Re: [multipathtcp] Options or Payload?

Joe Touch <touch@ISI.EDU> Tue, 10 November 2009 01:55 UTC

Return-Path: <touch@ISI.EDU>
X-Original-To: multipathtcp@core3.amsl.com
Delivered-To: multipathtcp@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7449F3A6A42 for <multipathtcp@core3.amsl.com>; Mon, 9 Nov 2009 17:55:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JVBfT7yQ84Yo for <multipathtcp@core3.amsl.com>; Mon, 9 Nov 2009 17:55:40 -0800 (PST)
Received: from nitro.isi.edu (nitro.isi.edu [128.9.208.207]) by core3.amsl.com (Postfix) with ESMTP id 179EB3A69E2 for <multipathtcp@ietf.org>; Mon, 9 Nov 2009 17:55:21 -0800 (PST)
Received: from [133.93.24.140] (host-24-140.meeting.ietf.org [133.93.24.140]) (authenticated bits=0) by nitro.isi.edu (8.13.8/8.13.8) with ESMTP id nAA1sYpG005605 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Mon, 9 Nov 2009 17:54:36 -0800 (PST)
Message-ID: <4AF8C7D9.5020506@isi.edu>
Date: Mon, 09 Nov 2009 17:54:33 -0800
From: Joe Touch <touch@ISI.EDU>
User-Agent: Thunderbird 2.0.0.23 (Windows/20090812)
MIME-Version: 1.0
To: Yoshifumi Nishida <nishida@sfc.wide.ad.jp>
References: <2181C5F19DD0254692452BFF3EAF1D6808D7BB51@rsys005a.comm.ad.roke.co.uk> <20091110.103522.15256464.nishida@sfc.wide.ad.jp>
In-Reply-To: <20091110.103522.15256464.nishida@sfc.wide.ad.jp>
X-Enigmail-Version: 0.96.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-MailScanner-ID: nAA1sYpG005605
X-ISI-4-69-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Cc: multipathtcp@ietf.org
Subject: Re: [multipathtcp] Options or Payload?
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/multipathtcp>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Nov 2009 01:55:41 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This has been tried in various places in TCP to extend the options
space. It'd be useful to take a look at that work as context.

Joe

Yoshifumi Nishida wrote:
> Hello,
> How about having a simple option which indicates the offset for real tcp payload?
> For example, if mptcp packets conveys 10 bytes control info in the payload, set 
> offset to 10 in the option.
> 
> Thanks,
> --
> Yoshifumi Nishida
> nishida@sfc.wide.ad.jp
> 
> From: "Ford, Alan" <alan.ford@roke.co.uk>
> Subject: [multipathtcp] Options or Payload?
> Date: Tue, 10 Nov 2009 00:58:48 -0000
> Message-ID: <2181C5F19DD0254692452BFF3EAF1D6808D7BB51@rsys005a.comm.ad.roke.co.uk>
> 
>  > Hi all,
>  > 
>  > One of the big issues to be raised during yesterday's MPTCP session was
>  > the question of whether TCP Options are really the right place to be
>  > doing this. This is not the first time this has come up but deserves
>  > further exploration.
>  > 
>  > Specifically, instead of doing this with TCP Options, the same
>  > instructions could be included in the payload. Similar to TLS, the data
>  > could be chunked and each chunk has a data sequence and length header.
>  > These can be interspersed with control blocks to signal addresses,
>  > security of joining subflows to connections, and connection close. A
>  > simple 2-octet TCP option would still be used in the initial SYN to
>  > signal MPTCP capability.
>  > 
>  > This has the benefit that it would allow the signalling to have
>  > reliability, and we wouldn't be hit with option space limits, and thus
>  > be potentially able to do better security algorithms. It would also give
>  > us greater freedom in signals for future extensibility (for example, if
>  > we wanted to signal ports for additional subflows, not just addresses).
>  > 
>  > On the downside, there may be cases where this could confuse
>  > middleboxes, e.g. expecting HTTP on port 80 and finding this kind of
>  > data instead. However, since a TCP option would be used at the start to
>  > identify capability, if this were dropped by a middlebox/proxy then
>  > MPTCP would not be used.
>  > 
>  > What do people think is the best approach?
>  > 
>  > Regards,
>  > Alan
>  > 
>  > _______________________________________________
>  > multipathtcp mailing list
>  > multipathtcp@ietf.org
>  > https://www.ietf.org/mailman/listinfo/multipathtcp
> _______________________________________________
> multipathtcp mailing list
> multipathtcp@ietf.org
> https://www.ietf.org/mailman/listinfo/multipathtcp
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iEYEARECAAYFAkr4x9kACgkQE5f5cImnZrvWAwCghDjI91tfGfNVoizvAD7u8CA1
DF0AoJa7A4tFzxvsrjYKiVRIJIuF96CD
=dJcd
-----END PGP SIGNATURE-----