Re: [tcpm] Updated version of draft-ietf-tcpm-converters-05

<mohamed.boucadair@orange.com> Mon, 04 March 2019 06:50 UTC

Return-Path: <mohamed.boucadair@orange.com>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 072A1131006 for <tcpm@ietfa.amsl.com>; Sun, 3 Mar 2019 22:50:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fSCvbehdlGiF for <tcpm@ietfa.amsl.com>; Sun, 3 Mar 2019 22:50:31 -0800 (PST)
Received: from orange.com (mta135.mail.business.static.orange.com [80.12.70.35]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F01A1228B7 for <tcpm@ietf.org>; Sun, 3 Mar 2019 22:50:31 -0800 (PST)
Received: from opfednr04.francetelecom.fr (unknown [xx.xx.xx.68]) by opfednr24.francetelecom.fr (ESMTP service) with ESMTP id 44CVys2JKRz1y95; Mon, 4 Mar 2019 07:50:29 +0100 (CET)
Received: from Exchangemail-eme6.itn.ftgroup (unknown [xx.xx.13.89]) by opfednr04.francetelecom.fr (ESMTP service) with ESMTP id 44CVys1N1kz1xnx; Mon, 4 Mar 2019 07:50:29 +0100 (CET)
Received: from OPEXCAUBMA2.corporate.adroot.infra.ftgroup ([fe80::e878:bd0:c89e:5b42]) by OPEXCAUBM44.corporate.adroot.infra.ftgroup ([fe80::e8a4:8bb:d7c2:f4e2%21]) with mapi id 14.03.0435.000; Mon, 4 Mar 2019 07:50:29 +0100
From: mohamed.boucadair@orange.com
To: "Scharf, Michael" <Michael.Scharf@hs-esslingen.de>, Olivier Bonaventure <olivier.bonaventure@tessares.net>, "tcpm@ietf.org" <tcpm@ietf.org>
Thread-Topic: [tcpm] Updated version of draft-ietf-tcpm-converters-05
Thread-Index: AQHUv86JmdngfITgq0CMtVlOHS+P7aX6oiiggACAVxA=
Date: Mon, 04 Mar 2019 06:50:28 +0000
Message-ID: <787AE7BB302AE849A7480A190F8B93302EA27A85@OPEXCAUBMA2.corporate.adroot.infra.ftgroup>
References: <9DD59801-36CE-407E-98F0-0BB1AAD514A7@tessares.net> <6EC6417807D9754DA64F3087E2E2E03E2D248C3C@rznt8114.rznt.rzdir.fht-esslingen.de>
In-Reply-To: <6EC6417807D9754DA64F3087E2E2E03E2D248C3C@rznt8114.rznt.rzdir.fht-esslingen.de>
Accept-Language: fr-FR, en-US
Content-Language: fr-FR
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.114.13.247]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/lqOtHHrxaSWn2hRZJh8WEQ1b0s8>
Subject: Re: [tcpm] Updated version of draft-ietf-tcpm-converters-05
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Mar 2019 06:50:34 -0000

Hi Michael,

Please see inline. 

Cheers,
Med

> -----Message d'origine-----
> De : tcpm [mailto:tcpm-bounces@ietf.org] De la part de Scharf, Michael
> Envoyé : lundi 4 mars 2019 00:48
> À : Olivier Bonaventure; tcpm@ietf.org
> Objet : Re: [tcpm] Updated version of draft-ietf-tcpm-converters-05
> 
> Hi Olivier,
> 
> I have read -05. Please find below some comments/questions (with chair hat
> off):
> 
> - Page 8: Sorry if I missed this... Can a client ask the converter to send
> application data in the SYN payload data to the server (possibly even without
> TFO option)? Is it correct that the Convert protocol does not allow such use
> of SYN payload data towards the remote host?
> 

[Med] The Converter does not track whether a client has negotiated TFO, as such any data supplied in the initial SYN is related to the server by the converter. The following rule applies: 

   Any user data received by the Transport Converter over the upstream
   (resp., downstream) connection is relayed over the downstream (resp.,
   upstream) connection.
 

> - Page 8: What happens if the SYN,ACK from the server to the converter
> contains payload data (possibly even without TFO option)?

[Med] Idem as above. 

> 
> - Page 10: I wonder if the text on address sharing modes can be understood
> without having read RFC 4787 and RFC 6888 and whether they would be normative
> references (instead of informative references).

[Med] Makes sense. Updated the draft accordingly. 

> 
> - Page 13: If the remote host used payload data in the SYN towards the
> converter (possibly even without TFO option), would this require any special
> handling in the converter?

[Med] Data supplied to the converter is unambiguously distinguished from the data destined to the server. This is covered by this field: 

   The Total Length is the number of 32 bits word, including the header,
   of the bytestream that are consumed by the Convert messages.

> 
> - Page 18: Is my understanding correct that when a client sends a Connect TLV
> with one of its own addresses as "remote peer IP Address", then the transport
> converter MUST attempt to establish this connection?

[Med] This is policy-based. The converter may restrict relying MPTCP connections on its customer-facing interfaces or may relax it.  
The draft can set a default behavior, though. 

>From where I sit, I'd like to allow for a possible future extension similar to what is defined for SBCs in https://tools.ietf.org/html/rfc6849 for troubleshooting purposes.  

What is your take on this? 

 In other words, a
> converter that would _not_ set up this connection back to the client would
> violate the protocol specification?

[Med] No.

> 
> - Page 25/26: Related to the first two comments: In this discussion on TFO
> handling, I wonder what would happen to actual payload data in the SYN or
> SYN,ACK of the connection between the converter and the remote peer.

[Med] This is covered by this rule:

   Any user data received by the Transport Converter over the upstream
   (resp., downstream) connection is relayed over the downstream (resp.,
   upstream) connection.

> 
> - Page 29: "IANA is requested to create the "Convert versions" sub-registry.
> New values are assigned via Standards Action." The term "Standards Action" is
> defined in RFC 8126 Section 4.9. I observe that this document specifies an
> experimental protocol. Why is the IANA policy not set e.g. to "RFC required"?

[Med] If we have to change the policy, I suggest we go for "IETF Review".   

> 
> - Page 30: "The values in the range 1-127 can be assigned via Standards
> Action." Again, what is the reason for not using e.g. "RFC required" here?

[Med] Idem.

> 
> - Page 34: Changes from 04 to -05 are not documented, e.g. the text below
> could be useful here
> 
> - Page 40: " A first difference is that the Convert protocol leverages the
> TFO option [RFC7413] to exchange all control information during the three-way
> handshake." That seems inconsistent with what is written below.
> 

[Med] Good catch. 


> Editorial nits:
[Med] Wiil be fixed: https://github.com/obonaventure/draft-tcp-converters/pull/55/files  

> 
> - Page 5: "Applicability document may _be_ defined in the future."
> 
> - Page 7: "making use of _new_ TCP extensions"
> 
> Best regards
> 
> Michael
> 
> 
> > -----Original Message-----
> > From: tcpm <tcpm-bounces@ietf.org> On Behalf Of Olivier Bonaventure
> > Sent: Friday, February 8, 2019 5:51 PM
> > To: tcpm@ietf.org
> > Subject: [tcpm] Updated version of draft-ietf-tcpm-converters-05
> >
> > Hello,
> >
> > We have uploaded a new version of draft-ietf-tcpm-converters-05 (see
> >  https://www.ietf.org/internet-drafts/draft-ietf-tcpm-converters-05.txt )
> > that includes a lot of feedback from implementors who have worked on
> > client and server side implementations. Compared to the previous version,
> > the main modifications are the following :
> >
> > - TCP Fast Open is not strictly required anymore. Several implementors
> > expressed concerns about this requirement. The TFO Cookie protects from
> > some attack scenarios that affect open servers like web servers. The
> Convert
> > protocol is different and as discussed in RFC7413, there are different ways
> to
> > protect from such attacks. Instead of using a TFO cookie inside the TCP
> > options, which consumes precious space in the extended TCP header, this
> > new version supports the utilisation of a Cookie that is placed in the SYN
> > payload. This provides the same level of protection as a TFO Cookie in
> > environments were such protection is required.
> >
> > - the Boostrap procedure has been simplified based on feedback from
> > implementers
> >
> > - Error messages are not included in RST segments anymore but sent in the
> > bytestream. Implementors have indicated that processing such segments on
> > clients was difficult on some platforms. This change simplifies client
> > implementations.
> >
> > - many small editorial changes to clarify the text based on implementors
> > feedback
> >
> > Chairs, we believe that the document is now stable. As the milestone was
> set
> > to
> > December 2018, we kindly request to organize a WGLC on -05 ASAP so that
> > we can address issues that may arise during the call and prepare an updated
> > version for the Prague meeting.
> >
> > FWIW, both the Broadband Forum and 3GPPP are working on documents
> > that leverage the protocol proposed in this draft.
> >
> > Best regards,
> >
> > Olivier and Med
> > --
> >
> >
> > Disclaimer: https://www.tessares.net/mail-disclaimer/
> > <https://www.tessares.net/mail-disclaimer/>
> >
> >
> > _______________________________________________
> > tcpm mailing list
> > tcpm@ietf.org
> > https://www.ietf.org/mailman/listinfo/tcpm
> 
> _______________________________________________
> tcpm mailing list
> tcpm@ietf.org
> https://www.ietf.org/mailman/listinfo/tcpm