Re: [multipathtcp] Consensus call on potential MPTCP proxy work

Joe Touch <touch@isi.edu> Thu, 20 April 2017 17:25 UTC

Return-Path: <touch@isi.edu>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A3E4129B39 for <multipathtcp@ietfa.amsl.com>; Thu, 20 Apr 2017 10:25:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.89
X-Spam-Level:
X-Spam-Status: No, score=-6.89 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0bNjPVx0E4MH for <multipathtcp@ietfa.amsl.com>; Thu, 20 Apr 2017 10:25:01 -0700 (PDT)
Received: from boreas.isi.edu (boreas.isi.edu [128.9.160.161]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87984129B31 for <multipathtcp@ietf.org>; Thu, 20 Apr 2017 10:25:01 -0700 (PDT)
Received: from [128.9.184.96] ([128.9.184.96]) (authenticated bits=0) by boreas.isi.edu (8.13.8/8.13.8) with ESMTP id v3KHOWip006732 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Thu, 20 Apr 2017 10:24:32 -0700 (PDT)
To: mohamed.boucadair@orange.com, Yoshifumi Nishida <nishida@sfc.wide.ad.jp>
References: <8c5ffa879686472594bfd3db2fa06076@rew09926dag03b.domain1.systemhost.net> <99affa00-5118-1a0f-227a-b3f4b751ffd4@isi.edu> <CAO249ye4Yz2Fgf5=XG5F3JkODym1AXrZV3pXyVLgG-h2iVhLVw@mail.gmail.com> <8cd97018-1104-c647-45fc-9135097e7420@isi.edu> <CAO249ycQqVweB5TaQNa2s8uFvQhSQrESrNmF1+8a8_ZO+Yqkyg@mail.gmail.com> <8bef96b7-1b7d-94eb-2e59-7323c2a9b866@isi.edu> <787AE7BB302AE849A7480A190F8B933009E503E2@OPEXCLILMA3.corporate.adroot.infra.ftgroup> <7dca446a-e890-6d47-41d9-4f21100e551c@isi.edu> <787AE7BB302AE849A7480A190F8B933009E50F66@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Cc: multipathtcp <multipathtcp@ietf.org>
From: Joe Touch <touch@isi.edu>
Message-ID: <e1a16d40-1a37-23d3-ceb7-580675184425@isi.edu>
Date: Thu, 20 Apr 2017 10:24:31 -0700
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <787AE7BB302AE849A7480A190F8B933009E50F66@OPEXCLILMA3.corporate.adroot.infra.ftgroup>
Content-Type: multipart/alternative; boundary="------------F79FF6160DF9B5089637E01E"
X-ISI-4-43-8-MailScanner: Found to be clean
X-MailScanner-From: touch@isi.edu
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/hr6nmD2SYA1NJSnyTyLq6zG76U8>
Subject: Re: [multipathtcp] Consensus call on potential MPTCP proxy work
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Apr 2017 17:25:03 -0000

Med,


On 4/19/2017 10:50 PM, mohamed.boucadair@orange.com wrote:
>
> Hi Joe,
>
>  
>
> I don’t understand your comments here:
>
> ·         The use of a 32-bit magic number is meant to distinguish
> application-supplied data from the one inserted by the proxy. There
> are other fields in the MP_CONVERT information element that help in
> that aim too (validation of the TLV, M-bit, for example).
>
> ·         Both entities that supply and process the data are under the
> control of the same operator.
>
> ·         The network-located proxy is explicitly configured on the
> CPE. The destination IP address of the packet is an address of that
> proxy, not the address of a legacy node.
>
> ·         The proxy must echo supplied data in a SYN/ACK. If a
> mismatch is detected by the CPE, that proxy WON’t be used for
> subsequent connections till a new proxy is configured, TTL expires, etc.
>
>  
>
> To sum:
>
> ·         We are acting on one single SYN of an MPTCP connection.
>
> ·         If a mismatch is detected for one single SYN of a given
> connection, all subsequent connections (with any remote server) won’t
> be relayed to that proxy.
>
>  
>
> How is this “hazardous”?
>

TCPM archives are full of discussions on why TFO only works for
subsequent connections to the same endpoint, due to cached cookies that
allow the SYN data to be safely interpreted *before* the end of the 3WHS.

MPTCP archives are full of discussions on why the data plane is not a
good place to put option information.

It's not practical to repeat those arguments in one email. The point is
that you're reinventing the wheel in ways that this group and other
groups already know are hazardous.

Joe

>  
>
> Thank you.
>
>  
>
> Cheers,
>
> Med
>
>  
>
> *De :*Joe Touch [mailto:touch@isi.edu]
> *Envoyé :* mercredi 19 avril 2017 20:12
> *À :* BOUCADAIR Mohamed IMT/OLN; Yoshifumi Nishida
> *Cc :* multipathtcp
> *Objet :* Re: [multipathtcp] Consensus call on potential MPTCP proxy work
>
>  
>
>  
>
>  
>
> On 4/18/2017 10:46 PM, mohamed.boucadair@orange.com
> <mailto:mohamed.boucadair@orange.com> wrote:
>
>     ...
>
>     Using the SYN data as control information is the hazardous part.
>
>     [Med] It isn’t for the for the simple reason that legacy Internet
>     nodes will never receive a SYN with CPE-supplied data and that the
>     TCP peer is known to process the supplied data. A Guard against
>     misconfigurations is supported: echo in a SYN/ACK.
>
>
> The idea of using a magic number to protect against miscommunication
> virtually ensures that there will be reliable connections with errors.
> That changes TCPs semantics.
>
> Putting data in the SYN of TFO is permitted only because of previous
> state.
>
> MPTCP doesn't have that state and so it is hazardous to put data in
> the SYN.
>
> I.e., if you want TFO-like performance, figure out how to use TFO. Period.
>
> Joe
>