Re: [AVT] AD review: draft-ietf-avt-rtp-cnames-02

"DRAGE, Keith (Keith)" <keith.drage@alcatel-lucent.com> Thu, 02 December 2010 00:10 UTC

Return-Path: <keith.drage@alcatel-lucent.com>
X-Original-To: avt@core3.amsl.com
Delivered-To: avt@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 48D2B3A6808 for <avt@core3.amsl.com>; Wed, 1 Dec 2010 16:10:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -105.533
X-Spam-Level:
X-Spam-Status: No, score=-105.533 tagged_above=-999 required=5 tests=[AWL=0.716, BAYES_00=-2.599, HELO_EQ_FR=0.35, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QikSRTt1HkJI for <avt@core3.amsl.com>; Wed, 1 Dec 2010 16:10:32 -0800 (PST)
Received: from smail5.alcatel.fr (smail5.alcatel.fr [62.23.212.27]) by core3.amsl.com (Postfix) with ESMTP id F15CD3A67F3 for <avt@ietf.org>; Wed, 1 Dec 2010 16:10:31 -0800 (PST)
Received: from FRMRSSXCHHUB02.dc-m.alcatel-lucent.com (FRMRSSXCHHUB02.dc-m.alcatel-lucent.com [135.120.45.62]) by smail5.alcatel.fr (8.14.3/8.14.3/ICT) with ESMTP id oB20BhWq003401 (version=TLSv1/SSLv3 cipher=RC4-MD5 bits=128 verify=NOT); Thu, 2 Dec 2010 01:11:43 +0100
Received: from FRMRSSXCHMBSC3.dc-m.alcatel-lucent.com ([135.120.45.46]) by FRMRSSXCHHUB02.dc-m.alcatel-lucent.com ([135.120.45.62]) with mapi; Thu, 2 Dec 2010 01:11:43 +0100
From: "DRAGE, Keith (Keith)" <keith.drage@alcatel-lucent.com>
To: Colin Perkins <csp@csperkins.org>, Robert Sparks <rjsparks@nostrum.com>
Date: Thu, 02 Dec 2010 01:11:42 +0100
Thread-Topic: [AVT] AD review: draft-ietf-avt-rtp-cnames-02
Thread-Index: AcuRqtDW5ZEhSSL+QEiNSWnFuHg4lQAClqSg
Message-ID: <EDC0A1AE77C57744B664A310A0B23AE21E36371B@FRMRSSXCHMBSC3.dc-m.alcatel-lucent.com>
References: <348E1B74-55DF-42C8-ADF2-08A819B421C8@nostrum.com> <E7034999-5192-46D0-AFB9-5A8A135EEBB8@csperkins.org>
In-Reply-To: <E7034999-5192-46D0-AFB9-5A8A135EEBB8@csperkins.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Scanned-By: MIMEDefang 2.64 on 155.132.188.13
Cc: IETF AVT WG <avt@ietf.org>
Subject: Re: [AVT] AD review: draft-ietf-avt-rtp-cnames-02
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Audio/Video Transport Working Group <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Dec 2010 00:10:33 -0000

But if we do that, we still end up with a MUST, which has to say that if you use another mechanism, it MUST meet certain requirements, and we have to be very precise about evaluating those requirements.

Is it not better just to list all the possible ones?

How much freedom do implementors actually need in this area? Is the only restriction really one where the root value is not available for some reason? Have we covered all those?

Keith 

> -----Original Message-----
> From: avt-bounces@ietf.org [mailto:avt-bounces@ietf.org] On 
> Behalf Of Colin Perkins
> Sent: Wednesday, December 01, 2010 10:55 PM
> To: Robert Sparks
> Cc: IETF AVT WG
> Subject: Re: [AVT] AD review: draft-ietf-avt-rtp-cnames-02
> 
> On 23 Nov 2010, at 16:32, Robert Sparks wrote:
> > Summary: Ready for IETF LC - watch for the announcement shortly.
> > 
> > Please consider the following as LC comments.
> > 
> > The document does not sufficiently explain _why_ these 
> three mechanisms are the only three mechanisms allowed and 
> that any other mechanism that satisfies these properties is 
> explicitly declared to be non-conformant. Did I miss this 
> explanation in the text somewhere? In particular, I'm looking 
> for support for the argument that interoperability will be 
> harmed if these requirements are not followed.
> 
> I'd be happy for the "MUST use one of the following three 
> methods" at the start of section 4.2 to change to a "SHOULD 
> use". As long as the method chosen has appropriate 
> uniqueness, and there is consistency between the methods used 
> for multiple RTP sessions that are to be correlated, then it 
> doesn't especially matter what algorithm is used. 
> 
> > Can the document explain why implementations won't run 
> afoul of the problem it calls out with public IPv4 addresses 
> being used by more than one endpoint when it requires IPv6 
> addresses to be used as cnames in the second bullet of 4.2?
> 
> 
> This is because IPv6 addresses are assumed globally unique. 
> We could change "That address can be an IPv6 privacy address 
> [RFC4941] or a unique local IPv6 unicast address [RFC4193]" 
> to "That address can be a unique globally scoped IPv6 unicast 
> address, an IPv6 privacy address [RFC4941], or a unique local 
> IPv6 unicast address [RFC4193]" or similar, if you think it's needed.
> 
> Cheers,
> --
> Colin Perkins
> http://csperkins.org/
> 
> 
> 
> _______________________________________________
> Audio/Video Transport Working Group
> avt@ietf.org
> https://www.ietf.org/mailman/listinfo/avt
>