Re: [AVTCORE] Review of draft-ietf-avtcore-rfc5764-mux-fixes-02

Marc Petit-Huguenin <> Thu, 17 September 2015 20:10 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id 3009F1A92FC for <>; Thu, 17 Sep 2015 13:10:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.236
X-Spam-Status: No, score=-1.236 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_SOFTFAIL=0.665] autolearn=no
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id RSkiucKRrF6O for <>; Thu, 17 Sep 2015 13:10:18 -0700 (PDT)
Received: from ( [IPv6:2604:3400:dc1:41:216:3eff:fe5b:8240]) by (Postfix) with ESMTP id E30C01A8A43 for <>; Thu, 17 Sep 2015 13:10:17 -0700 (PDT)
Received: from [IPv6:2602:61:753a:ca00:d9d5:62cf:2e5:14ee] (unknown [IPv6:2602:61:753a:ca00:d9d5:62cf:2e5:14ee]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (Client CN "Marc Petit-Huguenin", Issuer "" (verified OK)) by (Postfix) with ESMTPS id 4A54B20A1F; Thu, 17 Sep 2015 22:10:16 +0200 (CEST)
From: Marc Petit-Huguenin <>
To: Magnus Westerlund <>, IETF AVTCore WG <>,
References: <>
X-Enigmail-Draft-Status: N1110
Message-ID: <>
Date: Thu, 17 Sep 2015 14:10:13 -0600
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Icedove/38.1.0
MIME-Version: 1.0
In-Reply-To: <>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Archived-At: <>
Subject: Re: [AVTCORE] Review of draft-ietf-avtcore-rfc5764-mux-fixes-02
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Thu, 17 Sep 2015 20:10:21 -0000

Hash: SHA256

Hi Magnus,

Thanks for the review, and very sorry for the delay in responding to that.

See comments and answers below.

On 06/23/2015 06:24 AM, Magnus Westerlund wrote:
> Hi,
> I did a review of draft-ietf-avtcore-rfc5764-mux-fixes-02 and have
> some comments:
> A. Abstract:
> It overrides the guidance from SRTP Extension for DTLS [RFC5764],
> which suffered from three issues described and fixed in this
> document.
> There are four issues listed in Section 1.

It's back to 3, see below.

> B. Section 1, bullet 1 and 2:
> "It implicitly allocated codepoints ..."
> I am not particular happy about this formulation as it is only part
> of the truth. I think the authors should try to write a separate
> paragraph about the issue of overlapping value ranges, and the need
> to maintain the separated for any usage where multiplexing could
> occur. Thus this leading to an limitation of the usage of codepoints
> in the STUN/TURN as well as TLS protocol.

I added some text to this effect.

> C. Section 1, bullet 4:
> The current ranges are not efficiently allocated making it harder to
> introduce new protocols that might require multiplexing.
> I am not quite certain what this bullet tries to really say. What is
> allocated in ranges, is the ranges available for registration that
> doesn't reserve space for future protocols, or something else?

Not sure either.  I removed the bullet point.

> D. Section 1:
> These flaws in the demultiplexing scheme were unavoidably inherited 
> by other documents, such as [RFC7345] and 
> [I-D.ietf-mmusic-sdp-bundle-negotiation].  These will need to be 
> corrected with the updates this document provides.
> It is unclear what the second "These" refers to, I guess "flaws" not
> the documents.

No, the documents will need to be corrected to match the RFC-to-be.  Text updated.

> E. Section 1.1:
> Also here I think the document could benefit from a more analytic and
> less confrontational language. It is better to write that
> "Multiplexing limits the available range for new STUN methods." than
> "... entirely obliterating those STUN method codepoints".

But "limits" is not the truth either.  From The Concise Oxford Dictionary:

limit: n. 2 a restriction on the size or amount of something.
 v. set or serve as limit to.

Here we are talking about not just a restriction in size for the range, but the total elimination of the range.

I will rewrite to "[...] eliminating the possibility of having STUN method codepoints assigned by Designated Expert (i.e., the range 0x800 - 0xFFF)."

> F. Section 1.2:
> I want to remind the authors that this document will go to TLS WG
> during WG last call, and would recommend that one avoids to dictate
> to that WG how their situation are:
> "Unlike STUN, TLS is a mature protocol that is already well
> established and widely implemented and thus we expect only relatively
> few new codepoints to be assigned in the future."
> Considering the quite significant work ongoing on TLS, I think you
> might be wrong in this analysis.
> Focus on the facts and the goal here. I think the goal is to avoid
> having future assignment of functions cause failure in the
> multiplexing scheme.

I removed the sentence altogether.

> G. Section 1.
> I am missing a clearer description of the long term goal with this
> update. To my understanding it is to avoid future allocation in any
> of the affected protocols to result in that multiplexing becomes
> impossible when using that feature.
> A second goal appear to enable the possibility that additional
> protocols should be able to be given a range for them to multiplex. I
> think this second one can result in more discussion, as there are
> multiple people that express a preference for more explicit
> demultiplexing.
> In addition I think the method for achieving these goals should be
> made more clear. That is to make it clear in the IANA registries
> which values that are subject to risks for collisions and where
> coordination between protocols may be required. That is at least what
> I thought was the conclusion of the Dallas meeting.

Added the following tentative paragraphs in the introduction that states these goals:

"The first goal of this document are to make sure that future
 allocations in any of the affected protocols are done with the full
 knowledge on their impact on multiplexing.  This is achieved by
 modifying the IANA registries with instructions for coordination
 between the protocols at risk.

 A second goal is to permit to add new protocols to the list of
 multiplexed protocols in a manner that does not break existing

> H. Section 1.2: 0-19    Reserved (MUST be allocated with Standards
> Action)
> As I EKR commented, as these values anyway require Standards action
> this is meaningless. I think something more like (Requires
> coordination, see RFCXXXX). Where RFCXXXX is this document would be
> more acceptable and also much more informative.


> This relates to what I see as the need for this document to much
> better explanation of the goals and future considerations needed to
> avoid failure in allocations.
> I. Section 1.3:
> An implementation that uses the source IP address and port to 
> identify TURN channel messages MAY not need to restrict the channel 
> numbers to the above range.
> I think we need to have discussion about this. I personally think it
> makes much more sense to not limit the other protocols due to TURN,
> as an TURN client MUST know which address the TURN server uses. Thus
> limiting TURN channel demultiplexing based on source address appears
> trivial.
> If I misunderstanding this, then I think this section must before
> giving any recommendation make it clear why src address is not
> sufficent and we actually want to consume part of the value space for
> this?
> Note, I do think it is valuable to discuss TURN channels here, but I
> think it needs to reconsider what the message should be.

As for the content of this paragraph, it should not have said "MAY" here, as all the 1.x sections are non-normative. Section 3 should have been modified to say that the receiver may first use to source IP/port to demultiplex the TURN channel packets.

But we need a WG decision on this.  If we say that Channel demux is optionally done using the source IP/port then we still have to reserve the 64-79 prefix for receivers that decide to not use this.

If on the other hand we decide to not reserve the 64-79 prefix for the TURN channel demux, then demuxing using the source IP/port is a MUST.

For now I just removed the whole sentence in the text.

> J. Section 1.4:
> This is insufficient to explain any issues why the order of testing
> do matters?

I do not understand the question.

> K. Section 3:
> When new values or ranges are added, they MUST be tested in
> ascending order.

This text should not talk about adding new values/ranges. Changed the text to:

"The various range values for the first byte MUST be tested in ascending order."

> I am missing the text that makes it clear how one would go about to
> add allocate a new value or range when proposing to add a new
> protocol.

One just add it to the respective IANA registry.  The registries will be modified to remind the registry expert that mux/demux should be taken in account.

> L. Section 5.
> It doesn't simply update existing registries. It does currently
> specifies that TURN channels can be demultiplexed. Are there
> implications of that?

For now I am assuming that only demuxing is used for TURN channel, so I updated the text for this.

I also updated the text to also say that the testing order is now specified.

> M. Section 6:
> I think all the "Reserved" messages are the wrong ones. I think they
> should say "Reserved (DTLS-SRTP multiplexing collision avoidance, see


> N. Section 6.1:
> I think this needs to be more explicit about what it re-assigns. It
> needs to say that the values available for allocation i.e. 0-FFF are
> being changed to instead have the following ranges.
> Then I think a resulting table for the ranges would be good.

This is already explained in section 1.1, and the resulting table is also in 1.1 (which is referenced in the text in 6.1).  Do you think that the instructions to IANA should have this level of detail?

- -- 
Marc Petit-Huguenin

Version: GnuPG v2