Re: [tram] Last Call: <draft-ietf-tram-auth-problems-02.txt> (Problems with STUN long-term Authentication for TURN) to Informational RFC

Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com> Sun, 20 July 2014 16:11 UTC

Return-Path: <spencerdawkins.ietf@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EE071B2C7E; Sun, 20 Jul 2014 09:11:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q8oRsgjY0cvA; Sun, 20 Jul 2014 09:11:17 -0700 (PDT)
Received: from mail-lb0-x229.google.com (mail-lb0-x229.google.com [IPv6:2a00:1450:4010:c04::229]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 956281B2C80; Sun, 20 Jul 2014 09:11:16 -0700 (PDT)
Received: by mail-lb0-f169.google.com with SMTP id s7so4159537lbd.0 for <multiple recipients>; Sun, 20 Jul 2014 09:11:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=prN+1z/9CZOs3UnZ5EgXhKOXql6HidR4mQ/SmPXaGCQ=; b=eEqFZhUU0D5cEVCt291gwtrbARCiaasNe0/urG9HpfA5tnasxhEvg3zRCEYgZ/KIr+ NAuiaSwUe70BuKH055kpNJtf0NFVmZ9bY6Rd9USTrNeACm1t8ivX59Nky7J3BOPqTYjy v6oPIUa1pB5Ql6ATuzl4IUUDehM2f3/KGVPCuTjQIJbJhVZK/MzkDUufPuOsOBtWj0sj HyTFZHIBGRzJ28dFbCHlwv78X4beANGuu6+EWnShZO2avjJcSk2Wz5pmSmGMoqjJ5Dbj jJcLZYCOTVzeeGbGABeG2T364XkaJyVos0XGX/bX392kKVstnYz1Ud1P7iPEgfdT3miE Y8VA==
MIME-Version: 1.0
X-Received: by 10.112.131.202 with SMTP id oo10mr18608929lbb.65.1405872674680; Sun, 20 Jul 2014 09:11:14 -0700 (PDT)
Received: by 10.152.2.99 with HTTP; Sun, 20 Jul 2014 09:11:14 -0700 (PDT)
Received: by 10.152.2.99 with HTTP; Sun, 20 Jul 2014 09:11:14 -0700 (PDT)
In-Reply-To: <20140718142151.27364.11743.idtracker@ietfa.amsl.com>
References: <20140718142151.27364.11743.idtracker@ietfa.amsl.com>
Date: Sun, 20 Jul 2014 11:11:14 -0500
Message-ID: <CAKKJt-cDV69kjP-8Kg9tOYVsO9vTEcB3Yec1deUt00FHs-j6tw@mail.gmail.com>
Subject: Re: [tram] Last Call: <draft-ietf-tram-auth-problems-02.txt> (Problems with STUN long-term Authentication for TURN) to Informational RFC
From: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
To: ietf@ietf.org
Content-Type: multipart/alternative; boundary="047d7b3441785fb7f904fea23d19"
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/xUx6ohd8I5rineJ_CXABKIQ-u7c
Cc: tram@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 20 Jul 2014 16:11:19 -0000

I had a small number of nits that weren't worth holding up IETF Last Call
for. Please consider them along with other feedback you receive.

Thanks!

In this text:

1.  Introduction

   Traversal Using Relay NAT (TURN) [RFC5766] is a protocol that is
   often used to improve the connectivity of P2P applications (as
   defined in section 2.7 of [RFC5128]).  TURN ensures that a connection
                                               ^^^^^^^
Is this the right word? ("Does it work every time?")

   can be established even when one or both sides is incapable of a
   direct P2P connection.  The TURN server is also a a building block to
   support interactive, real-time communication using audio, video,
   collaboration, games, etc., between two peer web browsers using the
   Web Real-Time communication (WebRTC) [I-D.ietf-rtcweb-overview]
   framework.

...

   o  Enterprise networks deploy firewalls which typically block UDP
      traffic.  When SIP user agents or WebRTC endpoints are deployed
      behind such firewalls, media cannot be sent over UDP across the
      firewall, but must be sent using TCP (which causes a different
      user experience).  In such cases a TURN server deployed in the
      DeMilitarized Zone (DMZ) MAY be used to traverse firewalls.
                               ^^^
I'm thinking that's not an RFC 2119 MAY. I'm thinking that's "might".

   o  The use-case explained in "Simple Video Communication Service,
      enterprise aspects" (Section 3.2.5 of
      [I-D.ietf-rtcweb-use-cases-and-requirements]) refers to deploying
      a TURN server in the DMZ to audit all media sessions from inside
      an Enterprise premises to any external peer.

...

   o  ICE connectivity checks using server reflexive candidates could
      ^^^
      fail when the endpoint is behind NAT that performs Address-
                                                         ^^^^^^^^
      dependent mapping.  In such cases relayed candidate allocated from
      ^^^^^^^^^^^^^^^^^
      the TURN server is used for media.

I'm thinking references for ICE and for "Address-dependent mapping" would
be helpful. The next usage of ICE does have a reference, so that's just
moving the reference to first-use-of-term.

   Compared to a Binding request the Allocate request is more likely to
   ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
   be identified by a server administrator as needing client
   authentication and integrity protection of messages exchanged.
   Hence, the issues discussed here in STUN authentication are
   applicable mainly in the context of TURN messages.

This might be clearer as "An Allocate request is more likely than a Binding
request to ..."

...

4.  Problems with STUN long-term Authentication for TURN

   6.  Hosting multiple realms on a single IP address is challenging
       with TURN.  When a TURN server needs to send the REALM attribute
       in response to an unauthenticated request, it has no useful
       information for determining which realm it should send, except
                                                         ^^^^
       the source transport address of the TURN request.  Note this is a
       problem with multi-tenant scenarios only.  This may not be a
       problem when TURN server is located in enterprise premises.

This might be clearer as "it should send the response to".