Re: [multipathtcp] towards a potential work item on two-ended proxy

"Henderickx, Wim (Nokia - BE)" <> Fri, 05 August 2016 04:25 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id C1DF912D14F for <>; Thu, 4 Aug 2016 21:25:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -6.901
X-Spam-Status: No, score=-6.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id RPhYcLy5YRTc for <>; Thu, 4 Aug 2016 21:25:33 -0700 (PDT)
Received: from ( []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by (Postfix) with ESMTPS id D7CEF124281 for <>; Thu, 4 Aug 2016 21:25:32 -0700 (PDT)
Received: from (unknown []) by Websense Email Security Gateway with ESMTPS id DA04F71B5EAC5; Fri, 5 Aug 2016 04:25:28 +0000 (GMT)
Received: from ( []) by (GMO-o) with ESMTP id u754PTIC002775 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 5 Aug 2016 04:25:29 GMT
Received: from ( []) by (GMO) with ESMTP id u754NG8A004891 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Fri, 5 Aug 2016 06:25:29 +0200
Received: from ([]) by ([]) with mapi id 14.03.0195.001; Fri, 5 Aug 2016 06:23:48 +0200
From: "Henderickx, Wim (Nokia - BE)" <>
To: Christoph Paasch <>
Thread-Topic: [multipathtcp] towards a potential work item on two-ended proxy
Date: Fri, 5 Aug 2016 04:23:47 +0000
Message-ID: <>
References: <> <> <> <> <> <> <> <> <> <> <> <> <> <>
In-Reply-To: <>
Accept-Language: nl-BE, en-US
Content-Language: en-US
user-agent: Microsoft-MacOutlook/
x-originating-ip: []
Content-Type: multipart/alternative; boundary="_000_E1036C03C0424F568EFCA23475BE6233nokiacom_"
MIME-Version: 1.0
Archived-At: <>
Cc: MultiPath TCP - IETF WG <>
Subject: Re: [multipathtcp] towards a potential work item on two-ended proxy
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Multi-path extensions for TCP <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 05 Aug 2016 04:25:37 -0000

In-line sorry was on the road yesterday

From: Christoph Paasch <<>> on behalf of Christoph Paasch <<>>
Date: Thursday 4 August 2016 at 06:32
To: Wim Henderickx <<>>
Cc: Tommy Pauly <<>>, MultiPath TCP - IETF WG <<>>
Subject: Re: [multipathtcp] towards a potential work item on two-ended proxy


On Aug 3, 2016, at 9:14 PM, Henderickx, Wim (Nokia - BE) <<>> wrote:
From: <<>> on behalf of Tommy Pauly <<>>
Date: Thursday 4 August 2016 at 02:10
To: Wim Henderickx <<>>
Cc: Alan Ford <<>>, "<>" <<>>
Subject: Re: [multipathtcp] towards a potential work item on two-ended proxy

On Aug 3, 2016, at 11:58 AM, Henderickx, Wim (Nokia - BE) <<>> wrote:

Alan, in-line

From: Alan Ford <<>>
Date: Wednesday 3 August 2016 at 09:20
To: Wim Henderickx <<>>
Cc: Rao Shoaib <<>>, "<>" <<>>
Subject: Re: [multipathtcp] towards a potential work item on two-ended proxy

Hi Wim, all,

Comment inline...

On 2 Aug 2016, at 20:11, Henderickx, Wim (Nokia - BE) <<>> wrote:
On 02/08/16 15:52, "Alan Ford" <<>> wrote:

I’m trying to distinguish the various use cases; can we confirm this is correct?

Transparent Mode
- Source address = real source address
WH> not always since NAT can be in the path
- Destination address = real destination address
- Transparent proxies create MPTCP functionality in the stream, adding and removing the MPTCP headers, mapping seq numa, etc
- Latest proposal is to add an indicator to say “this is proxied” so that a proxy can intercept it
WH> indeed or not intercept it based on the indication

Plain Mode
- Source address = real source
WH> could also be NATed in some use cases
- Destination address = proxy destination address
- Signalling protocol inside indicates real destination address
WH> or SRC address

So - please correct me if this is wrong - but the main difference is that Plain Mode is targeted towards a proxy server whereas the transparent mode does not change src/dst addresses?
WH> the main difference is mainly DST IP is changed to get explicit routing to the proxy versus being implicit in the transparent case

OK, so my understanding appears correct here.
WH> yes

The issue I see with a generic proxy bit is that it does not contain any context about what kind of proxy is being intercepted. You could be sending in good faith expecting it to be picked up by Proxy from Operator A, but in fact is picked up by Operator B.
WH> the network assisted proxy is mainly targeting single operator/controlled operator use cases to avoid these issues.

As I’ve said before, the plain mode option is not MPTCP-specific and is simple a signal that says “everything that follows is actually targeted for IP address a.b.c.d” - this is entirely transport-agnostic. If the HAG could know where to find a proxy (e.g. a well-known anycast address) then addresses could be rewritten and packets forwarded, with no need for any MPTCP protocol changes.
WH> you would still need to know the original destination IP@ that the application wanted to go to.

Which is the point of the signalling protocol - the proposed “plain mode option” which is actually carried in the payload. My issue with this is that this is _not MPTCP-specific_. This is simply a signal above the transport layer to inform a proxy what the real destination is.

WH> I hear, you and I understand but we have an explicit use case for this with MPTCP and so far not in any other protocol. Hence I think it is good to extend MPTCP with this capability and liase with other WG(s) about this.

While you may have a use-case for having proxies work with your MPTCP solution, it does not directly follow that the MPTCP protocol or WG is the best place to specify how the proxy works. This really does seem like a proxy solution that can be made more generic, and at the very least belongs as a protocol that is run within the MPTCP stream. This is what the SOCKS protocol does, and there is no reason you can't run SOCKS over MPTCP, or create a new variant of SOCKS or a similar protocol that you will run on top of MPTCP for your solution. Indeed, it could be seen as a benefit to work on the proxying solution independently from MPTCP, since that way it can be used for other transports. The end result will be the same, and the architecture will be cleaner.

WH> given the extension is specific in TCP?MPTCP since we carry the information in a SYN packet it becomes specific to the protocol and hence I still believe it fits.

The information is actually carried in the payload. So, it is not really part of TCP/MPTCP. Carrying it in the SYN is just because TCP does not prevent carrying data in the SYN-segment.

WH> we added it in the payload due to limited option space available in TCP

Other transport mechanisms have other means and can adopt a similar information element but the way the protocol consumes it is specific and should be done in the protocol afais.

I disagree that the information is consumed by MPTCP. It is rather consumed by the application sitting right on top of MPTCP, because this is the one that is reading the data out of the MPTCP-stream and forwarding it over to final destination. And MPTCP itself is not really using the plain-mode option.

If you look at Socks v4, it is actually carrying the exact same information than the plain-mode option (besides the protocol-field). So, an implementation could easily put the Socks-client request in the SYN-payload. The proxy who receives that can then (after connecting to the final server) reply in the SYN/ACK with the Socks-server option in the SYN/ACK's payload. And from there on, the data will be forwarded from one side to the other.

This would be a low-overhead handshake for the proxy without the chatty overhead of Socks v5.

WH> Latency matters here and people already experienced that additional signaling messages with its roundtrip  degrades QoE. Even adding 2 message is not the right way to go and hence we want to add the informational elements in the messages in MPTCP. As such we need to enhance the information elements in TCP/MPTCP protocol to indicate that there is some data available that needs to be consumed by the proxy to operate properly. You need to extend the protocol to provide this capability in my view. The addition of adding a sub flow in MPTCP also provides addressing information and we need similar information for the MPTCP proxy (do the proxy or not, src/dst info, etc). We carry the data in the SYN due to limited option space but we could carry it in the option data as well. As such it becomes TCP specific and we believe it is best to leverage on the TCP framework to extend  this capability.