0-RTT TCP Convert Protocol
draft-ietf-tcpm-converters-19
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2020-07-31
|
19 | (System) | IANA registries were updated to include RFC8803 |
2020-07-28
|
19 | (System) | Received changes through RFC Editor sync (created alias RFC 8803, changed abstract to 'This document specifies an application proxy, called Transport Converter, to assist … Received changes through RFC Editor sync (created alias RFC 8803, changed abstract to 'This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. A Transport Converter may provide conversion service for one or more TCP extensions. The conversion service is provided by means of the 0-RTT TCP Convert Protocol (Convert). This protocol provides 0-RTT (Zero Round-Trip Time) conversion service since no extra delay is induced by the protocol compared to connections that are not proxied. Also, the Convert Protocol does not require any encapsulation (no tunnels whatsoever). This specification assumes an explicit model, where the Transport Converter is explicitly configured on hosts. As a sample applicability use case, this document specifies how the Convert Protocol applies for Multipath TCP.', changed pages to 47, changed standardization level to Experimental, changed state to RFC, added RFC published event at 2020-07-28, changed IESG state to RFC Published) |
2020-07-28
|
19 | (System) | RFC published |
2020-07-26
|
19 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2020-07-17
|
19 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2020-05-14
|
19 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2020-04-03
|
19 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'Overtaken by Events' |
2020-04-03
|
19 | Tero Kivinen | Assignment of request for Last Call review by SECDIR to Leif Johansson was marked no-response |
2020-03-30
|
19 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2020-03-30
|
19 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2020-03-30
|
19 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2020-03-27
|
19 | (System) | IANA Action state changed to Waiting on Authors |
2020-03-24
|
19 | (System) | RFC Editor state changed to EDIT |
2020-03-24
|
19 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2020-03-24
|
19 | (System) | Announcement was received by RFC Editor |
2020-03-24
|
19 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2020-03-24
|
19 | Amy Vezza | IESG has approved the document |
2020-03-24
|
19 | Amy Vezza | Closed "Approve" ballot |
2020-03-24
|
19 | Amy Vezza | Ballot approval text was generated |
2020-03-24
|
19 | Mirja Kühlewind | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2020-03-22
|
19 | Mohamed Boucadair | New version available: draft-ietf-tcpm-converters-19.txt |
2020-03-22
|
19 | (System) | New version approved |
2020-03-22
|
19 | (System) | Request for posting confirmation emailed to previous authors: Mohamed Boucadair , Sri Gundavelli , Olivier Bonaventure , tcpm-chairs@ietf.org, SungHoon Seo , Benjamin Hesmans |
2020-03-22
|
19 | Mohamed Boucadair | Uploaded new revision |
2020-03-21
|
18 | Roman Danyliw | [Ballot comment] Thank you for addressing my DISCUSS and COMMENT points. |
2020-03-21
|
18 | Roman Danyliw | [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss |
2020-03-20
|
18 | Benjamin Kaduk | [Ballot comment] Thank you for adding the applicability statement; it removes the main sense of having disparate deployment scenarios one of which is well-defined and … [Ballot comment] Thank you for adding the applicability statement; it removes the main sense of having disparate deployment scenarios one of which is well-defined and the other of which requires some under-specified actions in order to be secure. I'm still pretty uneasy about giving such emphasis to the "0-RTT" nature of this service, and feel that achieving the "0-RTT" nature relies on some strong assumptions on the nature of the network in which the protocol is being deployed, so that the 0-RTT nature is not as much an attribute of the protocol itself as the combination of the protocol and the deployment scenario. That said, the document is not describing an internally inconsistent state, so I cannot justify making this a Discuss-level point any more. |
2020-03-20
|
18 | Benjamin Kaduk | [Ballot Position Update] Position for Benjamin Kaduk has been changed to No Objection from Discuss |
2020-03-06
|
18 | Éric Vyncke | [Ballot comment] Med and other authors, Thank you for addressing my previous DISCUSS (kept below for archival purpose), they are now cleared. Most of my … [Ballot comment] Med and other authors, Thank you for addressing my previous DISCUSS (kept below for archival purpose), they are now cleared. Most of my COMMENTs were also addressed. BUT, the new version has a couple of typos in the changed text, e.g., 'relam' rather than 'realm'. It also uses 'Unassigned' rather than the usual 'Reserved', is there any reason? Finally, I wonder why the 'magic number' has been introduced and while using the RFC number if 'fun' the entropy is not that high. Anyway, the document can be published in my opinion Thank you for all the work and the fast reaction -éric == OLD DISCUSS == -- Section 1.2 -- A trivial one: while the title and the abstract of this document appear as quite generic, the document focus is reduced later in section 1.2 to MPTCP: "this document specifies how the Convert Protocol applies for Multipath TCP. It is out of scope of this document to provide a comprehensive list of all potential conversion services. " While I do not mind having a focus on MPTCP only, I would strongly suggest to reflect this focus in the title and in the abstract (the current filename is correct). -- Section 6.2.8 -- I appreciate that this is an experimental document, but, having only 2 occurrences of ICMP in the whole document and no real "how to process" TLV "Destination Unreachable"... and the payload of this TLV having only the code without the offending packet will probably make Path MTU discovery (and other mechanisms) impossible. While I am not a transport expert, I believe that this aspect needs to be described in this document. == COMMENTS == -- Section 1.2 -- Is the benefit of a transport proxy only for the clients as written in the 1st paragraph? It was probably the case for the original MPTCP proxy but what about other TCP extensions? -- Section 4.1 -- While the difference "(Internet-facing interface, customer-facing interface)" will probably represent the vast majority of use cases, I wonder whether there will always be a single Internet-facing ? Could probably be 0 or 2 in some use cases... Suggest to remove this part of the text. -- Section 6.1 -- Please state the usual wording about "unassigned" field: it must be ignored by the receiver. Adding some explanations on why version 0 is reserved but cannot be used would be welcome. -- Section 6.2.5 -- Can the "remote peer IP address" be a link-local address ? == NITS == -- Section 1.1 (and possibly others) -- Please use a consistent means of introducing acronyms, cfr URLLC and ATSSS ;-) -- Section 4.2 --- The use of "regular TCP packets" makes me wonder whether the authors think that MPTCP uses "irregular TCP packets"... The use of 'regular' seems a little weird here but I am not a native English speaker. -- Section 4.3 -- The caption below figure 7 ends with "(TCP)" that is not the acronym of "Transport Session Entry". Is it expected ? |
2020-03-06
|
18 | Éric Vyncke | [Ballot Position Update] Position for Éric Vyncke has been changed to No Objection from Discuss |
2020-03-06
|
18 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2020-03-06
|
18 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2020-03-06
|
18 | Mohamed Boucadair | New version available: draft-ietf-tcpm-converters-18.txt |
2020-03-06
|
18 | (System) | New version approved |
2020-03-06
|
18 | (System) | Request for posting confirmation emailed to previous authors: Olivier Bonaventure , tcpm-chairs@ietf.org, Sri Gundavelli , Benjamin Hesmans , SungHoon Seo , Mohamed Boucadair |
2020-03-06
|
18 | Mohamed Boucadair | Uploaded new revision |
2020-03-05
|
17 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2020-03-05
|
17 | Alexey Melnikov | [Ballot comment] It is not very clear whether the WG expects many future version of this protocol. Version compatibility story is not very clear in … [Ballot comment] It is not very clear whether the WG expects many future version of this protocol. Version compatibility story is not very clear in this document, so the WG should think about it. |
2020-03-05
|
17 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
2020-03-05
|
17 | Jean Mahoney | Closed request for Last Call review by GENART with state 'Overtaken by Events' |
2020-03-05
|
17 | Jean Mahoney | Assignment of request for Last Call review by GENART to Suhas Nandakumar was marked no-response |
2020-03-05
|
17 | Suresh Krishnan | [Ballot comment] I had a similar question as Éric on the handling of ICMP messages and related troubleshooting (specifically I was concerned about the non-Type … [Ballot comment] I had a similar question as Éric on the handling of ICMP messages and related troubleshooting (specifically I was concerned about the non-Type 1 (Destination Unreachable) messages. I saw the authors responded and I will keep track of the discussion. |
2020-03-05
|
17 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2020-03-05
|
17 | Benjamin Kaduk | [Ballot discuss] I agree with Roman, and present a somewhat different take on some of the key aspects of the scoping discussion. I have pretty … [Ballot discuss] I agree with Roman, and present a somewhat different take on some of the key aspects of the scoping discussion. I have pretty fundamental concerns about describing this protocol as a "0-RTT" service when it both requires strong mutual authentication/authorization of the communicating endpoints and relies on the (local) network to provide those properties. If IP in general provided the kind of mutual authentication assumed here, the internet would be a much more secure place! Unfortunately, it does not and I think this document does its readers a disservice by transparently assuming that it does (in the main body of text; the security considerations do touch on the requisite details). It would be better to discuss the proxy protocol separately from the deployment considerations that allow it to be used without additional set-up in specific deployment scenarios. And that's only when considering the client authenticating the server! Mutual authentication also requires the server to authenticate the client and be able to make authorization decisions based upon that authenticated identity. The deployment model presented here seems to imply a very tight coupling between the Transport Converter operator and the network service provider (in order to determine, based on client IP address, the authenticated client identity and access an authorization database); this seems to make it incompatible with the stated possibility of using a third-party Transport Converter. Additionally, it raises some questions along the lines of draft-arkko-iab-internet-consolidation and draft-iab-for-the-users. The sketch of a solution for more open network environments in Section 9.2 is insecure (once a Cookie is generated and sent once, it can be freely replayed by an attacker during the Cookie lifetime, which defeats the authorization requirement of the convert protocol). Either fix it or remove it entirely. Please resolve the internal inconsistency in Section 6.2.4 which says that TCP option Kind 0 MUST NOT appear in the list but then goes on to say that the list is padded with zeros to a 32-bit boundary. (There is no listed requirement that the options are listed in any given order, which would be needed to assign a boundary between "listed options" and "padding".) Why do we need the Cookie TLV at all if the underlying local network supplies all the authentication and authorization that the protocol needs? Section 1.2 says that the Convert Protocol "is an application-layer protocol which uses a dedicated TCP port number", but the IANA request in Section 10.1 is for a service name without fixed port number. |
2020-03-05
|
17 | Benjamin Kaduk | [Ballot comment] Section 1.1 scheme can be applied independently on clients and servers. Other improvements such as Selective Acknowledgments [RFC2018] or … [Ballot comment] Section 1.1 scheme can be applied independently on clients and servers. Other improvements such as Selective Acknowledgments [RFC2018] or large windows [RFC7323] require a new TCP option or to change the semantics of some fields in the TCP header. These modifications must be deployed on both clients and servers to be actually used on the Internet. Experience with the latter TCP extensions reveals that their deployment can require many years. Fukuda reports in Do we want to say "the latter" or "the latter class of"? Timestamps. [ANRW17] describes measurements showing that TCP Fast Open (TFO) [RFC7413] is still not widely deployed. Perhaps people are turned off by its privacy properties or lack confidence that their data can tolerate replay? This is not the most compelling example of a TCP feature that everyone should be using... More recently, 5G bonding experimentation has been conducted into global range of the incumbent 4G (LTE) connectivity using newly devised clients and a Multipath TCP proxy. Even if the 5G and the 4G bonding relying upon Multipath TCP increases the bandwidth, it is as nit: the grammar is not right here; either "to increase" or "reliance upon", depending on the intended meaning, I think. mobile core. In order to handle URLLC (Ultra Reliable Low Latency Communication) for the next generation mobile network, Multipath TCP and its proxy mechanism such as the one used to provide Access Traffic Steering, Switching, and Splitting (ATSSS) must be optimized to reduce latency [TS23501]. There are a lot of missing steps of reasoning here if we want to claim that this is a technical fact vs. marketing material. Section 1.2 The Convert Protocol provides 0-RTT (Zero Round-Trip Time) conversion service since no extra delay is induced by the protocol compared to connections that are not proxied. Particularly, the Convert Protocol does not require extra signaling setup delays before making use of the conversion service. The Convert Protocol does not require any In tightly controlled network environments where MAC can be assumed to provide sufficient authentication, authorization, and access-control functionality to meet the security needs of the proxy protocol; this cannot hold when additional mutual authentication schemes are required, as envisioned in Section 9.2 The Transport Converter adheres to the main principles drawn in [RFC1919]. In particular, a Transport Converter achieves the Er, which principles are those? RFC 1919 is a 35-page document entitiled "Classical versus Transparent IP proxies" that facially seems to be a comparison and not a declaration of guiding principles. The main advantage of network-assisted conversion services is that they enable new TCP extensions to be used on a subset of the path between endpoints, which encourages the deployment of these If those are the extensions that the conversion-service provider is interested in. Are other extensions blocked due to inactivity on the part of the provider? Section 2 destination. In today's Internet, latency is a important metric and various protocols have ben tuned to reduce their latency nit: s/ben/been/ "Please don't tune me!" Section 4.1 A connection can be initiated from both sides of the Transport Converter (Internet-facing interface, customer-facing interface). How does the internet-facing-initiated case work? Does the client have to register? Transport Converters can be operated by network operators or third parties. Nevertheless, this document focuses on the single I'm not convinced that the present document actually describes how to use a third-party-run transport converter in a secure fashion. A Client is configured, through means that are outside the scope of this document, with the names and/or the addresses of one or more Transport Converters and the TCP extensions that they support. The Using names rather than addresses adds a "secure DNS" requirement to the existing assumptions of local-network security. connections. This encourages the deployment of new TCP extensions until they are widely supported by servers, in particular. This document has not yet shown me much to indicate that transparent converter implementors are more incentivized to implement new TCP extensions than third-party server operators are. Similar to SOCKS, the architecture does not interfere with end-to-end TLS connections [RFC8446] between the Client and the Server (Figure 3). In other words, end-to-end TLS is supported in the Why is TLS specifically noteworthy? Does this not apply to all higher-level protocols? It is out of scope of this document to elaborate on specific considerations related to the use of TLS in the Client-Converter connection leg to exchange Convert messages (in addition to the end- to-end TLS connection). Because that can't be done in 0-RTT in the general case? Section 4.2 Server, without experiencing an extra delay. The Transport Converter waits until the receipt of the confirmation that the Server agrees to establish the connection before confirming it to the Client. nit: I suggest clarifying the antecedent of "it". that SYN. The Transport Converter receives this SYN because it is, for example, on the path between the remote host and the Client or it provides address sharing service for the Client. If the check fails, Is there a reference for "address sharing service"? As discussed in [RFC7413], such change to TCP semantic raises two issues. First, duplicate SYNs can cause problems for some applications that rely on TCP. Second, TCP suffers from SYN flooding Is it really best to say "some applications" when the onus to prove replay-safety on a per-protocol basis leads to a need to assume as a baseline that all protocols are not compatible with TFO until proven otherwise? terminate the downstream connection by using FIN packets. If the downstream connection terminates with the exchange of FIN packets, Why do we have "RST segment" in the previous paragraph but "FIN packet" here? Section 4.3 * Lifetime is the validity lifetime of the entry as assigned by the Converter. Conceptually a lifetime is a "time to survive relative to a given reference time". If the reference time is "now", this lifetime would need to be continuously updated; if not, don't we need to also store the reference time? (Alternately, just store the expiration time and not the lifetime.) Section 5.1 Do we want to say anything about (end-to-end?) MPTCP operation with the Transport Converter in the middle? Does it need to do anything other than just pass packets (and maybe swap out addresses)? Section 5.2 address, external port number). The external IP address and external port number will be then advertised using an out-of-band mechanism so that remote hosts can initiate TCP connections to the Client via the Converter. Note that the external and internal information may be Advertised by the Transport Converter or the Client? (We leave it implicit that the allocated external address/port will be communicated back to the client by PCP.) is found, the Converter silently ignores the message. If an entry is found, the Converter inserts an MP_CAPABLE option and Connect TLV in the SYN packet, rewrites the source IP address to one of its IP addresses and, eventually, the destination IP address and port number in accordance with the information stored in the mapping. SYN+ACK Why "eventually"? It is out of scope of this document to define specific Convert TLVs to manage incoming connections. These TLVs can be defined in a separate document. It seems a little bit of a bait-and-switch to do so, given that the discussion of the example in Figure 6 explicitly says "the Tranport Convert [sic] inserts a TLV message that indicates the source address and port number of the remote host". Section 6 Convert messages may appear only in a SYN, SYN+ACK, or in an ACK that is sent shortly after the SYN+ACK. Can we be more precise about "shortly after the SYN+ACK" (e.g., "acknowledging the SYN")? Section 6.1 Was any consideration given to including a "magic string" in the fixed header, to provide additional protection against misconfiguration about whether Convert is to be used on a given connection? The Unassigned field MUST be set to zero in this version of the protocol. These bits are available for future use. But only in a future version, the way this is defined. (That is, ruling out using those bits as extension points within version 1.) Section 6.2.2 capabilities. Assuming the Client is authorized to invoke the Transport Converter, the latter replies with the Supported TCP Extensions TLV (Section 6.2.4). Just to confirm: based on this design, the Transport Converter currently has nothing other than the Client IP address to use as input to this authorization decision? Section 6.2.5 We distinguish two types of Connect TLV based on their length: (1) the Base Connect TLV has a length of 20 bytes and contains a remote Which is to say, a Length field containing the value 5. I'm confused about the default options semantics. First we say that the default options are those advertised in the Supported TCP Extensions TLV, which would seem to imply that the converter doesn't support any extensions that are not listed there. But then we go on to say that for an Extended Connect TLV, the options contained in the TLV are *additional* options that are *added* to the default set of options ... but only if the converter supports those options. But if it supports an option, wouldn't it already be in the default list, since the default list is the list of supported options? The way it's currently worded, the extended connect TLV seems only useful for specifying precise values for options that take a value, but not for adding entirely new options. Section 6.2.6 by the Server in the SYN+ACK packet. A Transport Converter MUST return this TLV if the Client sent an Extended Connect TLV and the connection was accepted by the server. Is the converter allowed to return this option if a basic connect was used? Should the converter always attempt to return this option? Section 6.2.7 the Client. This Cookie can be configured on the Client by means that are outside of this document or provided by the Transport Converter as follows. [But not as immediately follows; there's other content in between.] Section 6.2.8 An Error TLV can be included in the SYN+ACK or an ACK sent shortly after the SYN+ACK. [same comment about "shortly after"] encoded in 8 bits. The list of supported versions should be padded with zeros to end on a 32 bits boundary. "should be"? It's a protocol violation to not do something to make it end on a 32-bit boundary, and putting anything other than zero is liable to cause the peer to make bad assumptions, so this seems pretty mandatory to me. Upon receipt of this error code, the remote peer (e.g., Client) checks whether it supports one of the versions returned by the peer. The highest common supported version MUST be used by the remote peer in subsequent exchanges with the peer. There doesn't seem to be any protection against version downgrade (e.g., by MITM) in this exchange. To ease troubleshooting, the value field MUST echo the received message shifted by one byte to keep to original alignment of the message. I'm not sure what's meant by this "shifted" language is going to be clear to all readers. (Occurs multiple times.) o Not Authorized (32): This error code indicates that the Transport Converter refused to create a connection because of a lack of authorization (e.g., administratively prohibited, authorization failure, invalid Cookie TLV, etc.). The Value field MUST be set invalid or missing, IIUC. o Unsupported TCP Option (33): A TCP option that the Client requested to advertise to the final Server cannot be safely used. Why the mismatch between "unsupported" and "cannot be safely used"? Section 7.6 types of Connect TLV. If such a Transport Converter receives a Connect TLV with the TCP Fast Open cookie option that does not contain a cookie, it MUST add an empty TCP Fast Open cookie option in the SYN sent to the remote server. If such a Transport Converter receives a Connect TLV with the TCP Fast Open cookie option that contains a cookie, it MUST copy the TCP Fast Open cookie option in the SYN sent to the remote server. Just to check: we don't need to specify any additional behavior for the response (e.g., to give the client the cookie from the server), since that falls out naturally from the requirement to send the Extended TCP Header TLV? Section 7.7 A Transport Converter MUST NOT advertise the TCP-AO option (Kind=29) in the Supported TCP Extensions TLV. If a Transport Converter receives a Connect TLV that contains the TCP-AO option, it MUST reject the establishment of the connection with error code set to "Unsupported TCP Option", except if the TCP-AO-NAT option is used. Perhaps a reminder that, since TCP-AO-NAT is Experimental, such usage is not currently defined and must be specified by some other document before it can be used, would be in order? Section 9 An implementation needs to check that the TLVs are properly framed within the boundary indicated by the Total Length in the fixed header. Section 9.1 processes. As such, it MUST be protected as a core IP router (e.g., [RFC1812]). nit: I don't think the grammar is quite right here; maybe "as protected as" or "protected as if it was". This document assumes that all network attachments are managed by the same administrative entity. Therefore, enforcing anti-spoofing filters at these network ensures that hosts are not sending traffic with spoofed source IP addresses. Until some network infrastructure equipment gets compromised. (That is to say "ensures" may be stronger language than is merited.) Section 9.2 The Convert Protocol is intended to be used in managed networks where end hosts can be identified by their IP address. End hosts can always be identified by their IP address in any network ... subject to spoofing. Perhaps you mean to say "securely identified"? Section 9.4 I'm confused why we're talking about an illegitimate converter being possible given that we assume the network is secure. Section 9.5 The operator that manages the various network attachments (including the Transport Converters) can enforce authentication and authorization policies using appropriate mechanisms. For example, a I suggest "has various options for enforcing authentication and authorization policies"; the current language could be misread as saying that such enforcement is optional. o The network provider may enforce a policy based upon Access Control Lists (ACLs), e.g., at a Broadband Network Gateway (BNG) to control the hosts that are authorized to communicate with a Transport Converter. These ACLs may be installed as a result of RADIUS exchanges, e.g., [I-D.boucadair-radext-tcpm-converter]. This method does not require any interaction with the Transport Converter for authorization matters. o A device that embeds a Transport Converter may also host a RADIUS client that will solicit an AAA server to check whether connections received from a given source IP address are authorized or not [I-D.boucadair-radext-tcpm-converter]. These both seem to require that the network has strong anti-spoofing protections in place. Section 11.1 It's not entirely clear that RFC 6978 needs to be normative, given that we explicitly do *not* include support for that protocol in this document (shunting non-standards-track tcp option support to other documents). Section 11.2 RFC 1919 might be normative if I had a better understanding of what we wanted from it (see above). I'm surprised that RFC 2782 isn't normative given that SRV discovery seems like the only defined way to discover the port number of the convert service. |
2020-03-05
|
17 | Benjamin Kaduk | [Ballot Position Update] New position, Discuss, has been recorded for Benjamin Kaduk |
2020-03-04
|
17 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2020-03-04
|
17 | Adam Roach | [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach |
2020-03-04
|
17 | Roman Danyliw | [Ballot discuss] ** Deployed without constraints, there would be a number of concerning attacks given this protocol’s design. Christian Huitema’s SecDir review (thank you!) notes … [Ballot discuss] ** Deployed without constraints, there would be a number of concerning attacks given this protocol’s design. Christian Huitema’s SecDir review (thank you!) notes some of them. Helpfully, this draft presents various restrictive scoping to mitigate these attacks under certain circumstances: (a) Section 4.1. Transport Converters can be operated by network operators or third parties. Nevertheless, this document focuses on the single administrative deployment case where the entity offering the connectivity service to a client is also the entity which owns and operates the Transport Converter. (b) Section 9.1. Furthermore, ingress filtering policies MUST be enforced at the network boundaries [RFC2827]. (c) Section 9.2. The Convert Protocol is intended to be used in managed networks where end hosts can be identified by their IP address. (d) Section 9.2. Stronger mutual authentication schemes MUST be defined to use the Convert Protocol in more open network environments. Unfortunately, the protocol mechanism to operate outside of these bounds is in scope because (a) and (c) include no normative language. For example, this document doesn’t address converters operated by third parties but it explicitly allows for their possibility with no discussion of the impact. As this is an experimental document where implementation experience likely is needed for refinement, could a compromise be found with an applicability statement that shrinks the threat model and provide better normative guidance. For example (paraphrasing): Applicability statement: Transport Converters MUST only be deployed in a single administrative domain deployment model. The entity offering the connectivity service to a client MUST also be entity which owns and operates the Transport Converter, with no transit over a third-party network. For the Security Considerations: The Convert Protocol is RECOMMENDED to be used in a managed network where end hosts can be identified by their IP address. If such control is not exerted and there is a more open network environment, a strong mutual authentication scheme MUST be defined to use the Convert Protocol. ** Section 9.1. Per “Given its function and its location in the network, a Transport Converter has access to the payload of all the packets that it processes.”, it’s a per more than that. It is in a position to observe all packets, so that’s payload, meta-data and the ability to profile and conduct traffic analysis. Perhaps something on the order of “Given its function and location in the network, a Transport Convert is in a position to observe all packets, to include payloads and meta-data; and has the ability to profile and conduct traffic analysis of user behavior”. ** Section 9.1. Per “As such, it MUST be protected as a core IP router (e.g., [RFC1812])”, no disagreement on the need to protect this router. However, what exact practices are being suggested? Given the RFC1812, reference, what specific sections apply? |
2020-03-04
|
17 | Roman Danyliw | [Ballot comment] ** Section 1.2. Given that Section 4.1. outlines that the architecture consists of clients, converter and servers, the language in the list following … [Ballot comment] ** Section 1.2. Given that Section 4.1. outlines that the architecture consists of clients, converter and servers, the language in the list following “In particular, a Transport Converter achieves the following :” might benefit from consistency (i.e., final target server vs. server; and server vs. converter) ** Section 6.2.5. Per “Upon reception of an Extended Connect TLV, a Transport Converter first checks whether it supports the TCP Options listed in the 'TCP Options' field. If not, it returns an error message (Section 6.2.8).”, what error does it return? ** Section 9.1 Per “The Transport Converter is designed to not leak such sensitive information outside a local domain.”, can you clarify what that means. ** Editorially, the guidance in Section 9.2 and 9.5 needs to link Section 9.2 provide an authentication/authorization solution given a certain topology, and does Section 9.5. ** Editorial Nit -- Section 2. Typo. s/a important/an important/ -- Section 4.4.1. Typo. s/the the/the/ |
2020-03-04
|
17 | Roman Danyliw | [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw |
2020-03-04
|
17 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2020-03-03
|
17 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2020-03-02
|
17 | Christian Huitema | Request for Last Call review by SECDIR Completed: Not Ready. Reviewer: Christian Huitema. Sent review to list. |
2020-03-02
|
17 | Éric Vyncke | [Ballot discuss] Thank you for the work put into this document. It is indeed useful to be able to deploy easily new TCP features. Nevertheless, … [Ballot discuss] Thank you for the work put into this document. It is indeed useful to be able to deploy easily new TCP features. Nevertheless, please find below two DISCUSSes and some non-blocking COMMENTs (and I would appreciate a response from the authors) and NITS. I hope that this helps to improve the document, Regards, -éric == DISCUSS == -- Section 1.2 -- A trivial one: while the title and the abstract of this document appear as quite generic, the document focus is reduced later in section 1.2 to MPTCP: "this document specifies how the Convert Protocol applies for Multipath TCP. It is out of scope of this document to provide a comprehensive list of all potential conversion services. " While I do not mind having a focus on MPTCP only, I would strongly suggest to reflect this focus in the title and in the abstract (the current filename is correct). -- Section 6.2.8 -- I appreciate that this is an experimental document, but, having only 2 occurrences of ICMP in the whole document and no real "how to process" TLV "Destination Unreachable"... and the payload of this TLV having only the code without the offending packet will probably make Path MTU discovery (and other mechanisms) impossible. While I am not a transport expert, I believe that this aspect needs to be described in this document. |
2020-03-02
|
17 | Éric Vyncke | [Ballot comment] Here are some COMMENTs -- Section 1.2 -- Is the benefit of a transport proxy only for the clients as written in the … [Ballot comment] Here are some COMMENTs -- Section 1.2 -- Is the benefit of a transport proxy only for the clients as written in the 1st paragraph? It was probably the case for the original MPTCP proxy but what about other TCP extensions? -- Section 4.1 -- While the difference "(Internet-facing interface, customer-facing interface)" will probably represent the vast majority of use cases, I wonder whether there will always be a single Internet-facing ? Could probably be 0 or 2 in some use cases... Suggest to remove this part of the text. -- Section 6.1 -- Please state the usual wording about "unassigned" field: it must be ignored by the receiver. Adding some explanations on why version 0 is reserved but cannot be used would be welcome. -- Section 6.2.5 -- Can the "remote peer IP address" be a link-local address ? == NITS == -- Section 1.1 (and possibly others) -- Please use a consistent means of introducing acronyms, cfr URLLC and ATSSS ;-) -- Section 4.2 --- The use of "regular TCP packets" makes me wonder whether the authors think that MPTCP uses "irregular TCP packets"... The use of 'regular' seems a little weird here but I am not a native English speaker. -- Section 4.3 -- The caption below figure 7 ends with "(TCP)" that is not the acronym of "Transport Session Entry". Is it expected ? |
2020-03-02
|
17 | Éric Vyncke | [Ballot Position Update] New position, Discuss, has been recorded for Éric Vyncke |
2020-03-02
|
17 | Mirja Kühlewind | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2020-02-28
|
17 | (System) | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2020-02-28
|
17 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-tcpm-converters-16. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-tcpm-converters-16. If any part of this review is inaccurate, please let us know. The IANA Functions Operator has a question about one of the actions requested in the IANA Considerations section of this document. The IANA Functions Operator understands that, upon approval of this document, there are five actions which we must complete. First, in the Service Name and Transport Protocol Port Number Registry located at: https://www.iana.org/assignments/service-names-port-numbers/ a single, new service name is to be registered based on the following template: Service Name: convert Port Number: N/A Transport Protocol(s): TCP Description: 0-RTT TCP Convert Protocol Assignee: IESG Contact: IETF Chair Reference: [ RFC-to-be ] Second, a new registry page is to be created on the IANA Matrix called the TCP Convert Protocol (Convert) Parameters registry page. The reference for the new registry page will be [ RFC-to-be ]. Third, a new registry is to be created called the Convert Versions registry. The new registry will be located on the registry page created by the second IANA action above. The registry will be managed via IETF Review as defined by RFC 8126. There are initial registrations in the new registry as follows: +---------+----------------------------------+-------------+ | Version | Description | Reference | +---------+----------------------------------+-------------+ | 0 | Reserved by this document |[ RFC-to-be ]| | 1 | Assigned by this document |[ RFC-to-be ]| +---------+----------------------------------+-------------+ IANA QUESTION --> Would it perhaps be better if the Descriptions for the two version codes would be "Reserved" and "Assigned by [ RFC-to-be ]" ?? Fourth, a new registry is to be created called the Convert TLVs registry. The new registry will be located on the registry page created by the second IANA action above. The new registry will have the following assignment procedure (based on RFC8126): The values in the range 1-127 can be assigned via IETF Review. The values in the range 128-191 can be assigned via Specification Required. The values in the range 192-255 are reserved for Private Use. There are initial registrations in the new registry as follows: +---------+---------------------------------+-------------+ | Code | Name | Reference | +---------+---------------------------------+-------------+ | 0 | Reserved |[ RFC-to-be ]| | 1 | Info TLV |[ RFC-to-be ]| | 2-9 | Unassigned | | | 10 | Connect TLV |[ RFC-to-be ]| | 11-19 | Unassigned | | | 20 | Extended TCP Header TLV |[ RFC-to-be ]| | 21 | Supported TCP Extension TLV |[ RFC-to-be ]| | 22 | Cookie TLV |[ RFC-to-be ]| | 23-29 | Unassigned | | | 30 | Error TLV |[ RFC-to-be ]| | 31-191 | Unassigned | | | 192-255 | Reserved for Private Use |[ RFC-to-be ]| +---------+---------------------------------+-------------+ Fifth, a new registry is to be created called the Convert Errors registry. The new registry will be located on the registry page created by the second IANA action above. A note will be placed on the registry indicating the four types of convert errors as follows: Note: Four types of conver errors are defined; the following ranges are reserved for each of these types: o Message validation and processing errors: 0-31 o Client-side errors: 32-63 o Transport Converter-side errors: 64-95 o Errors caused by destination server: 96-127 The new registry will have the following assignment procedure (based on RFC8126): 0-127: Values in this range are assigned via IETF Review. 128-191: Values in this range are assigned via Specification Required. 192-255: Values in this range are reserved for Private Use. There are initial registrations in the new registry as follows: +-------+------+-----------------------------+-------------+ | Error | Hex | Description | Reference | +-------+------+-----------------------------+-------------+ | 0 | 0x00 | Unsupported Version |[ RFC-to-be ]| | 1 | 0x01 | Malformed Message |[ RFC-to-be ]| | 2 | 0x02 | Unsupported Message |[ RFC-to-be ]| | 3 | 0x03 | Missing Cookie |[ RFC-to-be ]| | 4-31 | | Unassigned | | | 32 | 0x20 | Not Authorized |[ RFC-to-be ]| | 33 | 0x21 | Unsupported TCP Option |[ RFC-to-be ]| | 34-63 | | Unassigned | | | 64 | 0x40 | Resource Exceeded |[ RFC-to-be ]| | 65 | 0x41 | Network Failure |[ RFC-to-be ]| | 66-95 | | Unassigned | | | 96 | 0x60 | Connection Reset |[ RFC-to-be ]| | 97 | 0x61 | Destination Unreachable |[ RFC-to-be ]| | 98-255| | Unassigned | | +-------+------+-----------------------------+-------------+ The IANA Functions Operator understands that these are the only actions required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2020-02-28
|
17 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2020-02-28
|
17 | Mohamed Boucadair | New version available: draft-ietf-tcpm-converters-17.txt |
2020-02-28
|
17 | (System) | New version approved |
2020-02-28
|
17 | (System) | Request for posting confirmation emailed to previous authors: Sri Gundavelli , Olivier Bonaventure , tcpm-chairs@ietf.org, Benjamin Hesmans , Mohamed Boucadair , SungHoon Seo |
2020-02-28
|
17 | Mohamed Boucadair | Uploaded new revision |
2020-02-28
|
16 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2020-02-27
|
16 | Cindy Morgan | Telechat date has been changed to 2020-03-05 from 2020-03-12 |
2020-02-27
|
16 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2020-02-27
|
16 | Cindy Morgan | Placed on agenda for telechat - 2020-03-12 |
2020-02-27
|
16 | Mirja Kühlewind | Ballot has been issued |
2020-02-27
|
16 | Mirja Kühlewind | [Ballot Position Update] New position, Yes, has been recorded for Mirja Kühlewind |
2020-02-27
|
16 | Mirja Kühlewind | Created "Approve" ballot |
2020-02-27
|
16 | Mirja Kühlewind | Ballot writeup was changed |
2020-02-26
|
16 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Leif Johansson |
2020-02-26
|
16 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Leif Johansson |
2020-02-26
|
16 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Christian Huitema |
2020-02-26
|
16 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Christian Huitema |
2020-02-25
|
16 | Roman Danyliw | Assignment of request for Last Call review by SECDIR to Roman Danyliw was rejected |
2020-02-20
|
16 | Jean Mahoney | Request for Last Call review by GENART is assigned to Suhas Nandakumar |
2020-02-20
|
16 | Jean Mahoney | Request for Last Call review by GENART is assigned to Suhas Nandakumar |
2020-02-20
|
16 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Roman Danyliw |
2020-02-20
|
16 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Roman Danyliw |
2020-02-18
|
16 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Sheng Jiang |
2020-02-18
|
16 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Sheng Jiang |
2020-02-14
|
16 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2020-02-14
|
16 | Amy Vezza | The following Last Call announcement was sent out (ends 2020-02-28): From: The IESG To: IETF-Announce CC: tcpm@ietf.org, Michael Scharf , michael.scharf@hs-esslingen.de, ietf@kuehlewind.net, … The following Last Call announcement was sent out (ends 2020-02-28): From: The IESG To: IETF-Announce CC: tcpm@ietf.org, Michael Scharf , michael.scharf@hs-esslingen.de, ietf@kuehlewind.net, draft-ietf-tcpm-converters@ietf.org, tcpm-chairs@ietf.org Reply-To: last-call@ietf.org Sender: Subject: Last Call: (0-RTT TCP Convert Protocol) to Experimental RFC The IESG has received a request from the TCP Maintenance and Minor Extensions WG (tcpm) to consider the following document: - '0-RTT TCP Convert Protocol' as Experimental RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2020-02-28. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. A Transport Converter may provide conversion service for one or more TCP extensions. The conversion service is provided by means of the TCP Convert Protocol (Convert). This protocol provides 0-RTT (Zero Round-Trip Time) conversion service since no extra delay is induced by the protocol compared to connections that are not proxied. Also, the Convert Protocol does not require any encapsulation (no tunnels, whatsoever). This specification assumes an explicit model, where the Transport Converter is explicitly configured on hosts. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-tcpm-converters/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-tcpm-converters/ballot/ The following IPR Declarations may be related to this I-D: https://datatracker.ietf.org/ipr/3616/ |
2020-02-14
|
16 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2020-02-14
|
16 | Mirja Kühlewind | Last call was requested |
2020-02-14
|
16 | Mirja Kühlewind | Ballot approval text was generated |
2020-02-14
|
16 | Mirja Kühlewind | Ballot writeup was generated |
2020-02-14
|
16 | Mirja Kühlewind | IESG state changed to Last Call Requested from AD Evaluation |
2020-02-14
|
16 | Mirja Kühlewind | Last call announcement was generated |
2020-02-13
|
16 | Mohamed Boucadair | New version available: draft-ietf-tcpm-converters-16.txt |
2020-02-13
|
16 | (System) | New version approved |
2020-02-13
|
16 | (System) | Request for posting confirmation emailed to previous authors: Mohamed Boucadair , Sri Gundavelli , Olivier Bonaventure , SungHoon Seo , Benjamin Hesmans , tcpm-chairs@ietf.org |
2020-02-13
|
16 | Mohamed Boucadair | Uploaded new revision |
2020-02-11
|
15 | Olivier Bonaventure | New version available: draft-ietf-tcpm-converters-15.txt |
2020-02-11
|
15 | (System) | New version approved |
2020-02-11
|
15 | (System) | Request for posting confirmation emailed to previous authors: Mohamed Boucadair , Sri Gundavelli , Olivier Bonaventure , SungHoon Seo , Benjamin Hesmans , tcpm-chairs@ietf.org |
2020-02-11
|
15 | Olivier Bonaventure | Uploaded new revision |
2020-02-04
|
14 | Mirja Kühlewind | IESG state changed to AD Evaluation from Publication Requested |
2020-02-04
|
14 | Mirja Kühlewind | Last call announcement was generated |
2019-11-18
|
14 | Michael Scharf | 1. Summary The document shepherd is Michael Scharf. The responsible Area Director is Mirja Kuehlewind. This document specifies an application proxy, called Transport Converter, to … 1. Summary The document shepherd is Michael Scharf. The responsible Area Director is Mirja Kuehlewind. This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. This proxy is designed to avoid inducing extra delay when involved in a network-assisted connection (that is, 0-RTT). This specification assumes an explicit model, where the proxy is explicitly configured on hosts. The proxy can be installed in managed networks by a network operator, for instance to help the deployment of Multipath TCP. While Multipath TCP is an important use case, the Convert Protocol can actually be used for several TCP extensions. As the protocol is highly related to TCP standards and not specific to Multipath TCP, it was decided to home this document in the TCPM working group. The TCPM working group requests publication as Experimental document because the protocol targets controlled environments in which all network attachments are managed by the same administrative entity. 2. Review and Consensus TCPM usually deals with end-to-end TCP extensions, not with proxies. A number of active TCPM contributors also participate in the MPTCP working group, and they have been the drivers of most of the TCPM discussions. The document has been presented and discussed repeatedly in TCPM and as a result the protocol has changed several times. One frequently discussed design choice is whether and how to use TCP Fast Open (TFO). Appendix C explains the rationale for the final solution. There have also been some discussions whether such a proxy is really useful and needed. Some few contributors to the working group were not convinced by the MPTCP use case. During WGLC, Philip Eardley (chair of the MPTCP WG) has performed a comprehensive review, which was subsequently addressed in a number of document updates. The shepherd has reviewed the document before WGLC and verified that all WGLC comments are addressed. In addition to that, several contributors from vendors and network operators have explicitly expressed their support before and during WGLC. It has also been mentioned that the protocol is of interest to 3GPP. In TCPM, there is very strong but not unanimous support for publication as experimental document. There is at least one known implementation: Tessares has an open-sourced a library (https://github.com/Tessares/libconvert) and a closed-source Hybrid Access Gateway (HAG) that uses this library directly to act as an MPTCP Converter. Korea Telekom (KT) has reported to TCPM the results of a PoC using these implementations (see https://tessares.pr.co/181810-kt-tessares-successfully-test-5g-low-latency-multi-radio-access-technology-in-a-commercial-5g-network). Other vendors have also expressed interest, but there is no publicly known second implementation. 3. Intellectual Property Each author has confirmed conformance with BCP 78/79. There is an IPR disclosure related to the document: https://datatracker.ietf.org/ipr/3616/ The TCPM working group is aware of the IPR disclosure and the chairs have explicitly informed the working group about the IPR. Also, there has been an earlier disclosure (https://datatracker.ietf.org/ipr/2726/drafts) on a predecessor document, which was originally discussed in the MPTCP WG. There have been no comments or concerns in TCPM regarding the IPR. The document describes an experimental protocol that is currently mostly of interest to MPTCP deployments in controlled environments. It is possible that the TCPM working group would be more concerned about IPR for a standards-track RFC. 4. Other Points The document requests a TCP port number and creates IANA registries for protocol parameters. There has been some discussion on the allocation policy for the registry ("IETF review" required), but no controversy. The TCPM working group only seldom deals with new IANA registries and there may not be much expertise regarding details. |
2019-11-18
|
14 | Michael Scharf | Responsible AD changed to Mirja Kühlewind |
2019-11-18
|
14 | Michael Scharf | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2019-11-18
|
14 | Michael Scharf | IESG state changed to Publication Requested from I-D Exists |
2019-11-18
|
14 | Michael Scharf | IESG process started in state Publication Requested |
2019-11-18
|
14 | Michael Scharf | Changed consensus to Yes from Unknown |
2019-11-18
|
14 | Michael Scharf | 1. Summary The document shepherd is Michael Scharf. The responsible Area Director is Mirja Kuehlewind. This document specifies an application proxy, called Transport Converter, to … 1. Summary The document shepherd is Michael Scharf. The responsible Area Director is Mirja Kuehlewind. This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. This proxy is designed to avoid inducing extra delay when involved in a network-assisted connection (that is, 0-RTT). This specification assumes an explicit model, where the proxy is explicitly configured on hosts. The proxy can be installed in managed networks by a network operator, for instance to help the deployment of Multipath TCP. While Multipath TCP is an important use case, the Convert Protocol can actually be used for several TCP extensions. As the protocol is highly related to TCP standards and not specific to Multipath TCP, it was decided to home this document in the TCPM working group. The TCPM working group requests publication as Experimental document because the protocol targets controlled environments in which all network attachments are managed by the same administrative entity. 2. Review and Consensus TCPM usually deals with end-to-end TCP extensions, not with proxies. A number of active TCPM contributors also participate in the MPTCP working group, and they have been the drivers of most of the TCPM discussions. The document has been presented and discussed repeatedly in TCPM and as a result the protocol has changed several times. One frequently discussed design choice is whether and how to use TCP Fast Open (TFO). Appendix C explains the rationale for the final solution. There have also been some discussions whether such a proxy is really useful and needed. Some few contributors to the working group were not convinced by the MPTCP use case. During WGLC, Philip Eardley (chair of the MPTCP WG) has performed a comprehensive review, which was subsequently addressed in a number of document updates. The shepherd has reviewed the document before WGLC and verified that all WGLC comments are addressed. In addition to that, several contributors from vendors and network operators have explicitly expressed their support before and during WGLC. It has also been mentioned that the protocol is of interest to 3GPP. In TCPM, there is very strong but not unanimous support for publication as experimental document. There is at least one known implementation: Tessares has an open-sourced a library (https://github.com/Tessares/libconvert) and a closed-source Hybrid Access Gateway (HAG) that uses this library directly to act as an MPTCP Converter. Korea Telekom (KT) has reported to TCPM the results of a PoC using these implementations (see https://tessares.pr.co/181810-kt-tessares-successfully-test-5g-low-latency-multi-radio-access-technology-in-a-commercial-5g-network). Other vendors have also expressed interest, but there is no publicly known second implementation. 3. Intellectual Property Each author has confirmed conformance with BCP 78/79. There is an IPR disclosure related to the document: https://datatracker.ietf.org/ipr/3616/ The TCPM working group is aware of the IPR disclosure and the chairs have explicitly informed the working group about the IPR. Also, there has been an earlier disclosure (https://datatracker.ietf.org/ipr/2726/drafts) on a predecessor document, which was originally discussed in the MPTCP WG. There have been no comments or concerns in TCPM regarding the IPR. The document describes an experimental protocol that is currently mostly of interest to MPTCP deployments in controlled environments. It is possible that the TCPM working group would be more concerned about IPR for a standards-track RFC. 4. Other Points The document requests a TCP port number and creates IANA registries for protocol parameters. There has been some discussion on the allocation policy for the registry ("IETF review" required), but no controversy. The TCPM working group only seldom deals with new IANA registries and there may not be much expertise regarding details. |
2019-11-18
|
14 | Michael Scharf | 1. Summary The document shepherd is Michael Scharf. The responsible Area Director is Mirja Kuehlewind. This document specifies an application proxy, called Transport Converter, to … 1. Summary The document shepherd is Michael Scharf. The responsible Area Director is Mirja Kuehlewind. This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. This proxy is designed to avoid inducing extra delay when involved in a network-assisted connection (that is, 0-RTT). This specification assumes an explicit model, where the proxy is explicitly configured on hosts. The proxy can be installed in managed networks by a network operator, for instance to help the deployment of Multipath TCP. While Multipath TCP is an important use case, the Convert Protocol can actually be used for several TCP extensions. As the protocol is highly related to TCP standards and not specific to Multipath TCP, it was decided to home this document in the TCPM working group. The TCPM working group requests publication as Experimental document because the protocol targets controlled environments in which all network attachments are managed by the same administrative entity. 2. Review and Consensus TCPM usually deals with end-to-end TCP extensions, not with proxies. A number of active TCPM contributors also participate in the MPTCP working group, and they have been the drivers of most of the TCPM discussions. The document has been presented and discussed repeatedly in TCPM and as a result the protocol has changed several times. One frequently discussed design choice is whether and how to use TCP Fast Open (TFO). Appendix C explains the rationale for the final solution. There have also been some discussions whether such a proxy is really useful and needed. Some few contributors to the working group were not convinced by the MPTCP use case. During WGLC, Philip Eardley (chair of the MPTCP WG) has performed a comprehensive review, which was subsequently addressed in a number of document updates. The shepherd has reviewed the document before WGLC and verified that all WGLC comments are addressed. In addition to that, several contributors from vendors and network operators have explicitly expressed their support before and during WGLC. It has also been mentioned that the protocol is of interest to 3GPP. In TCPM, there is very strong but not unanimous support for publication as experimental document. There is at least one known implementation: Tessares has an open-sourced a library (https://github.com/Tessares/libconvert) and a closed-source Hybrid Access Gateway (HAG) that uses this library directly to act as an MPTCP Converter. Korea Telekom (KT) has reported to TCPM the results of a PoC using these implementations (see https://tessares.pr.co/181810-kt-tessares-successfully-test-5g-low-latency-multi-radio-access-technology-in-a-commercial-5g-network). Other vendors have also expressed interest, but there is no publicly known second implementation. 3. Intellectual Property Each author has confirmed conformance with BCP 78/79. There is an IPR disclosure related to the document: https://datatracker.ietf.org/ipr/3616/ The TCPM working group is aware of the IPR disclosure and the chairs have explicitly informed the working group about the IPR. Also, there has been an earlier disclosure (https://datatracker.ietf.org/ipr/2726/drafts) on a predecessor document, which was originally discussed in the MPTCP WG. There have been no comments or concerns in TCPM regarding the IPR. The document describes an experimental protocol that is currently mostly of interest to MPTCP deployments in controlled environments. It is possible that the TCPM working group would be more concerned about IPR for a standards-track RFC. 4. Other Points The document requests a TCP port number and creates IANA registries for protocol parameters. There has been some discussion on the allocation policy for the registry ("IETF review" required), but no controversy. The TCPM working group only seldom deals with new IANA registries and there may not be much expertise regarding details. |
2019-11-17
|
14 | Michael Scharf | 1. Summary The document shepherd is Michael Scharf. The responsible Area Director is Mirja Kuehlewind. This document specifies an application proxy, called Transport Converter, to … 1. Summary The document shepherd is Michael Scharf. The responsible Area Director is Mirja Kuehlewind. This document specifies an application proxy, called Transport Converter, to assist the deployment of TCP extensions such as Multipath TCP. This proxy is designed to avoid inducing extra delay when involved in a network-assisted connection (that is, 0-RTT). This specification assumes an explicit model, where the proxy is explicitly configured on hosts. The proxy can be installed in managed networks by a network operator, for instance to help the deployment of Multipath TCP. While Multipath TCP is an important use case, the Convert Protocol can actually be used for several TCP extensions. As the protocol is highly related to TCP standards and not specific to Multipath TCP, it was decided to home this document in the TCPM working group. The TCPM working group requests publication as Experimental document because the protocol targets controlled environments in which all network attachments are managed by the same administrative entity. 2. Review and Consensus TCPM usually deals with end-to-end TCP extensions, not with proxies. A number of active TCPM contributors also participate in the MPTCP working group, and they have been the drivers of most of the TCPM discussions. The document has been presented and discussed repeatedly in TCPM and as a result the protocol has changed several times. One frequently discussed design choice is whether and how to use TCP Fast Open (TFO). Appendix C explains the rationale for the final solution. During WGLC, Philip Eardley (chair of the MPTCP WG) has performed a comprehensive review, which was subsequently addressed in a number of document updates. The shepherd has reviewed the document before WGLC and verified that all WGLC comments are addressed. In addition to that, several contributors from vendors and network operators have explicitly expressed their support before and during WGLC. It has also been mentioned that the protocol is of interest to 3GPP. In TCPM, there is unanimous support for publication as experimental document. There is at least one known implementation: Tessares has an open-sourced a library (https://github.com/Tessares/libconvert) and a closed-source Hybrid Access Gateway (HAG) that uses this library directly to act as an MPTCP Converter. Korea Telekom (KT) has reported to TCPM the results of a PoC using these implementations (see https://tessares.pr.co/181810-kt-tessares-successfully-test-5g-low-latency-multi-radio-access-technology-in-a-commercial-5g-network). Other vendors have also expressed interest, but there is no publicly known second implementation. 3. Intellectual Property Each author has confirmed conformance with BCP 78/79. There is an IPR disclosure related to the document: https://datatracker.ietf.org/ipr/3616/ The TCPM working group is aware of the IPR disclosure and the chairs have explicitly informed the working group about the IPR. Also, there has also been an earlier disclosure (https://datatracker.ietf.org/ipr/2726/drafts) on a predecessor document, which was originally discussed in the MPTCP WG. There have been no comments or concerns in TCPM regarding the IPR. The document describes an experimental protocol that is currently mostly of interest to MPTCP deployments in controlled environments. It is possible that the TCPM working group would be more concerned about IPR for a standards-track RFC. 4. Other Points The document requests a TCP port number and creates IANA registries for protocol parameters. There has been some discussion on the allocation policy for the registry ("IETF review" required), but no controversy. The TCPM working group only seldomly deals with new IANA registries and there may not be much expertise regarding details. |
2019-11-03
|
14 | Mohamed Boucadair | New version available: draft-ietf-tcpm-converters-14.txt |
2019-11-03
|
14 | (System) | New version approved |
2019-11-03
|
14 | (System) | Request for posting confirmation emailed to previous authors: Mohamed Boucadair , Sri Gundavelli , Olivier Bonaventure , SungHoon Seo , Benjamin Hesmans , tcpm-chairs@ietf.org |
2019-11-03
|
14 | Mohamed Boucadair | Uploaded new revision |
2019-10-24
|
13 | Michael Scharf | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2019-10-22
|
13 | Mohamed Boucadair | New version available: draft-ietf-tcpm-converters-13.txt |
2019-10-22
|
13 | (System) | New version approved |
2019-10-22
|
13 | (System) | Request for posting confirmation emailed to previous authors: Mohamed Boucadair , Sri Gundavelli , Olivier Bonaventure , SungHoon Seo , Benjamin Hesmans , tcpm-chairs@ietf.org |
2019-10-22
|
13 | Mohamed Boucadair | Uploaded new revision |
2019-10-04
|
12 | Mohamed Boucadair | New version available: draft-ietf-tcpm-converters-12.txt |
2019-10-04
|
12 | (System) | New version approved |
2019-10-04
|
12 | (System) | Request for posting confirmation emailed to previous authors: Mohamed Boucadair , Sri Gundavelli , Olivier Bonaventure , SungHoon Seo , Benjamin Hesmans , tcpm-chairs@ietf.org |
2019-10-04
|
12 | Mohamed Boucadair | Uploaded new revision |
2019-09-27
|
11 | Mohamed Boucadair | New version available: draft-ietf-tcpm-converters-11.txt |
2019-09-27
|
11 | (System) | New version approved |
2019-09-27
|
11 | (System) | Request for posting confirmation emailed to previous authors: Mohamed Boucadair , Sri Gundavelli , Olivier Bonaventure , SungHoon Seo , Benjamin Hesmans , tcpm-chairs@ietf.org |
2019-09-27
|
11 | Mohamed Boucadair | Uploaded new revision |
2019-08-01
|
10 | Mohamed Boucadair | New version available: draft-ietf-tcpm-converters-10.txt |
2019-08-01
|
10 | (System) | New version approved |
2019-08-01
|
10 | (System) | Request for posting confirmation emailed to previous authors: Mohamed Boucadair , Sri Gundavelli , Olivier Bonaventure , SungHoon Seo , Benjamin Hesmans , tcpm-chairs@ietf.org |
2019-08-01
|
10 | Mohamed Boucadair | Uploaded new revision |
2019-07-21
|
09 | Mohamed Boucadair | New version available: draft-ietf-tcpm-converters-09.txt |
2019-07-21
|
09 | (System) | New version approved |
2019-07-21
|
09 | (System) | Request for posting confirmation emailed to previous authors: Mohamed Boucadair , Sri Gundavelli , Olivier Bonaventure , SungHoon Seo , Benjamin Hesmans , tcpm-chairs@ietf.org |
2019-07-21
|
09 | Mohamed Boucadair | Uploaded new revision |
2019-07-05
|
Jasmine Magallanes | Posted related IPR disclosure: Université catholique de Louvain's Statement about IPR related to draft-ietf-tcpm-converters, draft-boucadair-mptcp-plain-mode, and draft-boucadair-mptcp-plain-mode | |
2019-06-25
|
08 | Michael Scharf | IETF WG state changed to In WG Last Call from WG Document |
2019-06-20
|
08 | Michael Scharf | Intended Status changed to Experimental from None |
2019-06-20
|
08 | Michael Scharf | Notification list changed to Michael Scharf <michael.scharf@hs-esslingen.de> |
2019-06-20
|
08 | Michael Scharf | Document shepherd changed to Michael Scharf |
2019-06-19
|
08 | Olivier Bonaventure | New version available: draft-ietf-tcpm-converters-08.txt |
2019-06-19
|
08 | (System) | New version approved |
2019-06-19
|
08 | (System) | Request for posting confirmation emailed to previous authors: Olivier Bonaventure , SungHoon Seo , Sri Gundavelli , Mohamed Boucadair , Benjamin Hesmans |
2019-06-19
|
08 | Olivier Bonaventure | Uploaded new revision |
2019-06-11
|
07 | Olivier Bonaventure | New version available: draft-ietf-tcpm-converters-07.txt |
2019-06-11
|
07 | (System) | New version approved |
2019-06-11
|
07 | (System) | Request for posting confirmation emailed to previous authors: Olivier Bonaventure , SungHoon Seo , Sri Gundavelli , Mohamed Boucadair , Benjamin Hesmans |
2019-06-11
|
07 | Olivier Bonaventure | Uploaded new revision |
2019-03-06
|
06 | Olivier Bonaventure | New version available: draft-ietf-tcpm-converters-06.txt |
2019-03-06
|
06 | (System) | New version approved |
2019-03-06
|
06 | (System) | Request for posting confirmation emailed to previous authors: Olivier Bonaventure , SungHoon Seo , Sri Gundavelli , Mohamed Boucadair , Benjamin Hesmans |
2019-03-06
|
06 | Olivier Bonaventure | Uploaded new revision |
2019-02-08
|
05 | Olivier Bonaventure | New version available: draft-ietf-tcpm-converters-05.txt |
2019-02-08
|
05 | (System) | New version approved |
2019-02-08
|
05 | (System) | Request for posting confirmation emailed to previous authors: Olivier Bonaventure , SungHoon Seo , Sri Gundavelli , Mohamed Boucadair , tcpm-chairs@ietf.org |
2019-02-08
|
05 | Olivier Bonaventure | Uploaded new revision |
2019-02-07
|
05 | (System) | Request for posting confirmation emailed to previous authors: Olivier Bonaventure , SungHoon Seo , Sri Gundavelli , Mohamed Boucadair , tcpm-chairs@ietf.org |
2019-02-07
|
05 | Olivier Bonaventure | Uploaded new revision |
2018-10-22
|
04 | Mohamed Boucadair | New version available: draft-ietf-tcpm-converters-04.txt |
2018-10-22
|
04 | (System) | New version approved |
2018-10-22
|
04 | (System) | Request for posting confirmation emailed to previous authors: Olivier Bonaventure , SungHoon Seo , Sri Gundavelli , Mohamed Boucadair |
2018-10-22
|
04 | Mohamed Boucadair | Uploaded new revision |
2018-10-18
|
03 | Olivier Bonaventure | New version available: draft-ietf-tcpm-converters-03.txt |
2018-10-18
|
03 | (System) | New version approved |
2018-10-18
|
03 | (System) | Request for posting confirmation emailed to previous authors: Olivier Bonaventure , SungHoon Seo , Sri Gundavelli , Mohamed Boucadair |
2018-10-18
|
03 | Olivier Bonaventure | Uploaded new revision |
2018-07-02
|
02 | Olivier Bonaventure | New version available: draft-ietf-tcpm-converters-02.txt |
2018-07-02
|
02 | (System) | New version approved |
2018-07-02
|
02 | (System) | Request for posting confirmation emailed to previous authors: Anandatirtha Nandugudi , Mohamed Boucadair , Bart Peirens , Olivier Bonaventure , SungHoon Seo , tcpm-chairs@ietf.org |
2018-07-02
|
02 | Olivier Bonaventure | Uploaded new revision |
2018-03-07
|
01 | Michael Tüxen | Added to session: IETF-101: tcpm Mon-0930 |
2018-03-05
|
01 | Olivier Bonaventure | New version available: draft-ietf-tcpm-converters-01.txt |
2018-03-05
|
01 | (System) | New version approved |
2018-03-05
|
01 | (System) | Request for posting confirmation emailed to previous authors: Mohamed Boucadair , Bart Peirens , Anandatirtha Nandugudi , Olivier Bonaventure , SungHoon Seo , tcpm-chairs@ietf.org |
2018-03-05
|
01 | Olivier Bonaventure | Uploaded new revision |
2018-02-19
|
00 | Michael Scharf | This document now replaces draft-bonaventure-mptcp-converters instead of None |
2018-02-19
|
00 | Olivier Bonaventure | New version available: draft-ietf-tcpm-converters-00.txt |
2018-02-19
|
00 | (System) | WG -00 approved |
2018-02-16
|
00 | Olivier Bonaventure | Set submitter to "Olivier Bonaventure ", replaces to draft-bonaventure-mptcp-converters and sent approval email to group chairs: tcpm-chairs@ietf.org |
2018-02-16
|
00 | Olivier Bonaventure | Uploaded new revision |