Re: [bfcpbis] Mirja Kühlewind's No Objection on draft-ietf-bfcpbis-rfc4583bis-26: (with COMMENT)
"Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net> Thu, 25 October 2018 10:25 UTC
Return-Path: <ietf@kuehlewind.net>
X-Original-To: bfcpbis@ietfa.amsl.com
Delivered-To: bfcpbis@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39772130DD3; Thu, 25 Oct 2018 03:25:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pnqmmnvfR-gq; Thu, 25 Oct 2018 03:24:59 -0700 (PDT)
Received: from wp513.webpack.hosteurope.de (wp513.webpack.hosteurope.de [IPv6:2a01:488:42:1000:50ed:8223::]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B93ED1277BB; Thu, 25 Oct 2018 03:24:59 -0700 (PDT)
Received: from ict-networks-2001-067c-10ec-52c8-8000-0000-0000-0ab1.fwd-v6.ethz.ch ([2001:67c:10ec:52c8:8000::ab1]); authenticated by wp513.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) id 1gFcoy-0008F4-8z; Thu, 25 Oct 2018 12:24:56 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>
In-Reply-To: <1CDBF82F-6AE4-4A50-ADB8-C0E70507BF1B@ericsson.com>
Date: Thu, 25 Oct 2018 12:24:54 +0200
Cc: The IESG <iesg@ietf.org>, "bfcpbis@ietf.org" <bfcpbis@ietf.org>, "mary.ietf.barnes@gmail.com" <mary.ietf.barnes@gmail.com>, "draft-ietf-bfcpbis-rfc4583bis@ietf.org" <draft-ietf-bfcpbis-rfc4583bis@ietf.org>, "bfcpbis-chairs@ietf.org" <bfcpbis-chairs@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <3615355E-38F8-4827-802D-4B1BCC5AE03B@kuehlewind.net>
References: <154039268936.6939.17214783198090812411.idtracker@ietfa.amsl.com> <1CDBF82F-6AE4-4A50-ADB8-C0E70507BF1B@ericsson.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-bounce-key: webpack.hosteurope.de;ietf@kuehlewind.net;1540463099;49d225fc;
X-HE-SMSGID: 1gFcoy-0008F4-8z
Archived-At: <https://mailarchive.ietf.org/arch/msg/bfcpbis/VRUXTUgNfqt2kv8aS2VF0KpjtPc>
Subject: Re: [bfcpbis] Mirja Kühlewind's No Objection on draft-ietf-bfcpbis-rfc4583bis-26: (with COMMENT)
X-BeenThere: bfcpbis@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BFCPBIS working group discussion list <bfcpbis.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bfcpbis>, <mailto:bfcpbis-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bfcpbis/>
List-Post: <mailto:bfcpbis@ietf.org>
List-Help: <mailto:bfcpbis-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bfcpbis>, <mailto:bfcpbis-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Oct 2018 10:25:02 -0000
Hi Christer, thanks for you reply. Please so the right thing in addressing any points in the draft as needed. As few minor additional comments below. > Am 24.10.2018 um 18:05 schrieb Christer Holmberg <christer.holmberg@ericsson.com>: > > Hi Mirja, > > Thank You for the review! Please see inline. > >> 1) Section 4: >> „This is one of the options when ICE is used (Section 9).“ >> Maybe you can make this sentence slightly more specific because that was one >> thing I was wondering about all the time until I read 9 (why TCP/DTLS/BFCP is >> needed), e.g. „This is one of the options where when ICE is used only one DTLS >> session is established but there are candidate pairs for UDP and TCP (Section >> 9).“ >> >> Also why is 'UDP/TLS/BFCP' not called 'UDP/DTLS/BFCP‘? > > It's mainly for backward compatibility reasons (this draft has been around for many years, and have been implemented and deployed), because for some reasons people thought 'UDP/TLS/BFCP' was correct at some point. > > I guess someone else may have more information, because I don't remember the details of the discussions that took place at the time. Okay. I guess that could be noted in the draft but it doesn’t have to. > > --- > >> 2) Section 6 provides multiplexing considerations for bfcpver, however all >> other attributes also have a Mux Category: TBD. When will these be defined? > > Whenever someone defines how to multiplex BFCP streams with other streams. > > The WG decided not to do that within 4583bis, because nobody saw any need for that. It at least looks confusing to have a TBD in the doc. But I guess you have to further discuss this with Ben. > > --- > >> 3) Section 7.1: Sorry for the lack of understanding here, but why does the >> reconnecting endpoint need to send a new offer at all, instead of just >> re-opening a new TCP connection with the same parameters as before? > > That is how it has been defined for TCP negotiated using SDP offer/answer, in RFC 4145: you always signal when you want to establish a connection (even if it is re-establishing a previous connection). Okay.. > > --- > >> 4) Section 8: >> „If the TCP connection is lost, the active endpoint is responsible for re- >> establishing the TCP connection.“ >> What does active mean here? > > The active endpoint is responsible for initiating the TCP connection. It is defined in RFC 4145, and we should add a reference. Yes, thanks! > >> Also in section 10.2 and 10.3 'active' is used a well but with quotes, however, it is never really defined. > > See above regarding the definition/reference. > > The quotes should be removed, because the text is not talking about a value. > > --- > >> 5) Section 8: >> „Unless a new TLS session is >> negotiated, subsequent SDP offers and answers will not impact the >> previously negotiated TLS roles.“ >> Quick question: Does that mean that when the TCP connection breaks and is >> re-opened, there is no new TLS handshake? > > When the TLS connection is established, the answerer acts as TLS server. However, in subsequent offer/answer transactions both endpoint can act as answerer, and the text simply clarifies that the TLS roles don't change just because the offerer/answerer roles change. > > The text does not change the TLS procedures, so if a new handshake is needed then it will be sent. > > --- > >> 6) Section 10.4: >> „if the offerer >> does not want to re-establish an existing TCP connection, the >> offerer MUST associate an SDP 'connection' attribute with a value >> of "existing", with the 'm' line;“ >> Just double-checking: Is this correct that If the offerer does NOT what to use >> the existing TCP connection, it adds the „existing“ attribute…? > > No, the other way around: if the offerer DOES want to use the existing TCP connection, it adds 'existing‘. Okay, that makes more sense :-). I think the use of the word "re-establish" is really confusing here. What about „if the offerer wants to re-use an existing TCP connection…“? Mirja > > Regards, > > Christer > > >
- [bfcpbis] Mirja Kühlewind's No Objection on draft… Mirja Kühlewind
- Re: [bfcpbis] Mirja Kühlewind's No Objection on d… Christer Holmberg
- Re: [bfcpbis] Mirja Kühlewind's No Objection on d… Roman Shpount
- Re: [bfcpbis] Mirja Kühlewind's No Objection on d… Mirja Kuehlewind (IETF)