Re: [bfcpbis] Joerg's review - Fwd: Reviewing draft-ietf-bfcpbis-rfc4582bis

"Charles Eckel (eckelcu)" <eckelcu@cisco.com> Mon, 13 January 2014 18:41 UTC

Return-Path: <eckelcu@cisco.com>
X-Original-To: bfcpbis@ietfa.amsl.com
Delivered-To: bfcpbis@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7341A1AE1A1 for <bfcpbis@ietfa.amsl.com>; Mon, 13 Jan 2014 10:41:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.039
X-Spam-Level:
X-Spam-Status: No, score=-15.039 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.538, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G2Xt3QFulREJ for <bfcpbis@ietfa.amsl.com>; Mon, 13 Jan 2014 10:41:33 -0800 (PST)
Received: from rcdn-iport-8.cisco.com (rcdn-iport-8.cisco.com [173.37.86.79]) by ietfa.amsl.com (Postfix) with ESMTP id 88D271AE1BD for <bfcpbis@ietf.org>; Mon, 13 Jan 2014 10:41:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12033; q=dns/txt; s=iport; t=1389638482; x=1390848082; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=gvM534gCTDAUmL/Ue2hsPCVOTodb5G2gNgSufnqkoK8=; b=C2QuX2jJmofgesMgifCNaG7A7bSJxlK2k+yQO245TLpqOUkKYgPvlGAq mpEZCNPRa8eE8OTF94Y/X0FzRo3SHal7GIsRYiOV7E8IkuYmmAJ63OAVD VyoiVsz2o+/K7x3Hl0Lwm4wD4Rm0lLEKhBdmygBVnqK5D6G5+rTGbwn6s U=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AiMFAPky1FKtJXG8/2dsb2JhbABagws4VrkjT4EYFnSCJQEBAQMBAQEBGgpBBgsMBAIBCBguJwslAgQBDQWHfAgNxH0TBI8HB4Q3BIkLiyiDZJIVgy2CKg
X-IronPort-AV: E=Sophos;i="4.95,654,1384300800"; d="scan'208";a="297042558"
Received: from rcdn-core2-1.cisco.com ([173.37.113.188]) by rcdn-iport-8.cisco.com with ESMTP; 13 Jan 2014 18:41:21 +0000
Received: from xhc-rcd-x12.cisco.com (xhc-rcd-x12.cisco.com [173.37.183.86]) by rcdn-core2-1.cisco.com (8.14.5/8.14.5) with ESMTP id s0DIfL5C032266 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 13 Jan 2014 18:41:21 GMT
Received: from xmb-aln-x08.cisco.com ([169.254.3.191]) by xhc-rcd-x12.cisco.com ([173.37.183.86]) with mapi id 14.03.0123.003; Mon, 13 Jan 2014 12:41:20 -0600
From: "Charles Eckel (eckelcu)" <eckelcu@cisco.com>
To: "Tom Kristensen (tomkrist)" <tomkrist@cisco.com>, "bfcpbis@ietf.org" <bfcpbis@ietf.org>, Joerg Ott <jo@netlab.tkk.fi>
Thread-Topic: [bfcpbis] Joerg's review - Fwd: Reviewing draft-ietf-bfcpbis-rfc4582bis
Thread-Index: AQHPEI8MkuAylBz21Uivb+PX6cV1Vw==
Date: Mon, 13 Jan 2014 18:41:19 +0000
Message-ID: <CEF96182.1A4E1%eckelcu@cisco.com>
References: <529C456D.60508@cisco.com> <52CE9BC6.1090109@cisco.com>
In-Reply-To: <52CE9BC6.1090109@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.3.9.131030
x-originating-ip: [10.21.85.10]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <5C9593CA399A0A4CBDD297229EF7E7E5@emea.cisco.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: 'Tom Kristensen' <2mkristensen@gmail.com>
Subject: Re: [bfcpbis] Joerg's review - Fwd: Reviewing draft-ietf-bfcpbis-rfc4582bis
X-BeenThere: bfcpbis@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: BFCPBIS working group discussion list <bfcpbis.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/bfcpbis>, <mailto:bfcpbis-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/bfcpbis/>
List-Post: <mailto:bfcpbis@ietf.org>
List-Help: <mailto:bfcpbis-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/bfcpbis>, <mailto:bfcpbis-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Jan 2014 18:41:37 -0000

Hi Tom,

Thanks for reviving this. Please see inline.

On 1/9/14 4:53 AM, "Tom Kristensen (tomkrist)" <tomkrist@cisco.com> wrote:

>
>Inline below.
>
>On 12/02/2013 09:31 AM, Tom Kristensen wrote:
> > Relaying Jörg's review sent to the authors of the draft 2013-11-30.
> >
> > Please, step forward with any reactions or input regarding the two
> > reviews we received recently. My plan is to go through them and provide
> > feedback to the list ASAP.
> >
> > (Jörg is added to the copy list, since he's not following the BFCPbis
> > mailing list)
>
>No reactions or comments triggered on the list. (And apologize for a
>loooong yule and new year vacation).
>However, here are my comments and suggestions for the issues Jörg had.
>
> > -------- Original Message --------
> >
> > Hi Gonzalo and all,
> >
> > thanks a lot for the diff, this is really useful!
> >
> > So, I have gone in some detail through the document and found a
> > bunch of issues to be addressed. Most of those revolve around
> > the use of unreliable transport, which appears to be underspecified
> > in a number of ways.
>
>[...]
>
> > 5.1. General
> >
> > SHOULD -> MUST be cleared by the sender
>
>I don't see the need for change since the flag has no meaning when using
>reliable transport and especially not since it is a MUST for the
>receiver to ignore it in that case. Anyway, changing it to MUST works
>fine with me if that's what the WG wants!
>
>Also, since this is an extension of RFC 4582 we have used the same style
>as in the original draft. For instance in 5.2.6 (for the Padding bits)
>and in 5.2.6.1 (for the R bits), where the sender SHOULD set clear the
>bits and the receiver MUST ignore them.

After rereading RFC 2119, this looks like a case where it is better to fix
the original RFC as part of extending it rather than follow the
conventions put in place by the origin RFC. As there does not seem to be
any reason or circumstances to justify NOT clearing the flag/bits, I think
both instances should be changed from SHOULD to MUST.

>
> > When moving from a 16- or 32-bit "value" to an unsigned
> > integer, the byte order must be specified.
>
>The second sentence in Section 5 says that all "the protocol values MUST
>be sent in network byte order". That should be sufficient, shouldn't it?

I think so.

>
> > 5.1. R bit
> >
> > Question: Can it happen that transport changes in a relay? If
> > my dim memory serves me right, then STUN relay may change the
> > transport and thus the reliability. They won't interpret BFCP,
> > however, and so the bit would suddenly be wrong. Or is this
> > scenario prohibited?
>
>You mean TURN not STUN I presume. A TURN relay may have an unreliable
>and reliable hop on each hop. However, the TURN relaying(/"tunneling")
>magic added to the packets will be removed before the BFCP packets
>reaches the BFCP stack. And since on hop is unreliable the extensions
>for unreliable transport is still needed.
>
> > 5.2. Use of SHOULD
> >
> > Quite a few places state a SHOULD requirement, e.g., for sending
> > error messages. But this doesn't make sense. Based upon which
> > grounds would an endpoint _not_ send an error message?
>
>I do agree in principle, but again and if I remember correctly the
>SHOULD here was used to comply with the style used in the original RFC
>4582. See for instance the SHOULD requirement to send an Error message
>in Section 13 (for Unknown Primitive).
>
>Since the revision of RFC 4582 was done to add support for unreliable
>transport and in addition to fix important issues (such known
>bugs/typos/unclear text), I'm not sure we want to change the SHOULD to
>MUST and potentially generate issues for existing RFC 4582 compliant
>implementations out there.
>
>However, we can without any problem make the use of error messages
>mandatory (with MUST) in the sections added for unreliable transport of
>course. Such as in Section 6.2 and probably some more places.

Here as well, I think it best to adhere to RFC 2119 rather than follow
conventions used previously in RFC 4582. We have fixed some other issues
with the original already, and I think we should fix these as well. I
believe this to be more of matter of interpretation of the guidance of RFC
2119 rather than a real change to the BFCP protocol.

>
> > 5.2.6 Generic error
> >
> > Is it specified what the receiver of a non-specific error is
> > supposed to do? Apparently, it cannot talk to the server. So,
> > abandon floor control?
>
>Well, for me the Generic Error is kind of a safety net in situations
>where the existing error codes are not meaningful. So one implementation
>might simply abandon floor control/BFCP as a consequence another might
>have some error recovery that is possible - depending on context.
>
>Any need for text describing this fluffy assumption? :) Or do people
>have other interpretations?

The paragraph above the table states:

If an error code is not recognized by the receiver,
   then the receiver MUST assume that an error exists, and therefore
   that the original message that triggered the Error message to be sent
   is processed, but the nature of the error is unclear.


I would expect the same to be true when receiving a "Generic Error". The
action taken in response to such an error is implementation and context
dependent.

>
> > 5.3.14, 5.3.15., and 5.3.17
> >
> > It seems that FloorRequestStatusAck, FloorStatusAck, and GoodbyeAck
> > are essentially packet-level acks. So why not have just a single
> > code point for those, since they all carry a transaction id anyway?
>
>True and if I remember correctly this has been discussed earlier on.
>Reasons like having explicit acks matching request primitive and
>potentially extensibility per request type later on might be enough to
>keep it as is? I think so at least.

I agree.

>
> > 6.2 Unreliable Transport
> >
> > The text often talks about UDP datagrams, even though DTLS
> > transport appears assumed.
> >
> > "Entities MUST have at most one outstanding request transaction at
> > any one time."
> >
> > This probably wants the addition of a "per peer", otherwise a floor
> > control server would be in trouble. (Section 6.2.1 has this right)
>
>Indeed, a good point! This will be changed to make it consistent and
>clear.

Yes, good catch.

>
> > 6.2 Hello
> >
> > Clients MUST announce their presence to the floor control server by
> > sending a Hello message. The floor control server responds to the
> > Hello message with a HelloAck message. The client considers the
> > floor control service as present and available only upon receiving
> > the HelloAck message.
> >
> > When does the server consider the client to have disappeared so that
> > it can discard state?
> >
> > It seems I can run a client, send a Hello message, get the HelloAck,
> > and then send a floor control request with a spoofed IP address, and
> > predict and fake the response for the first message I am expecting
> > from the server in response. Then, I have state installed that will
> > generate packets and retransmissions to a random target until the
> > server discards the client state. But there is no mention when the
> > state would be discarded.
> >
> > Maybe this is less of an attack problem since this is bound to a
> > conference somewhere, but I still don't have a mechanism to get
> > rid of the transport state -- could be important particularly when
> > new connections are instantiated. While it is stated that the old
> > state is lost (for the new instance of the client), will it be
> > discarded? There is no guidance.
>
>Hmmm, not sure how to best handle that situation.
>
>Using DTLS would make the IP address spoofing harder at least, and it is
>recommended to use TLS for both TCP and UDP transport.
>
>What can people propose for this? Is it sufficient to describe what the
>server should do when the number of retransmissions are tried?

That sounds sensible for UDP. For TCP, it can be based on not being able
to establish a connection to the client. Both of these are similar to
receiving an ICMP error, as described in section 6.2.2.

>
> > 6.2.3 Fragmentation
> >
> > Is there any guidance on transmitting fragments? (any pacing?)
>
>No, and one justification for keeping the fragmentation scheme simple
>and avoid specifying for instance pacing, is that the BFCP messages are
>binary and generally small in size. The probability for using the
>fragmentation scheme is smal and the need for pacing fragments even lower!
>
> > How is N defined? One would assume N = ceil (msgsize/MTUsize), but
> > an implementer might decide to use a larger N. In any case, when
> > we use N in the spec, it must be said how it is established.
>
>I agree and I think using N = ceil(msgsize/MTUsize) is a good way to
>specify how to choose N.
>
> > 8.2 Transaction number re-use.
> >
> > The text currently states that a transaction number "MUST NOT be
> > reused in another message from the floor control server checks
> > whether until the appropriate response from the client sending is
> > received for the transaction".
> >
> > If the ID is monotonically increasing (modulo wrap-around) why not
> > make re-use illegal? Allowing re-use seems to be calling for
> > trouble, especially in case some transactions may refer to others
> > by their ID or if transactions last longer.
>
>Very true and a good point. Re-use is potentially creating trouble...
>And since monotonical increasing values are required in the second last
>paragraph of Section 8, we should ban re-use in Section 8.2. OK?

Works for me. Of course the ID will need to be able to wrap around once
the defined range is exhausted.

>
> > 8.3.2. T2 is unclear
>
>Yes, probably true! One way of dealing with that is to remove timer T2
>completely and let the implementations decide when to release knowledge.
>Another to brush up the specification of T2 of course.

Perhaps it is better to remove T2 and instead rely on T1 expiration
following final  retransmission serving as trigger to release knowledge of
transaction.

>
>I'll be back with a proposal if clarification is needed!
>
> > 9.1 Authentication
> >
> > The text states:
> >
> > BFCP messages received over an authenticated TLS/DTLS connection are
> > considered authenticated. A floor control server that receives a
> > BFCP message over TCP/UDP (no TLS/DTLS) can request the use of TLS/
> > DTLS by generating an Error message, as described in Section 13.8,
> > with an Error code with a value of 9 (Use TLS) or a value of 11 (Use
> > DTLS) respectively. Clients SHOULD simply ignore unauthenticated
> > messages.
> >
> > "can" -> MUST or MAY (this is normative behavior)
>
>True.

MAY seems appropriate to me.

>
> > But does this work? A server has one connection to a client. So,
> > if the server has at its disposition to accept TCP/UDP but the client
> > should ignore such messages, with the connection bidirectional, then
> > this de-facto mandates TLS/DTLS, doesn't it? Or the client would
> > never react.
>
>I'n not that fluent in TLS/DTLS to make a definitive answer there.
>Anybody out there willing to explain why this works or not?

I think the last sentence need to be changes to read as follows:

"Clients configured to require the use of TLS/DTLS MUST ignore
unauthenticated messages."



>
> > Appendix A: Wouldn't the monoticity of the transaction IDs become
> > clearer if increments or 1 in numbers were used?
>
>True, but increments of 1 is not mandated. What do you mean by using
>increments, having an initial Transaction ID and using "+x" or something
>in later messages?
>
>-- Tom

Cheers,
Charles

>_______________________________________________
>bfcpbis mailing list
>bfcpbis@ietf.org
>https://www.ietf.org/mailman/listinfo/bfcpbis