Re: [multipathtcp] WG Last Call for draft-ietf-mptcp-rfc6824bis

Christoph Paasch <cpaasch@apple.com> Thu, 19 July 2018 14:27 UTC

Return-Path: <cpaasch@apple.com>
X-Original-To: multipathtcp@ietfa.amsl.com
Delivered-To: multipathtcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D141130E50 for <multipathtcp@ietfa.amsl.com>; Thu, 19 Jul 2018 07:27:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.311
X-Spam-Level:
X-Spam-Status: No, score=-4.311 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZcCjf8I_6_5e for <multipathtcp@ietfa.amsl.com>; Thu, 19 Jul 2018 07:27:36 -0700 (PDT)
Received: from mail-in7.apple.com (mail-out7.apple.com [17.151.62.29]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3400C1310EE for <multipathtcp@ietf.org>; Thu, 19 Jul 2018 07:27:36 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=apple.com; s=mailout2048s; c=relaxed/simple; q=dns/txt; i=@apple.com; t=1532010455; x=2395924055; h=From:Sender:Reply-To:Subject:Date:Message-id:To:Cc:MIME-version:Content-type: Content-transfer-encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-reply-to:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=VjF9ouPhv8VeWwmMnHaO8ykN1ZGorzXfh7ESRI241SA=; b=cSHQyQKnAuu6qBbwrZ5YLN5kHwO8VfY6YAZQ0pl9QbT7YaMMMud3N1M/2tOuCNvv j3a1V3U3bZqm6R9I5cGZP5vag4EgP0RBRnKaqDreooX8zPBywbJZpGsu23S1Mf9P dxDnXHQjcPuAj4WAUU20vCn/l8Qm5iw8II2Z8ymQluLA1Dwq9x9U5eX/6pSf7Krw f+SMAlxFIhU8gb048XBLrnEjjZhzY/m1Jh5dtqCW10/C7rEb6fd3mAftXptKSwWl hRoCx52vw6yccnwa9KqcmLrV7Ail4lOqDEFiwigN58mSwHp6nOpjRs/nVkRuagfh 49z6zF+mevcoSMxaDIqacA==;
X-AuditID: 11973e16-6d9ff7000000740c-e2-5b509fd709a5
Received: from mr2-mtap-s02.rno.apple.com (mr2-mtap-s02.rno.apple.com [17.179.226.134]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mail-in7.apple.com (Apple Secure Mail Relay) with SMTP id 60.DF.29708.7DF905B5; Thu, 19 Jul 2018 07:27:35 -0700 (PDT)
MIME-version: 1.0
Content-transfer-encoding: 7bit
Content-disposition: inline
Content-type: text/plain; CHARSET="US-ASCII"
Received: from nwk-mmpp-sz10.apple.com (nwk-mmpp-sz10.apple.com [17.128.115.122]) by mr2-mtap-s02.rno.apple.com (Oracle Communications Messaging Server 8.0.2.3.20180614 64bit (built Jun 14 2018)) with ESMTPS id <0PC4007DAATZ9EC0@mr2-mtap-s02.rno.apple.com>; Thu, 19 Jul 2018 07:27:35 -0700 (PDT)
Received: from process_viserion-daemon.nwk-mmpp-sz10.apple.com by nwk-mmpp-sz10.apple.com (Oracle Communications Messaging Server 8.0.2.3.20180614 64bit (built Jun 14 2018)) id <0PC400H00AKEY900@nwk-mmpp-sz10.apple.com>; Thu, 19 Jul 2018 07:27:35 -0700 (PDT)
X-Va-A:
X-Va-T-CD: 858e2f4dae29a6016c98c8320829244c
X-Va-E-CD: 3bbd785c51ace3f981efd92bc4e82048
X-Va-R-CD: 2b9cdb0e57a359d759a3675f8c35d2a7
X-Va-CD: 0
X-Va-ID: 5c085704-8961-4379-b2cc-8c25373059fe
X-V-A:
X-V-T-CD: 858e2f4dae29a6016c98c8320829244c
X-V-E-CD: 3bbd785c51ace3f981efd92bc4e82048
X-V-R-CD: 2b9cdb0e57a359d759a3675f8c35d2a7
X-V-CD: 0
X-V-ID: 54c0e7c0-11bf-4fbb-ba19-bbeb87a31961
Received: from process_milters-daemon.nwk-mmpp-sz10.apple.com by nwk-mmpp-sz10.apple.com (Oracle Communications Messaging Server 8.0.2.3.20180614 64bit (built Jun 14 2018)) id <0PC400H00AK7XZ00@nwk-mmpp-sz10.apple.com>; Thu, 19 Jul 2018 07:27:35 -0700 (PDT)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-07-19_06:,, signatures=0
X-Proofpoint-Scanner-Instance: nwk-grpmailp-qapp18.corp.apple.com-10000_instance1
Received: from localhost ([17.235.10.219]) by nwk-mmpp-sz10.apple.com (Oracle Communications Messaging Server 8.0.2.3.20180614 64bit (built Jun 14 2018)) with ESMTPSA id <0PC400C6WATYOJ80@nwk-mmpp-sz10.apple.com>; Thu, 19 Jul 2018 07:27:35 -0700 (PDT)
Sender: cpaasch@apple.com
Date: Thu, 19 Jul 2018 10:27:34 -0400
From: Christoph Paasch <cpaasch@apple.com>
To: philip.eardley@bt.com
Cc: multipathtcp@ietf.org
Message-id: <20180719142734.GZ1471@MacBook-Pro-19.local>
References: <0dd5e48298ed4b4fb7344630abc794b7@rew09926dag03b.domain1.systemhost.net> <f64af1576d994d888a7b82fb75dc8318@rew09926dag03b.domain1.systemhost.net> <20180715201445.GU1471@MacBook-Pro-19.local> <b90520f39bea4fc9a5bf22b011ec4ac0@rew09926dag03b.domain1.systemhost.net> <20180718144528.GO1471@MacBook-Pro-19.local> <ab236e37db2343d6bb11b5b1f7759ea6@rew09926dag03b.domain1.systemhost.net>
In-reply-to: <ab236e37db2343d6bb11b5b1f7759ea6@rew09926dag03b.domain1.systemhost.net>
User-Agent: Mutt/1.9.4 (2018-02-28)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrMIsWRmVeSWpSXmKPExsUiuPlRm+71+QHRBr3XTCw+r77OZrFs7QpG ByaPti+TmTyWLPnJFMAUxWWTkpqTWZZapG+XwJVx7+0ZloImsYoDU2+wNjDuEexi5OSQEDCR uPF/I2sXIxeHkMABJonrsx+xgCR4BQQlfky+B2RzcDALyEscPC8LEmYWkJZ49HcGO4StJfH9 USsLRO96JomGhhlQg7qYJGYcPsAMsYFd4s+vHSwQtrbE6cfT2GDsv8shJoHYB37fhYpzSSzY epoVZLGEgK7EjVshEGE2ifUnljBB2FoSRxceYoSxr72ZyApj377/EWotp8T5LxOhxutIXLy5 DerQTiaJbS9+QzVkSzRu+sQEsStYYv9bZYiaRiaJ36cfgS0QFpCU6L5zB2woi4CqxP9T08GO YANa9vZ2O9gcEaCaFdtXsUFCBcj++4kVotdD4vnlueyQALWQmH32NyPEgqnMEteOnWSbwKg0 CymwZyECexZSYM9CCuwFjCyrGIVyEzNzdDPzzPUSCwpyUvWS83M3MYJSxXQ7sR2MD1dZHWIU 4GBU4uFlcA2IFmJNLCuuzD3EKM3BoiTOKz7JP1pIID2xJDU7NbUgtSi+qDQntfgQIxMHp1QD 4z6H9erPQ09Zrz+Xm/HGQER8BUfbCieN6DWXWI5pMXeqan7L61+2jGFn6pH1h63fVk54w3n0 6sQpoWZ3TA6Kn5yw6OJlTnHTRVL1DL//PfnxeLPo+T1NZ/4vM05U89uuF7163ecNs/kSvfIn OPV1FnvlsF7QK/yhcuhSw59F6Tnt/ia1kyflayuxFGckGmoxFxUnAgANSfHK9gIAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/multipathtcp/sTKmkVpVssIu2dVNuQ7KHcPnPWw>
Subject: Re: [multipathtcp] WG Last Call for draft-ietf-mptcp-rfc6824bis
X-BeenThere: multipathtcp@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Multi-path extensions for TCP <multipathtcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/multipathtcp/>
List-Post: <mailto:multipathtcp@ietf.org>
List-Help: <mailto:multipathtcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/multipathtcp>, <mailto:multipathtcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Jul 2018 14:27:50 -0000

On 18/07/18 - 15:47:43, philip.eardley@bt.com wrote:
> Something that needs fixing which Christoph and I just noticed during a chat at the IETF:
> 
> S3.7 on Fallback has 
> <<Note that this rule essentially prohibits the sending of data on the
>    third packet of an MP_CAPABLE or MP_JOIN handshake, since both that
>    option and a DSS cannot fit in TCP option space.>>
> this needs a mod now data is allowed on the third packet.
> 
> .....

Created
https://github.com/multipath-tcp/draft-ietf-mptcp-rfc6824bis/issues/12.

> 
> > 
> > [phil] ok - if I get it right the motivation for the change in the MP_CAPABLE protocol exchange starts from the observation that option space is most constrained in the SYN, so reducing the size of MP_CAPABLE in the SYN allows other TCP options to be used in the SYn. As a consequence of this decision, Host A doesn't know that Host B has learnt its key, unless the ACK is sent reliably.  
> 
> The story actually unfolded the other way around. We identified a need for reliable key-exchanges when talking to stateless servers. Based on this we made the key-exchange reliable in the third ACK/first data segment.
> 
> Upon this, we realized that we can gain space in the SYN.
> 
> Thus, the motivation for the change was the need for the reliable MP_CAPABLE.
> 
> > I think it would be useful to tweak the figure in Section 2.1 - just to say the ack is delivered reliably. 
> 
> Incorporating it into the figure seems tricky to me. I changed the first sentence to mention data as well: "... initial ACK (and data) packets also ..."
> 
> [phil2] the figure in S2.1 (ie in the Operation Overview section) should be modified. As it is compulsory to send the MP_CAPABLE ACK message on the first data packet. Sending MP_CAPABLE ACK without data is done if host A doesn't have data to send, but you still have to send ACK later with the first data. Whereas the natural way to interpret the current fig in S2.1 is that the Ack is sent once.

I will rework this as I review the whole MP_CAPABLE exchange.

> 
> 
> ......
> 
> I have another comment. In Section 3.1, there is:
> 
> If receiving a message with the 'B' flag set to 1, and this is not understood, then this SYN MUST be silently ignored.
> 
> 
> I suggest to change this to "... then the MP_CAPABLE in this SYN MUST be silently ignored.". Otherwise, hosts setting the B-bit to test for a feature-capability will incur a SYN-retransmission timeout, which is a huge latency penalty.
> 
> Please let me know if that is acceptable.
> 
> [phil2] fine by me - please make it clear this means fallback to TCP (as in similar text for other cases where we fallback)

Incorporated it into
https://github.com/multipath-tcp/draft-ietf-mptcp-rfc6824bis/pull/6.


Cheers,
Christoph