Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates-01 Nils review

Youenn Fablet <youenn@apple.com> Mon, 14 June 2021 13:54 UTC

Return-Path: <youenn@apple.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45AB63A253E for <mmusic@ietfa.amsl.com>; Mon, 14 Jun 2021 06:54:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.797
X-Spam-Level:
X-Spam-Status: No, score=-2.797 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.698, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fxPLxKQ91bUe for <mmusic@ietfa.amsl.com>; Mon, 14 Jun 2021 06:54:33 -0700 (PDT)
Received: from rn-mailsvcp-ppex-lapp35.apple.com (rn-mailsvcp-ppex-lapp35.rno.apple.com [17.179.253.44]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C31323A253D for <mmusic@ietf.org>; Mon, 14 Jun 2021 06:54:33 -0700 (PDT)
Received: from pps.filterd (rn-mailsvcp-ppex-lapp35.rno.apple.com [127.0.0.1]) by rn-mailsvcp-ppex-lapp35.rno.apple.com (8.16.1.2/8.16.1.2) with SMTP id 15EDkvDs028899; Mon, 14 Jun 2021 06:54:32 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=apple.com; h=from : message-id : content-type : mime-version : subject : date : in-reply-to : cc : to : references; s=20180706; bh=doTKpDarTYUnxlZ7l12UrkNNMqr8xWjrNgFljZnOQnY=; b=aHr+rsLAO76sBJatTVtlY+kHY8zyFhFRO77+W+C3lUYF+skTZ4e10i0yGvD9A/50PNx0 Ulen4N5+zBj/7wLmyZZEZkYBDUtgiZBECHHHqhjIZ8XE+/Li0OYNmlIQ8E1K06vg9wJh PXRpkeMrCKWKfvtUPBkeT1ERSK3aeEmJbf6pNTzUwiDCBngXUJby0MuGGrh6OV2HonUX KiEnREzyQbg/d31rIUllwOZFEqVR/gCV2Tmnio+cgcPUhef0BXIy/mL3WgwDdQGDpVkC Ckw/tYEWnx+sdDzUkrIbZbiCskJS6NMnMOcbPHzQPkS4kK+k1ua+3bvRfBeYsGLFuoBS VA==
Received: from crk-mailsvcp-mta-lapp04.euro.apple.com (crk-mailsvcp-mta-lapp04.euro.apple.com [17.66.55.17]) by rn-mailsvcp-ppex-lapp35.rno.apple.com with ESMTP id 394rf7f0pc-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Mon, 14 Jun 2021 06:54:32 -0700
Received: from crk-mailsvcp-mmp-lapp03.euro.apple.com (crk-mailsvcp-mmp-lapp03.euro.apple.com [17.72.136.17]) by crk-mailsvcp-mta-lapp04.euro.apple.com (Oracle Communications Messaging Server 8.1.0.9.20210415 64bit (built Apr 15 2021)) with ESMTPS id <0QUP00PGA2MVC400@crk-mailsvcp-mta-lapp04.euro.apple.com>; Mon, 14 Jun 2021 14:54:31 +0100 (IST)
Received: from process_milters-daemon.crk-mailsvcp-mmp-lapp03.euro.apple.com by crk-mailsvcp-mmp-lapp03.euro.apple.com (Oracle Communications Messaging Server 8.1.0.9.20210415 64bit (built Apr 15 2021)) id <0QUP00O002FJ6100@crk-mailsvcp-mmp-lapp03.euro.apple.com>; Mon, 14 Jun 2021 14:54:31 +0100 (IST)
X-Va-A:
X-Va-T-CD: ee77d722b3813ac52d8aa093281b177c
X-Va-E-CD: b7be588f5431b655f1286d056d939a23
X-Va-R-CD: 7fd6b3de04c33d1d4a09769579ddbc68
X-Va-CD: 0
X-Va-ID: bc1d4ae0-4eaf-49b5-9c6c-4a005979b88b
X-V-A:
X-V-T-CD: ee77d722b3813ac52d8aa093281b177c
X-V-E-CD: b7be588f5431b655f1286d056d939a23
X-V-R-CD: 7fd6b3de04c33d1d4a09769579ddbc68
X-V-CD: 0
X-V-ID: 0c760be5-9b21-407c-895e-0cb7b3638b8d
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761 definitions=2021-06-14_09:2021-06-14, 2021-06-14 signatures=0
Received: from smtpclient.apple ([17.232.74.203]) by crk-mailsvcp-mmp-lapp03.euro.apple.com (Oracle Communications Messaging Server 8.1.0.9.20210415 64bit (built Apr 15 2021)) with ESMTPSA id <0QUP00J5J2MTHO00@crk-mailsvcp-mmp-lapp03.euro.apple.com>; Mon, 14 Jun 2021 14:54:30 +0100 (IST)
From: Youenn Fablet <youenn@apple.com>
Message-id: <3A146EB6-C6D8-409A-AD21-E00CEB025625@apple.com>
Content-type: multipart/alternative; boundary="Apple-Mail=_2ACF92CF-5BE7-4978-81F5-13C6298E60BA"
MIME-version: 1.0 (Mac OS X Mail 14.0 \(3654.100.0.2.22\))
Date: Mon, 14 Jun 2021 15:54:28 +0200
In-reply-to: <36FE2802-0DB4-4AD3-8D02-266602F989BE@8x8.com>
Cc: mmusic <mmusic@ietf.org>
To: Nils Ohlmeier <nils.ohlmeier@8x8.com>
References: <36FE2802-0DB4-4AD3-8D02-266602F989BE@8x8.com>
X-Mailer: Apple Mail (2.3654.100.0.2.22)
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.761 definitions=2021-06-14_09:2021-06-14, 2021-06-14 signatures=0
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/Or5dJOGxjBxs7iVhZxkvemkrNZ0>
Subject: Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates-01 Nils review
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Jun 2021 13:54:38 -0000

Thanks a lot for the review, Nils.
I filed https://github.com/rtcweb-wg/mdns-ice-candidates/issues/135 <https://github.com/rtcweb-wg/mdns-ice-candidates/issues/135> to keep track of your feedback and work on updating the draft accordingly.
Some comments inline.


> On 8 Jun 2021, at 22:31, Nils Ohlmeier <nils.ohlmeier@8x8.com> wrote:
> 
> Hello,
> 
> I was asked to review https://datatracker.ietf.org/doc/html/draft-ietf-mmusic-mdns-ice-candidates-01 <https://datatracker.ietf.org/doc/html/draft-ietf-mmusic-mdns-ice-candidates-01>
> Here are my comment and questions:
> 
> Abstract:
> “To maximize the probability of a
>    direct peer-to-peer connection, client private IP addresses are
>    included in this candidate collection.”
> 
> I think it would make sense to replace “client” with ICE agent here, as client and server in the pure ICE context doesn’t make too much sense. I would suggest to change it to “..., private IP addresses of the ICE agent are included…”.
> 
Makes sense.
> 
> In the abstract the terms “private IP addresses” and “local IP addresses” are used. I would suggest sticking to just one term for consistency. Section 1. “Introduction” has the same mix of local vs private in it.
> 

OK, I would go with private IP addresses, following RFC1918.
> 
> Section 3.1.1 point 1
> I think it would be helpful if this draft at least offers the suggestion to replace all RFC1918 addresses, or put a reference to section 3.1.2.2 as a recommendation on how to determine which addresses to replace.
> 

We can add some more wording and refer both to section 3.1.2.2 as well as ICE agent modes.
> 
> Section 3.1.2.2 3rd paragraph
> “Regardless of results, …” confuses me. The last sentence in the paragraph before talks about the case of a public candidate. If I’m not mistaken in the case of a public address there shouldn’t be a server reflexive candidate generated.
> 
The idea is to generate a mDNS candidate for any host address.
That way, we do not need to wait for the STUN response to expose the mDNS candidate.

If there are STUN servers, this mDNS candidate gets complemented by a SRFLX candidate.
- In case the host address is private, this is useful to expose the public address as a SRFLX candidate.
- In case the host address is public, the mDNS candidate will probably not help and the SRFLX candidate will ensure connection setup.

I guess we could try to clarify the wording so it gets clearer.

> Section 3.1.2.2 4th paragraph
> While I agree that caching the result might be useful it can become dangerous in case the set of STUN servers changes. As the new STUN servers might return different results, cached results should be invalidated. Would it be worth adding a warning about this?
> 
Right, it makes sense to do so.
> Section 6.4
> I’m confused by the diagram showing that both agents send over their mDNS candidates before having checked with the STUN server if the interface IP addresses need to be filtered or not. I understand that section 3.1.2.2 recommends to first wait for the STUN binding response from the STUN server before deciding which addresses should be filtered and which not. Why is this example showing it differently?
> 
Section 3.1.2.2 does not really recommend to wait for the STUN binding responses.
It is up to the ICE agent to decide whether to limit generation of mDNS candidates or not to only when actually useful.

> Best regards
>   Nils Ohlmeier
> _______________________________________________
> mmusic mailing list
> mmusic@ietf.org
> https://www.ietf.org/mailman/listinfo/mmusic