is considered as agreement.

Alan - thanks for summarising these changes and the reasons behind them.

Thanks,
Phil & Yoshi

-----Original Message-----
From: multipathtcp <multipathtcp-bounces@ietf.org> On Behalf Of Christoph Paasch
Sent: 02 January 2020 18:27
To: Alan Ford <alan.ford@gmail.com>
Cc: MultiPath TCP - IETF WG <multipathtcp@ietf.org>rg>; mptcp Upstreaming <mptcp@lists.01.org>
Subject: Re: [multipathtcp] RFC6824bis edits based on implementation feedback

+ MPTCP upstreaming community


Hello,

On 01/01/20 - 22:51:32, Alan Ford wrote:
> Hi all,
> 
> We’d love to get this to a state of completion as soon as possible, and to this end I am starting a new thread on this topic. In discussion with the chairs, it is possible to make the desired changes in AUTH48 as long as there is WG consensus. The discussion so far has been fairly limited in terms of participation.
> 
> I would ask the chairs please if it was possible to specify a time bound for this discussion and a default conclusion.
> 
> Regarding the changes, in summary, there are two areas where changes have been requested by the implementation community. As we are the IETF we obviously have strong focus on “running code” and so ease of implementing standards-compliant code is strongly desirable. However, we do not wish to reduce functionality agreed by the IETF community if it is considered a required feature by the community.
> 
> 
> Change 1
> 
> Change the sentence reading:
> 
>    If B has data to send first, then the reliable delivery of the ACK + MP_CAPABLE can be inferred by the receipt of this data with an MPTCP Data Sequence Signal (DSS) option (Section 3.3). 
> 
> To:
> 
>    If B has data to send first, then the reliable delivery of the ACK + MP_CAPABLE is ensured by the receipt of this data with an MPTCP Data Sequence Signal (DSS) option (Section 3.3) containing a DATA_ACK for the MP_CAPABLE (which is the first octet of the data sequence space).
> 
> What this means:
> 
> The current text is concerned only with ensuring a path is MPTCP capable, and so only cares that DSS option occurs on a data packet. However, the MP_CAPABLE option is defined to occupy the first octet of data sequence space and thus, if analogous to TCP, must be acknowledged. From an implementation point of view it would make sense not to have this hanging around forever and instead define it is acknowledged at the connection level as soon as received. This change ensures the first data packet also DATA_ACKs this MP_CAPABLE octet.
> 
> 
> Change 2
> 
> Change the sentence reading:
> 
>    A Data Sequence Mapping does not need to be included in every MPTCP packet, as long as the subflow sequence space in that packet is covered by a mapping known at the receiver.
> 
> To:
> 
>    The mapping provided by a Data Sequence Mapping MUST apply to some or all of the subflow sequence space in the TCP segment which carries the option. It does not need to be included in every MPTCP packet, as long as the subflow sequence space in that packet is covered by a mapping known at the receiver.
> 
> What this means:
> 
> The current text does not place any restrictions on where a mapping could appear. In theory a sender could define a thousand different mappings up front, send them all, and expect a receiver to store this and reassemble data according to these mappings as it arrives. Indeed, this was never explicitly disallowed since it “might have been useful”. The implementation community, however, has expressed concerns over the difficulty of implementing this open-endedly. How many mappings is it reasonable to store? Is there a DoS risk here? Instead, it has been requested that thee specification restricts the placement of the DSS option to being within the subflow sequence space to which it applies.
> 
> 
> Please can members of the WG express whether they are happy with these changes, or concerned.

As an implementor and having been the one kicking off this discussion, I fully support this change.



Thanks,
Christoph

_______________________________________________
multipathtcp mailing list
multipathtcp@ietf.org
https://www.ietf.org/mailman/listinfo/multipathtcp