Re: [dnssd] draft-ietf-rtcweb-mdns-ice-candidates-02 feedback

youenn fablet <yfablet@apple.com> Thu, 07 March 2019 21:51 UTC

Return-Path: <yfablet@apple.com>
X-Original-To: dnssd@ietfa.amsl.com
Delivered-To: dnssd@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED4581311B0; Thu, 7 Mar 2019 13:51:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CbvhbbNrF8Is; Thu, 7 Mar 2019 13:51:17 -0800 (PST)
Received: from nwk-aaemail-lapp01.apple.com (nwk-aaemail-lapp01.apple.com [17.151.62.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 90C1C1311A7; Thu, 7 Mar 2019 13:51:17 -0800 (PST)
Received: from pps.filterd (nwk-aaemail-lapp01.apple.com [127.0.0.1]) by nwk-aaemail-lapp01.apple.com (8.16.0.27/8.16.0.27) with SMTP id x27LlX60022294; Thu, 7 Mar 2019 13:51:15 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=mime-version : content-type : sender : subject : from : in-reply-to : date : cc : content-transfer-encoding : message-id : references : to; s=20180706; bh=bOQswLEz9sjsyIO8iZuRF6KYXR3IuVGOdgx946vlVe0=; b=eTQ6Cp/cll0f3wD6VjBQrMcEMphfIjI1/ZWRI2y13fE0yvX4IB0e8hj5sRuQZMeaqxGx utZqCeSvwvlLPXFQNp/dCe4WiytvG9IKnZmdTPx//UygKKRZCRcw1XLa0R6Z2fCBCCQE tsmSAO06r0rZUNsagmoYAvnK6ozB/ni53+Ks1TgO01vkQmzSpwL+BnX+edXfyQvMYU8o pISLmZFZdrzEfXY8bcFJJCyGVSGZs4p3JJT8THB8lw18eqW270Et0dJp1UNln6ZjwFLv dqBjy5R9Ki5fETaIbQyPfsCVvzYKGsIegV2YhYAFDwaeQwP99MPoLAzBDCa+Hx/hDloL QA==
Received: from ma1-mtap-s02.corp.apple.com (ma1-mtap-s02.corp.apple.com [17.40.76.6]) by nwk-aaemail-lapp01.apple.com with ESMTP id 2qysn9grt6-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Thu, 07 Mar 2019 13:51:15 -0800
MIME-version: 1.0
Content-type: text/plain; charset="utf-8"
Received: from nwk-mmpp-sz12.apple.com (nwk-mmpp-sz12.apple.com [17.128.115.204]) by ma1-mtap-s02.corp.apple.com (Oracle Communications Messaging Server 8.0.2.3.20181024 64bit (built Oct 24 2018)) with ESMTPS id <0PO000BDLNDBABF0@ma1-mtap-s02.corp.apple.com>; Thu, 07 Mar 2019 13:51:14 -0800 (PST)
Received: from process_milters-daemon.nwk-mmpp-sz12.apple.com by nwk-mmpp-sz12.apple.com (Oracle Communications Messaging Server 8.0.2.3.20181024 64bit (built Oct 24 2018)) id <0PO000J00N3JSE00@nwk-mmpp-sz12.apple.com>; Thu, 07 Mar 2019 13:51:12 -0800 (PST)
X-Va-A:
X-Va-T-CD: 46089963636650ba3f6b170c8994862d
X-Va-E-CD: 353f9aa2df9cb9d4362509d918922964
X-Va-R-CD: 3d4eee51cb88ed36173c756672172d4a
X-Va-CD: 0
X-Va-ID: cf4751d7-e1ee-484a-93ed-ed0f02bf9948
X-V-A:
X-V-T-CD: 46089963636650ba3f6b170c8994862d
X-V-E-CD: 353f9aa2df9cb9d4362509d918922964
X-V-R-CD: 3d4eee51cb88ed36173c756672172d4a
X-V-CD: 0
X-V-ID: 0ebcd53f-85df-4af7-b6a8-de426d048087
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-03-07_13:,, signatures=0
Received: from [17.230.129.183] (unknown [17.230.129.183]) by nwk-mmpp-sz12.apple.com (Oracle Communications Messaging Server 8.0.2.3.20181024 64bit (built Oct 24 2018)) with ESMTPSA id <0PO00041PNDBYQ90@nwk-mmpp-sz12.apple.com>; Thu, 07 Mar 2019 13:51:11 -0800 (PST)
Sender: youenn@apple.com
From: youenn fablet <yfablet@apple.com>
In-reply-to: <C069934A-C5ED-48CA-A857-AE457A3566D3@bangj.com>
Date: Thu, 07 Mar 2019 13:51:11 -0800
Cc: draft-ietf-rtcweb-mdns-ice-candidates.authors@ietf.org, dnssd <dnssd@ietf.org>
Content-transfer-encoding: quoted-printable
Message-id: <BB5F54A4-FEC9-4985-B5F3-7660AC312D2E@apple.com>
References: <C069934A-C5ED-48CA-A857-AE457A3566D3@bangj.com>
To: Tom Pusateri <pusateri@bangj.com>
X-Mailer: Apple Mail (2.3445.104.2)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-03-07_13:, , signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnssd/dnIWEq2-baJNl1-UJ_wiRvsDVZs>
Subject: Re: [dnssd] draft-ietf-rtcweb-mdns-ice-candidates-02 feedback
X-BeenThere: dnssd@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion of extensions to DNS-based service discovery for routed networks." <dnssd.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnssd>, <mailto:dnssd-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnssd/>
List-Post: <mailto:dnssd@ietf.org>
List-Help: <mailto:dnssd-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnssd>, <mailto:dnssd-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Mar 2019 21:51:21 -0000

Hi Tom,


Thanks for the feedback.
Please find some comments inline,
	Y

> On Feb 17, 2019, at 12:13 PM, Tom Pusateri <pusateri@bangj.com> wrote:
> 
> While this document is an RTCWEB document, it’s more about mDNS and so I’m going to give feedback directly to the authors and the DNS-SD group instead of the RTCWEB group (which I’m not a member). If the authors want to replicate this discussion on RTCWEB, please do so.

It is at a RTCWeb/ICE/DNS-SD crossing point.
Wherever that document goes, I think it is good to get feedback from all groups.

> 
> Overall, it’s an interesting idea and I think it could work ok. However, I think presentation around ICE, while motivating the idea, is not necessary for a general purpose third party mDNS name aliasing mechanism. I would remove all references to ICE, WebRTC, TURN, etc. and just make a simple mDNS third party name alias registration document.

I think the scope of this proposal is narrower than your interpretation.
A device may want to not expose its own private IP address to a web page.
In that case, it will register a MDNS name for its own private IP address and disclose the MDNS name to the web page instead of its IP address.
While the idea is interesting and potentially useful, I think the ability of a device to register names for other device IP addresses is out of scope of this particular document.

> 
> As part of that, you need to discuss defending the name and responding to queries for the name since the owner of the IP address will not do this.
> 
> Section 3.1
> ===========
> 
> List Item 1:
> 
> Someone familiar with mDNS would interpret this as an existing registered mDNS host name. I don’t think that’s what this means. I think this means an existing RFC 4122 unique name as described further down in the document.
> 
> List Item 3:
> 
> This makes it seem like normal mDNS is occurring here when it’s really a 3rd party form of mDNS. So you’re not really following RFC 6762. I don’t think there’s necessarily a problem with 3rd party registrations but don’t point people to RFC 6762 for that. In fact, you’re extending RFC 6762 and you need to describe in more detail how you’re extending it.

This document might need clarification on that point: the IP address that is registered is always from the device doing the MDNS registration.
Discussion is ongoing at https://github.com/rtcweb-wg/mdns-ice-candidates/issues/94 on how to best clarify this.

> 3rd last paragraph:
> 
> "with both IPv4 and IPv6 addresses MUST expose a different mDNS name for each address."
> 
> Again, you’re talking about RFC 4122 unique names, not regular mDNS names as provided by a host. This should be made more clear since it would be common for an mDNS host to use the same name for IPv4 and IPv6.
> 
> 
> Section 4
> =========
> 
> 2nd paragraph:
> 
> When more than one IPv4 or more than one IPv6 address is present, it seems like it would be better to first prefer an address that is on a shared network instead of always taking the first one (which doesn’t mean anything in DNS). If you want others to use the same address you should prefer the lowest one or the highest one or something sortable instead of the first one which could be different depending on hashing in a cache.

Right, we could try to make a better suggestion here, as long as it remains simple.
Discussion is ongoing at https://github.com/rtcweb-wg/mdns-ice-candidates/issues/93.

> 
> Thanks,
> Tom
> 
>