Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new draft: Christer's comments - corrected version
Youenn Fablet <youenn@apple.com> Tue, 25 May 2021 07:52 UTC
Return-Path: <youenn@apple.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 2C8F93A1991;
Tue, 25 May 2021 00:52:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.795
X-Spam-Level:
X-Spam-Status: No, score=-7.795 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.698, DKIM_SIGNED=0.1,
DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,
HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001,
RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001]
autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id NmUeB-sRdy_l; Tue, 25 May 2021 00:52:47 -0700 (PDT)
Received: from ma1-aaemail-dr-lapp02.apple.com
(ma1-aaemail-dr-lapp02.apple.com [17.171.2.68])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id 588033A1990;
Tue, 25 May 2021 00:52:45 -0700 (PDT)
Received: from pps.filterd (ma1-aaemail-dr-lapp02.apple.com [127.0.0.1])
by ma1-aaemail-dr-lapp02.apple.com (8.16.0.42/8.16.0.42) with SMTP id
14P7lx3U009793; Tue, 25 May 2021 00:52:44 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com;
h=from : message-id :
content-type : mime-version : subject : date : in-reply-to : cc : to :
references; s=20180706; bh=MuGTYwbBm6PwuilG/ughefqcVJzG+Z/hP9qaOoncVa4=;
b=X7zJpR+MIQR7cm0WZSSjXa2+nq1UN2oRnXh8ZTpqKAMYd/M3a56vnJOIIW8vVeU2VKBV
J7fQhVrALqhkMs+rHjwNBhs9t0q51z5EaAn9uWUAm4mPbbj0O7iq19IFVp9/0a79Fgzk
HfcgNuebnPaMsSKl7ZLOxm01mmtd0U5RR6jVz46N57iFon5qKLBdmowTxmbr1Y7P52/q
5bOfspBuO3Qb0KxDHZWPG2jLvtwzy4JDfHzSSGu/bTVZ0n6JRv+vQwk+WtrKPZcNHdeU
i2nIBwEoHxp4qiJv8b8bm18dr7OxL71wTzirFexhfqpC1EnpSXVRfrfxfHoNTxFaaU3M tQ==
Received: from crk-mailsvcp-mta-lapp02.euro.apple.com
(crk-mailsvcp-mta-lapp02.euro.apple.com [17.66.55.14])
by ma1-aaemail-dr-lapp02.apple.com with ESMTP id 38pxmufkgd-2
(version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO);
Tue, 25 May 2021 00:52:44 -0700
Received: from crk-mailsvcp-mmp-lapp03.euro.apple.com
(crk-mailsvcp-mmp-lapp03.euro.apple.com [17.72.136.17])
by crk-mailsvcp-mta-lapp02.euro.apple.com
(Oracle Communications Messaging Server 8.1.0.9.20210415 64bit (built Apr 15
2021))
with ESMTPS id <0QTN00KCBKJVKK00@crk-mailsvcp-mta-lapp02.euro.apple.com>; Tue,
25 May 2021 08:52:43 +0100 (IST)
Received: from process_milters-daemon.crk-mailsvcp-mmp-lapp03.euro.apple.com by
crk-mailsvcp-mmp-lapp03.euro.apple.com
(Oracle Communications Messaging Server 8.1.0.7.20201203 64bit (built Dec 3
2020)) id <0QTN00D00KGGQP00@crk-mailsvcp-mmp-lapp03.euro.apple.com>; Tue,
25 May 2021 08:52:43 +0100 (IST)
X-Va-A:
X-Va-T-CD: c6c0b6fc8dc65844d892ca4335c3b653
X-Va-E-CD: 815eef94e9b79f8375ac29c60f1552b6
X-Va-R-CD: 7639976490fbda6f20cdaeb58fdd5179
X-Va-CD: 0
X-Va-ID: 105e608c-b181-44a9-9b3c-5201a5c9372a
X-V-A:
X-V-T-CD: c6c0b6fc8dc65844d892ca4335c3b653
X-V-E-CD: 815eef94e9b79f8375ac29c60f1552b6
X-V-R-CD: 7639976490fbda6f20cdaeb58fdd5179
X-V-CD: 0
X-V-ID: cfe3c626-21e2-42df-8102-3662aa0f89b0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761
definitions=2021-05-25_03:2021-05-24,
2021-05-25 signatures=0
Received: from smtpclient.apple ([17.235.193.113])
by crk-mailsvcp-mmp-lapp03.euro.apple.com
(Oracle Communications Messaging Server 8.1.0.7.20201203 64bit (built Dec 3
2020))
with ESMTPSA id <0QTN00WC0KJTRL00@crk-mailsvcp-mmp-lapp03.euro.apple.com>;
Tue, 25 May 2021 08:52:43 +0100 (IST)
From: Youenn Fablet <youenn@apple.com>
Message-id: <0DE13BAA-1F65-4876-AA0E-4F491A606877@apple.com>
Content-type: multipart/alternative;
boundary="Apple-Mail=_1084FC00-013B-4822-97B8-2A57CD3A2847"
MIME-version: 1.0 (Mac OS X Mail 14.0 \(3654.100.0.2.11\))
Date: Tue, 25 May 2021 09:52:41 +0200
In-reply-to: <AM0PR07MB3860453DCCB6278DD57BF27093299@AM0PR07MB3860.eurprd07.prod.outlook.com>
Cc: Youenn Fablet <youenn=40apple.com@dmarc.ietf.org>,
mmusic WG <mmusic@ietf.org>
To: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org>
References: <AM0PR07MB3860453DCCB6278DD57BF27093299@AM0PR07MB3860.eurprd07.prod.outlook.com>
X-Mailer: Apple Mail (2.3654.100.0.2.11)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761
definitions=2021-05-25_03:2021-05-24,
2021-05-25 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/FO3px92mgtqCf40aVrlO8PP3Duo>
Subject: Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new draft: Christer's
comments - corrected version
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>,
<mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>,
<mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 May 2021 07:52:51 -0000
Thanks for the review, Based on your review, I filed two issues at https://github.com/rtcweb-wg/mdns-ice-candidates <https://github.com/rtcweb-wg/mdns-ice-candidates> Please see below for some answers. > On 21 May 2021, at 19:49, Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org> wrote: > > It seems like I added some of the Q4 text to Q3. Here is a corrected version of my question: > > Q1: > > I think it needs to be more clear that mDNS domain names (.local) can only be resolved by remote peers within the same local network. Right, this is a (useful) restriction from mDNS though mDNS extensions could potentially alleviate this. We might want to say this explicitly and detail that host candidates are useful for peers in the same local network as well. I filed https://github.com/rtcweb-wg/mdns-ice-candidates/issues/133 <https://github.com/rtcweb-wg/mdns-ice-candidates/issues/133>. > > Section 5.1 does talk about this, and it may be an implicit assumption, but I think it should be pointed out in the beginning of the document. > > --- > > Q2: > > Related to Q1, think it needs to be more clear that the mechanism prevents IP address leaking to peers outside the local network. Inside the local network I assume that web apps can still find out about the local address simply by performing an mDNS lookup on the mDNS domain name. Web apps cannot do mDNS lookups for privacy reasons. It is a good thing for privacy reasons that a web page does not have access to its local address without some form of user opt-in. > > --- > > Q3: > > The draft makes an assumption that the mDNS domain names are unique. Why making that assumption? If the local network supports multicast, there may even be non-WebRTC applications using mDNS, which increases the risk for collision. mDNS is supposed to handle name collision. This spec relies on the mDNS specification to handle such cases, which I think is the correct layering. > > --- > > Q4: > > Section 3.1.1 says that an ICE agent, when it gathers candidates, generates a UNIQUE mDNS domain name. I assume that means that the mDNS domain name will only be valid for the duration of the ICE session. For the lifetime of the ICE agent, this may be more than the ICE session. Though there is no hard requirement, section 3.3.3 states that mDNS domain name lifetime should be scoped by the lifetime of the web page (agents are free to be stricter than that). > > Doesn't that mean that there is no need for other ICE agents to cache the mDNS domain name:IP address mapping for "future use", because the mDNS domain name won't be used in future anyway? The idea is for ICE agents to keep alive their own mDNS name as long as needed. ICE agents should not try to buffer other ICE candidate mDNS:IP mapping. This is an optimization that should be left to the mDNS layer. > > Also, I am not sure whether ICE implementations should cache mappings to begin with. That's the task of the mDNS client of the host. Agreed. > > --- > > Q5: > > Section 5.3 says: > > "When an endpoint that supports mDNS communicates with an endpoint that does not, the legacy > endpoint will still provide its local IP addresses, and accordingly a direct connection can still be attempted, > even though the legacy endpoint cannot resolve the mDNS names provided by the new endpoint." > > Please make it more clear that the legacy endpoint is the one that does not support mDNS. Something like: > > "When an endpoint that supports mDNS communicates with a legacy endpoint that does not, the..." I filed https://github.com/rtcweb-wg/mdns-ice-candidates/issues/134 <https://github.com/rtcweb-wg/mdns-ice-candidates/issues/134>. > > --- > > Q6: > > If I remember correctly, people have raised issues with legacy parsers not being able to parse non-IP-addresses. If so, shouldn't that be mentioned in Section 5.3? > > (NOTE: Eventhough the draft updates RFC 8839, to support mDNS domain names, it does not solve the issue for legacy parsers.) In practice, deployment has not seen this issue, maybe because legacy parsers are not widely used in mode 3 applications, i.e. applications that do not access to any camera/microphone. It seems fine mentioning legacy parsers in the document. Let’s handle it in the same issue as above, https://github.com/rtcweb-wg/mdns-ice-candidates/issues/134 <https://github.com/rtcweb-wg/mdns-ice-candidates/issues/134>. > > --- > > Q7: > > The draft does not give any guidance regarding how long an ICE agent can safely cache an mDNS Are you referring to remote mDNS mapping? If so, I think we want to leave caching to the mDNS layer. > > --- > > Regards, > > Christer Thanks again for the review. > > _______________________________________________ > mmusic mailing list > mmusic@ietf.org > https://www.ietf.org/mailman/listinfo/mmusic
- Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new … Christer Holmberg
- Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new … Youenn Fablet
- Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new … Justin Uberti
- Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new … Christer Holmberg