Re: [bfcpbis] Mirja Kühlewind's No Objection on draft-ietf-bfcpbis-rfc4583bis-26: (with COMMENT)

"Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net> Thu, 25 October 2018 10:25 UTC

Return-Path: <ietf@kuehlewind.net>
X-Original-To: bfcpbis@ietfa.amsl.com
Delivered-To: bfcpbis@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39772130DD3; Thu, 25 Oct 2018 03:25:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pnqmmnvfR-gq; Thu, 25 Oct 2018 03:24:59 -0700 (PDT)
Received: from wp513.webpack.hosteurope.de (wp513.webpack.hosteurope.de [IPv6:2a01:488:42:1000:50ed:8223::]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B93ED1277BB; Thu, 25 Oct 2018 03:24:59 -0700 (PDT)
Received: from ict-networks-2001-067c-10ec-52c8-8000-0000-0000-0ab1.fwd-v6.ethz.ch ([2001:67c:10ec:52c8:8000::ab1]); authenticated by wp513.webpack.hosteurope.de running ExIM with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) id 1gFcoy-0008F4-8z; Thu, 25 Oct 2018 12:24:56 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>
In-Reply-To: <1CDBF82F-6AE4-4A50-ADB8-C0E70507BF1B@ericsson.com>
Date: Thu, 25 Oct 2018 12:24:54 +0200
Cc: The IESG <iesg@ietf.org>, "bfcpbis@ietf.org" <bfcpbis@ietf.org>, "mary.ietf.barnes@gmail.com" <mary.ietf.barnes@gmail.com>, "draft-ietf-bfcpbis-rfc4583bis@ietf.org" <draft-ietf-bfcpbis-rfc4583bis@ietf.org>, "bfcpbis-chairs@ietf.org" <bfcpbis-chairs@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <3615355E-38F8-4827-802D-4B1BCC5AE03B@kuehlewind.net>
References: <154039268936.6939.17214783198090812411.idtracker@ietfa.amsl.com> <1CDBF82F-6AE4-4A50-ADB8-C0E70507BF1B@ericsson.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-bounce-key: webpack.hosteurope.de;ietf@kuehlewind.net;1540463099;49d225fc;
X-HE-SMSGID: 1gFcoy-0008F4-8z
Archived-At: <https://mailarchive.ietf.org/arch/msg/bfcpbis/VRUXTUgNfqt2kv8aS2VF0KpjtPc>
Subject: Re: [bfcpbis] Mirja Kühlewind's No Objection on draft-ietf-bfcpbis-rfc4583bis-26: (with COMMENT)
X-BeenThere: bfcpbis@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: BFCPBIS working group discussion list <bfcpbis.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bfcpbis>, <mailto:bfcpbis-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/bfcpbis/>
List-Post: <mailto:bfcpbis@ietf.org>
List-Help: <mailto:bfcpbis-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bfcpbis>, <mailto:bfcpbis-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Oct 2018 10:25:02 -0000

Hi Christer,

thanks for you reply. Please so the right thing in addressing any points in the draft as needed. As few minor additional comments below.

> Am 24.10.2018 um 18:05 schrieb Christer Holmberg <christer.holmberg@ericsson.com>:
> 
> Hi Mirja,
> 
> Thank You for the review! Please see inline.
> 
>>   1) Section 4:
>>   „This is one of the options when ICE is used (Section 9).“
>>   Maybe you can make this sentence slightly more specific because that was one
>>   thing I was wondering about all the time until I read 9 (why TCP/DTLS/BFCP is
>>   needed), e.g. „This is one of the options where when ICE is used only one DTLS
>>   session is established but there are candidate pairs for UDP and TCP (Section
>>   9).“
>> 
>>   Also why is 'UDP/TLS/BFCP' not called 'UDP/DTLS/BFCP‘?
> 
> It's mainly for backward compatibility reasons (this draft has been around for many years, and have been implemented and deployed), because for some reasons people thought 'UDP/TLS/BFCP' was correct at some point. 
> 
> I guess someone else may have more information, because I don't remember the details of the discussions that took place at the time.

Okay. I guess that could be noted in the draft but it doesn’t have to.

> 
> ---
> 
>>   2) Section 6 provides multiplexing considerations for bfcpver, however all
>>   other attributes also have a Mux Category: TBD. When will these be defined?
> 
> Whenever someone defines how to multiplex BFCP streams with other streams. 
> 
> The WG decided not to do that within 4583bis, because nobody saw any need for that.

It at least looks confusing to have a TBD in the doc. But I guess you have to further discuss this with Ben.

> 
> ---
> 
>>   3) Section 7.1: Sorry for the lack of understanding here, but why does the
>>   reconnecting endpoint need to send a new offer at all, instead of just
>>   re-opening a new TCP connection with the same parameters as before?
> 
> That is how it has been defined for TCP negotiated using SDP offer/answer, in RFC 4145: you always signal when you want to establish a connection (even if it is re-establishing a previous connection).

Okay..

> 
> ---
> 
>>   4) Section 8:
>>   „If the TCP connection is lost, the active endpoint is responsible for re-
>>      establishing the TCP connection.“
>>   What does active mean here?
> 
> The active endpoint is responsible for initiating the TCP connection. It is defined in RFC 4145, and we should add a reference.


Yes, thanks!

> 
>>   Also in section 10.2 and 10.3 'active' is used a well but with quotes, however,  it is never really defined.
> 
> See above regarding the definition/reference.
> 
> The quotes should be removed, because the text is not talking about a value.
> 
> ---
> 
>>   5) Section 8:
>>   „Unless a new TLS session is
>>      negotiated, subsequent SDP offers and answers will not impact the
>>      previously negotiated TLS roles.“
>>   Quick question: Does that mean that when the TCP connection breaks and is
>>   re-opened, there is no new TLS handshake?
> 
> When the TLS connection is established, the answerer acts as TLS server. However, in subsequent offer/answer transactions both endpoint can act as answerer, and the text simply clarifies that the TLS roles don't change just because the offerer/answerer roles change.
> 
> The text does not change the TLS procedures, so if a new handshake is needed then it will be sent.
> 
> ---
> 
>>   6) Section 10.4:
>>   „if the offerer
>>         does not want to re-establish an existing TCP connection, the
>>         offerer MUST associate an SDP 'connection' attribute with a value
>>         of "existing", with the 'm' line;“
>>   Just double-checking: Is this correct that If the offerer does NOT what to use
>>   the existing TCP connection, it adds the „existing“ attribute…?
> 
> No, the other way around: if the offerer DOES want to use the existing TCP connection, it adds 'existing‘.

Okay, that makes more sense :-). I think the use of the word "re-establish" is really confusing here. What about

„if the offerer wants to re-use an existing TCP connection…“?

Mirja


> 
> Regards,
> 
> Christer
> 
> 
>