Re: [tcpm] Updated version of draft-ietf-tcpm-converters-05

Olivier Bonaventure <olivier.bonaventure@tessares.net> Fri, 22 February 2019 09:18 UTC

Return-Path: <olivier.bonaventure@tessares.net>
X-Original-To: tcpm@ietfa.amsl.com
Delivered-To: tcpm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4EE81126D00 for <tcpm@ietfa.amsl.com>; Fri, 22 Feb 2019 01:18:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=tessares-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VsWfvUulJhjG for <tcpm@ietfa.amsl.com>; Fri, 22 Feb 2019 01:18:33 -0800 (PST)
Received: from mail-wr1-x431.google.com (mail-wr1-x431.google.com [IPv6:2a00:1450:4864:20::431]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 90BE11274D0 for <tcpm@ietf.org>; Fri, 22 Feb 2019 01:18:33 -0800 (PST)
Received: by mail-wr1-x431.google.com with SMTP id d17so1517724wre.10 for <tcpm@ietf.org>; Fri, 22 Feb 2019 01:18:33 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tessares-net.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc:message-id:references :to:content-transfer-encoding; bh=0HP39eInxx3V5thZQnSm5NO8gc6ouk2QWLW/e0YITl4=; b=SclW6E4Vlw2zCMUe/RajNCnarCISSYRxQsz/uBSjNBcI0EVfBKqmaB6Jw7ToVhMYGe vgJKyY1IMoCvmbm+3NRFYR3wxq1qlDaGV7rHPeQihKaefpV5m4yspp8RXduFmxAZuWho gSQNMP/7Ld16p03nrP7KpmdcIryJ9x4xlAyqpA2yqBAsVVYmo145dfCLkENCY8MGxVvp aQvSXxMQy++XIuJQ7temV36cNNwO6Eqsy7mhruLUB1Xc7u/fRnNb3koJp1TzsjN6yCMn 9Fb1oxeWLwhHh4NFezoriQTGQLMxK3JQcoFzPMvIswabUVJA6Nzk8nWdLUeUIgors5lP 4I1Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :message-id:references:to:content-transfer-encoding; bh=0HP39eInxx3V5thZQnSm5NO8gc6ouk2QWLW/e0YITl4=; b=K8O7DlPHsvcNwg09aAwZeooxZ4PF7EGlJ+ptZKFQp0wmqhuLtZYajXLBAwLG+t92jy owc7QiKIgk/m9GjbsymIJ84hkjoPk5FBO9kXWM9ndetyj5BI48bZnAG6d2tp+Cttt9q5 yOUN1A2+qp+Towjowohm9OHiKX2wUmyY02QFX7jyjCRb7JhXc4KzjppIFrMZQx85RFw3 l+Pkd1DxVirt/SCK83I7mz90urjNfFbUy+1XVHp5l2uznOCs+xFCJyIdCC9OwJxTNCP5 xv/QSXw/+tPOB3krorYKEeH91rvJ/4WGIk4ktcqtkmJTxKU0B6ZyKBNw/GUExtYgV9UK iKwA==
X-Gm-Message-State: AHQUAub4K9+592r0y/3gpJzriICOqLESJcPrtcyCCNZqQN4NQKmbhwZz nejewtswuoLppEQcaKSBbcl5LaQPXAfrwwFgk6p5zSkA8cbHTg8aRxZerCmKIW0i+bXyWFX3Axx v8w==
X-Google-Smtp-Source: AHgI3IaTNKrb3O1iqRZlNp/y9fL0ykz4fj+hjTE3fFj1HuL2Rds9uSezyssEmnpv/9cflXwTG16Vng==
X-Received: by 2002:adf:9004:: with SMTP id h4mr2244288wrh.49.1550827111639; Fri, 22 Feb 2019 01:18:31 -0800 (PST)
Received: from [10.44.66.8] (hag0-main.tessares.net. [87.98.252.165]) by smtp.gmail.com with ESMTPSA id d15sm3323221wrw.36.2019.02.22.01.18.29 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 22 Feb 2019 01:18:30 -0800 (PST)
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
From: Olivier Bonaventure <olivier.bonaventure@tessares.net>
In-Reply-To: <CAO249yc-eHAnOR7XfemQyJB+UVjmdtt43oZs+xJa=inZBBgp2w@mail.gmail.com>
Date: Fri, 22 Feb 2019 10:18:29 +0100
Cc: "tcpm@ietf.org" <tcpm@ietf.org>
Message-Id: <F1C1571F-1357-47EB-B034-78C8E743655D@tessares.net>
References: <9DD59801-36CE-407E-98F0-0BB1AAD514A7@tessares.net> <CAO249yc-eHAnOR7XfemQyJB+UVjmdtt43oZs+xJa=inZBBgp2w@mail.gmail.com>
To: Yoshifumi Nishida <nishida@sfc.wide.ad.jp>
X-Mailer: Apple Mail (2.3445.102.3)
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/tcpm/xLwg6ofCJsUs6N7IU4LpIMLnm8A>
Subject: Re: [tcpm] Updated version of draft-ietf-tcpm-converters-05
X-BeenThere: tcpm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: TCP Maintenance and Minor Extensions Working Group <tcpm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tcpm>, <mailto:tcpm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tcpm/>
List-Post: <mailto:tcpm@ietf.org>
List-Help: <mailto:tcpm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tcpm>, <mailto:tcpm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Feb 2019 09:18:36 -0000

Yoshi,
> 
> 
> 1: It seems that there are two modes in the converter architecture. One is clients use server's addresses for destination and the other is clients use converter's addresses for destination. 


The first one is clearly the most important one. I’m not aware of implementations that have explored the second case. 

>    But, clients need to use convert protocol to utilize converters. there won't be a transparent proxy like converter.
>    When I think in this way, I am wondering what's the advantages for clients to use server's address for their destinations.
>    BTW, do the implementations support both modes?

Taking MPTCP as an example, the motivation is that if the server supports MPTCP, it might be more interesting for a smartphone to establish the MPTCP connection directly to the final server. If the server does not support MPTCP, then it is better for the smartphone to establish first a connection to the converter to benefit from MPTCP in the access network. 
> 
> 2: In my understanding, this version of converter supports "client has feature X, but server doesn't" cases while it doesn't support "server has feature X, but client doesn't" cases. Or, can we do both cases? It seems to me this point is a bit unclear in the draft.   

The question becomes what are the options that the converter advertises in the SYN that it sends to the final server. One could imagine a converter that uses feature X for specific servers even if clients do not use it. A simple example is the timestamp option. Windows does not currently use timestamps
AFAIK while Linux uses them by default. A converter running on Linux and used by a Windows client would naturally advertise the timestamp option when interacting with a remote server. The same could apply to other options.

> 
> 3: I am not sure how TLS works when converter does mptcp conversions.
>     When a client have multiple subflows to a mptcp converter and use TLS for all subflows, can we establish an end-to-end TLS session between the client and the server?
> 

yes. TLS uses the bytestream and the 0-rtt convert protocol is fully transparent to the bytestream


Olivier


-- 


Disclaimer: https://www.tessares.net/mail-disclaimer/ 
<https://www.tessares.net/mail-disclaimer/>