Message ID | 20200122005633.21229-1-cpaasch@apple.com |
---|---|
Headers | show
Return-Path: <mptcp-bounces@lists.01.org> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=none (no SPF record) smtp.mailfrom=lists.01.org (client-ip=2001:19d0:306:5::1; helo=ml01.01.org; envelope-from=mptcp-bounces@lists.01.org; receiver=<UNKNOWN>) Authentication-Results: ozlabs.org; dmarc=fail (p=quarantine dis=none) header.from=apple.com Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=apple.com header.i=@apple.com header.a=rsa-sha256 header.s=20180706 header.b=IJ9bCdFU; dkim-atps=neutral Received: from ml01.01.org (ml01.01.org [IPv6:2001:19d0:306:5::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 482RnL4XT2z9sRG for <incoming@patchwork.ozlabs.org>; Wed, 22 Jan 2020 11:56:53 +1100 (AEDT) Received: from ml01.vlan13.01.org (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id BD7021007B8C8; Tue, 21 Jan 2020 17:00:07 -0800 (PST) Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=17.151.62.68; helo=nwk-aaemail-lapp03.apple.com; envelope-from=cpaasch@apple.com; receiver=<UNKNOWN> Received: from nwk-aaemail-lapp03.apple.com (nwk-aaemail-lapp03.apple.com [17.151.62.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 6F9061007B8C3 for <mptcp@lists.01.org>; Tue, 21 Jan 2020 17:00:05 -0800 (PST) Received: from pps.filterd (nwk-aaemail-lapp03.apple.com [127.0.0.1]) by nwk-aaemail-lapp03.apple.com (8.16.0.27/8.16.0.27) with SMTP id 00M0pxYO007363; Tue, 21 Jan 2020 16:56:46 -0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=sender : from : to : cc : subject : date : message-id : mime-version : content-transfer-encoding; s=20180706; bh=Tj/Xh1ADokd8zXWuY0DZ17kaAHioi2FXe2cxOqYwu5k=; b=IJ9bCdFUG5fjtisjcMso36QYYKud5flTvHIGtcHEk/2XEMR3ToNksfeJqLpXA+6qFddW 0GzXPPc2kY95q1QnqBca7h8VB/SEtDy5GNcMKEEiE8YqLABMnCYVMno+RdWL0E1vMZ93 q8JCYk/ySZpQgth2sLSzjSnQ5DNNWHsv82QaO0yAV66FODE/5hFdULWRoSxyGoKn7F2w 9oAxFaUC6ljJPk5nzX9odk4QIu/cpJXNOgZG+qytHdBeLK8PdldUhYsT1Af08F9V02Jq QdFzAN4wscKSEWK78XsB2rRQKpHzGuAjXmi9Hs///CYdOqodZgqeC+z2E0dGejYrr0kB Ew== Received: from ma1-mtap-s02.corp.apple.com (ma1-mtap-s02.corp.apple.com [17.40.76.6]) by nwk-aaemail-lapp03.apple.com with ESMTP id 2xmk4p1659-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Tue, 21 Jan 2020 16:56:46 -0800 Received: from nwk-mmpp-sz13.apple.com (nwk-mmpp-sz13.apple.com [17.128.115.216]) by ma1-mtap-s02.corp.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPS id <0Q4H0014CHALF030@ma1-mtap-s02.corp.apple.com>; Tue, 21 Jan 2020 16:56:46 -0800 (PST) Received: from process_milters-daemon.nwk-mmpp-sz13.apple.com by nwk-mmpp-sz13.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) id <0Q4H00F00F5G4K00@nwk-mmpp-sz13.apple.com>; Tue, 21 Jan 2020 16:56:45 -0800 (PST) X-Va-A: X-Va-T-CD: 4b1e0bf36502e052fc75ad21b706ed24 X-Va-E-CD: a90a569dc4155a44ea31a13ea0a8e519 X-Va-R-CD: 13c89f449697cb842941f5e30f66b620 X-Va-CD: 0 X-Va-ID: 9581b6bc-d855-4e1a-a28e-99762a3ac834 X-V-A: X-V-T-CD: 4b1e0bf36502e052fc75ad21b706ed24 X-V-E-CD: a90a569dc4155a44ea31a13ea0a8e519 X-V-R-CD: 13c89f449697cb842941f5e30f66b620 X-V-CD: 0 X-V-ID: 1f63ec3c-a4c1-430a-8388-f160ac83eccb X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2020-01-17_05:,, signatures=0 Received: from localhost ([17.192.155.241]) by nwk-mmpp-sz13.apple.com (Oracle Communications Messaging Server 8.0.2.4.20190507 64bit (built May 7 2019)) with ESMTPSA id <0Q4H00DNAHAIDC30@nwk-mmpp-sz13.apple.com>; Tue, 21 Jan 2020 16:56:42 -0800 (PST) Sender: cpaasch@apple.com From: Christoph Paasch <cpaasch@apple.com> To: netdev@vger.kernel.org Date: Tue, 21 Jan 2020 16:56:14 -0800 Message-id: <20200122005633.21229-1-cpaasch@apple.com> X-Mailer: git-send-email 2.23.0 MIME-version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2020-01-17_05:, , signatures=0 Message-ID-Hash: OXV2DZGPDQVHSSYISTEDDL2W2W5XXRFO X-Message-ID-Hash: OXV2DZGPDQVHSSYISTEDDL2W2W5XXRFO X-MailFrom: cpaasch@apple.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; suspicious-header CC: mptcp@lists.01.org X-Mailman-Version: 3.1.1 Precedence: list Subject: [MPTCP] [PATCH net-next v3 00/19] Multipath TCP part 2: Single subflow & RFC8684 support List-Id: Discussions regarding MPTCP upstreaming <mptcp.lists.01.org> Archived-At: <https://lists.01.org/hyperkitty/list/mptcp@lists.01.org/message/OXV2DZGPDQVHSSYISTEDDL2W2W5XXRFO/> List-Archive: <https://lists.01.org/hyperkitty/list/mptcp@lists.01.org/> List-Help: <mailto:mptcp-request@lists.01.org?subject=help> List-Post: <mailto:mptcp@lists.01.org> List-Subscribe: <mailto:mptcp-join@lists.01.org> List-Unsubscribe: <mailto:mptcp-leave@lists.01.org> Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit |
Series |
Multipath TCP part 2: Single subflow & RFC8684 support
|
expand
|
From: Christoph Paasch <cpaasch@apple.com> Date: Tue, 21 Jan 2020 16:56:14 -0800 > v2 -> v3: Added RFC8684-style handshake (see below fore more details) and some minor fixes > v1 -> v2: Rebased on latest "Multipath TCP: Prerequisites" v3 series > > This set adds MPTCP connection establishment, writing & reading MPTCP > options on data packets, a sysctl to allow MPTCP per-namespace, and self > tests. This is sufficient to establish and maintain a connection with a > MPTCP peer, but will not yet allow or initiate establishment of > additional MPTCP subflows. > > We also add the necessary code for the RFC8684-style handshake. > RFC8684 obsoletes the experimental RFC6824 and makes MPTCP move-on to > version 1. ... Honestly I don't see anything super objectionable here. And if there is, it can be easily fixed up with follow-on patches. Series applied, thanks!