Hi Med,

As per usual, inline.

Cheers,
Vlad

On 7/7/2017 11:17 AM, [email protected] wrote:

Hi Vlad,

Please see inline.

Cheers,

Med

*De :*Vladimir Olteanu [mailto:[email protected]]
*Envoyé :* vendredi 7 juillet 2017 09:19
*À :* BOUCADAIR Mohamed IMT/OLN; David Schinazi
*Cc :* [email protected]; multipathtcp
*Objet :* Re: [Int-area] SOCKS 6 Draft

Hi Mohamed,

I'm replying specifically to the parts quoted below.

SOCKS is used by explicit proxies; anything related to transparent proxies is beyond its scope.

[Med] The definition we had so far is that “explicit proxy” means that the client is aware about the presence of the proxy and such packets are sent explicitly to that proxy. An explicit proxy can therefore behave either as transparent or non-transparent. I understand, that the current design assumes non-transparent mode.

Yes, what I meant was "non-transparent".

It does not preclude the deployment of anything transparent. In other words, I merely propose it as an alternative to MP_CONVERT.

Discussing PCP, IPv6 source address preservation, UPnP etc. makes no sense in this context.

[Med] I disagree. The support of incoming connections is one of the requirements of the MPTCP WG:"A session can be initiated from either end”.

This is why I’m wondering how this typical flow can be achieved with SOCKS.

H<=====CPEß--------proxy<===RM

         +----------+

My point was that if you want any transparent functionality, you have to use something other than SOCKS, but now I see what you mean.

Currently, SOCKS 6 has the same limited support for this scenario that v5 has. The client opens a connection to the server and asks it to listen for an incoming connection. When a remote host connects to the proxy, the server sends a reply (v5)/operation reply (v6) to the client (via the connection that the client initiated) containing the remote host's address and starts relaying data back and forth.

I think adequately handling this use case would mean adding a reverse mode to SOCKS 6: * The client informs the proxy on which port it is listening. (It's the client's job to set up port forwarding etc.) * For each incoming connection, the proxy opens a connection to the client, sends an operation reply containing the remote host's IP and port, and then relays data.


Cheers,
Vlad

On 7/6/2017 3:56 PM, [email protected] <mailto:[email protected]>wrote:

    *De :*Vladimir Olteanu [mailto:[email protected]]
    *Envoyé :* mercredi 5 juillet 2017 18:39
    *À :* BOUCADAIR Mohamed IMT/OLN; David Schinazi
    *Cc :* [email protected] <mailto:[email protected]>; multipathtcp
    *Objet :* Re: [Int-area] SOCKS 6 Draft

     <SNIP>

    On 7/5/2017 9:00 AM, [email protected]
    <mailto:[email protected]> wrote:

        <SNIP>

        *De :*Vladimir Olteanu [mailto:[email protected]]
        *Envoyé :* mercredi 5 juillet 2017 01:35
        *À :* BOUCADAIR Mohamed IMT/OLN; David Schinazi
        *Cc :* [email protected] <mailto:[email protected]>; multipathtcp
        *Objet :* Re: [Int-area] SOCKS 6 Draft

        <SNIP>

    Can you please let me know if the proposal supports the following
    features:

    ·Support incoming connections (Proxy<---Remote Host): That is the
    proxy intercept a TCP connection that it transforms into an MPTCP one.

    Yes. See section 7.2. The client makes a request and then has to
    keep the connection to the proxy open. When the proxy accepts a
    connection from a remote host, it informs the client of the remote
    host's address and starts relaying data. SOCKS 5 has the exact
    same feature. You are limited to one incoming connection per
    request, though.

    [Med] In the plain mode, there is no such limitation because we
    are leveraging on PCP (RFC6887).

    ·If such feature is supported, how a host located behind a CPE
    (Host----CPE-----Proxy----Remote Host) can instruct dynamically
    the CPE so that it can forward appropriately incoming connections?

    It does not have to. The connection on the host-proxy leg is
    initiated by the client.

    [Med] I’m not sure to understand your answer here. Let’s consider
    that your host is using UPnP IGD to talk with the CPE to accept
    incoming connections + those connections are eligible to the MPTCP
    service. How the solution would work?


    <SNIP>


    ·IPv6 source address/prefix preservation

    I'm not sure what you mean by that.

    [Med] Please see slide 18 of
    
https://www.ietf.org/proceedings/98/slides/slides-98-mptcp-sessa-network-assisted-mptcp-03.pdf



_______________________________________________
Int-area mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to