Re: [AVT] draft-ietf-avt-ports-for-ucast-mcast-rtp-04: Review Comments [csp]

Magnus Westerlund <magnus.westerlund@ericsson.com> Thu, 02 December 2010 17:19 UTC

Return-Path: <magnus.westerlund@ericsson.com>
X-Original-To: avt@core3.amsl.com
Delivered-To: avt@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 6CC3C28C1C6 for <avt@core3.amsl.com>; Thu, 2 Dec 2010 09:19:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.57
X-Spam-Level:
X-Spam-Status: No, score=-106.57 tagged_above=-999 required=5 tests=[AWL=0.029, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sQZGpUPRlBWG for <avt@core3.amsl.com>; Thu, 2 Dec 2010 09:18:57 -0800 (PST)
Received: from mailgw10.se.ericsson.net (mailgw10.se.ericsson.net [193.180.251.61]) by core3.amsl.com (Postfix) with ESMTP id 4BB1428C1BC for <avt@ietf.org>; Thu, 2 Dec 2010 09:18:56 -0800 (PST)
X-AuditID: c1b4fb3d-b7b8cae0000016b1-b9-4cf7d54bed89
Received: from esessmw0191.eemea.ericsson.se (Unknown_Domain [153.88.253.125]) by mailgw10.se.ericsson.net (Symantec Mail Security) with SMTP id AD.78.05809.B45D7FC4; Thu, 2 Dec 2010 18:20:11 +0100 (CET)
Received: from [147.214.183.21] (153.88.115.8) by esessmw0191.eemea.ericsson.se (153.88.115.85) with Microsoft SMTP Server id 8.2.234.1; Thu, 2 Dec 2010 18:20:10 +0100
Message-ID: <4CF7D54A.5000900@ericsson.com>
Date: Thu, 02 Dec 2010 18:20:10 +0100
From: Magnus Westerlund <magnus.westerlund@ericsson.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.0; sv-SE; rv:1.9.2.12) Gecko/20101027 Thunderbird/3.1.6
MIME-Version: 1.0
To: "Ali C. Begen (abegen)" <abegen@cisco.com>
References: <4CF3BAB3.2000501@ericsson.com> <04CAD96D4C5A3D48B1919248A8FE0D540DC93041@xmb-sjc-215.amer.cisco.com> <EDC0A1AE77C57744B664A310A0B23AE21E36365E@FRMRSSXCHMBSC3.dc-m.alcatel-lucent.com> <396D3FC7-9DA5-416E-9883-7FABD7234652@csperkins.org> <04CAD96D4C5A3D48B1919248A8FE0D540DC93B87@xmb-sjc-215.amer.cisco.com> <4CF7A62A.808@ericsson.com> <04CAD96D4C5A3D48B1919248A8FE0D540DC93C63@xmb-sjc-215.amer.cisco.com>
In-Reply-To: <04CAD96D4C5A3D48B1919248A8FE0D540DC93C63@xmb-sjc-215.amer.cisco.com>
X-Enigmail-Version: 1.1.1
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 8bit
X-Brightmail-Tracker: AAAAAA==
Cc: Colin Perkins <csp@csperkins.org>, IETF AVT WG <avt@ietf.org>
Subject: Re: [AVT] draft-ietf-avt-ports-for-ucast-mcast-rtp-04: Review Comments [csp]
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Audio/Video Transport Working Group <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Dec 2010 17:19:00 -0000

Ali C. Begen (abegen) skrev 2010-12-02 16:24:
> Inline.
> 
>> -----Original Message-----
>> From: Magnus Westerlund [mailto:magnus.westerlund@ericsson.com]
>> Sent: Thursday, December 02, 2010 8:59 AM
>> To: Ali C. Begen (abegen)
>> Cc: Colin Perkins; IETF AVT WG
>> Subject: Re: [AVT] draft-ietf-avt-ports-for-ucast-mcast-rtp-04: Review Comments [csp]
>>
>> Hi,
>>
>> My views on some of these comments
>>
>> Ali C. Begen (abegen) skrev 2010-12-02 02:56:
>>
>>>> - Section 3.2, 4th bullet on page 8: the discussion of how the token may remain valid for multiple sessions is unclear. It
>> may
>>>> be clearer to say that the token is valid for that port on the server until its expiration time, irrespective of what that port is
>>>
>>> Yes, reworded as requested.
>>>
>>>> used for. Following on from this, would it be appropriate to add a warning that the server port SHOULD NOT be reused for
>>>> other RTP sessions until the expiration time of the tokens issued?
>>>
>>> Not sure why we would need this.
>>
>> I think this is actually an interesting aspect of this. The draft seems
>> to be missing text on the issues of re-using a unicast session for
>> another usage. And here I think there are several aspects of this.
>> - Reusing a unicast session for different type of RTCP requests (which
>> may work
> 
> This is not a problematic case.

No, I don't expect it to be, unless there is some strange interworking
between the different RTCP messages. But that would be present even
without the dynamically created unicast session.

> 
>> - Reusing a unicast session for different multimedia session, which I
>> think implies having them share the FTap.
> 
> This is not a problematic case, either.

I am not agreeing fully. There need to be some consideration here for
it. Because you need to know which session the incomming UDP data
relates to. For example if one has an ongoing RAMS burst for one channel
and then sends a NACK request or another RAMS request and request to use
the same unicast session it is not obvious that the data is
distinguishable from one channel to the other. Thus clearly
consideration should be done here. like alternating between two
different unicast sessions with RAMS requests to avoid overlap.

>> - Reuse over time of the port for different services. (which is the one
>> I think Colin was going after).
> 
> OK, this is interesting. Lets discuss it. Remember that the PT port (server side) is advertised in the SDP at media or session level.
> 
> If advertised at the media level, PT is the port where the clients (who plan to start that particular unicast session with the server) send their token request message. This is illustrated in the SDP example in the draft.
> 
> If advertised at the session level, PT will be the port for obtaining a Token for any unicast session that is run between the server(s) and clients. Recall that existence of the 'portmapping-req' attribute indicates that a Token is required for all unicast sessions. Note that different unicast session may have different server addresses, the attribute above only indicates the common port for them.
> 

Yes, I agree that all the tools are available for getting things to
work. However, there needs text to point out when a client should use
new local ports to create new unicast sessions to an server. This
becomes more or less important dependent on how much co-locating is
happening on the server side when it comes to the RTCP feedback port.
Preferably none.

I also feel that you are missing the issue with time. If a service exist
for 2 hours on friday between 18-20. Then another service is started at
21.00 on friday and happens to reuse the port numbers, but is actually
another service instance. Then the token from service one may or may not
still be valid depending if service 1 and 2 share token generator and
key or not.

In this case it would be best if the token generation for service one is
set so that the token will not last beyond the service it intends to
service.

There is also a security perspective, if one expect clients to be of a
non all ways on kind, then a particular IP address may first used by
host A and later by host B. Thus potentially allowing A to DoS host B
unless the token is short lived. But I think I brought this up otherwise.

Cheers

Magnus Westerlund

----------------------------------------------------------------------
Multimedia Technologies, Ericsson Research EAB/TVM
----------------------------------------------------------------------
Ericsson AB                | Phone  +46 10 7148287
Färögatan 6                | Mobile +46 73 0949079
SE-164 80 Stockholm, Sweden| mailto: magnus.westerlund@ericsson.com
----------------------------------------------------------------------