Re: [MMUSIC] FQDN Support Final Vote

Roman Shpount <roman@telurix.com> Fri, 24 May 2019 23:29 UTC

Return-Path: <roman@telurix.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 479D91200F5 for <mmusic@ietfa.amsl.com>; Fri, 24 May 2019 16:29:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.888
X-Spam-Level:
X-Spam-Status: No, score=-1.888 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=telurix-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w9Uph1FjMqf4 for <mmusic@ietfa.amsl.com>; Fri, 24 May 2019 16:28:57 -0700 (PDT)
Received: from mail-pl1-x630.google.com (mail-pl1-x630.google.com [IPv6:2607:f8b0:4864:20::630]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B84B312004A for <mmusic@ietf.org>; Fri, 24 May 2019 16:28:57 -0700 (PDT)
Received: by mail-pl1-x630.google.com with SMTP id w7so4736428plz.1 for <mmusic@ietf.org>; Fri, 24 May 2019 16:28:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telurix-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=/Lv6+2aN9GuugjQ3nGFl1EW89lVgtrd16fo68pStfK4=; b=f736M+FPMKQ3YkkQWXZ3wXpQokQGcv3r/fy/F2sqc6tx1qpnGHP1kdIurTuTK2iQli ysFEIwSSmQDt1N8azimrb+PZaEXtoB0c570GVolapnS1IJ2ulMnwCA/17RIuWX//XTX4 8Jvd7+qi01IVpma+8AYIGPJLVCXjrq/Eoo02WE1p3zEZ6wPtoDKBne8/T+wDyHV/RcaJ yr8oERBp/hBf0ujJXv1j6QO08F7Hpv9qRinx8KxLInqXVXURulJjZ5Gt0WBVqFXcA/rE 6CThBOolIk+FTL+hoMyCTd+IGDfoWbaV89JNe/RMxIKh3PYQuJfJDJxrPO7x6QC3v+qB L3PA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=/Lv6+2aN9GuugjQ3nGFl1EW89lVgtrd16fo68pStfK4=; b=UoJhUgjik6zguVfvdjKNNMM/RY9cfbD9+xavxJWQ0meUBBU9YgLFdeSpHfT59LKAtB XHx1Vclhr0kwPPoXbGJPhY4ZfM0TWsYoUaTi8RRd5BmSyezf+t5NlgEd/u1u0i8rjPZ/ P5uRA6g/UOqE0His4ZHVr3Oau3xwRkoPNdadsWR7Kfq3lyajfgNOCK6jcZ3lMxZYE3lX 9g76C3spoUe5z5KZySzlZSVDQuvxBvBkV8qjN1gQGCuTPl6ROVvSeQhJFYA1TX/wt5Ql xFBSDFTW60MNyCZCxJiH31UvPyGnDx5aItJOlNPz0nK4ak+xeXwPEdT3gCWcK737rTwR ijlQ==
X-Gm-Message-State: APjAAAXWmhZrqWpfUfOAD6rpk2sZL0BkqWdZQ9FgDRg2v8GHk3IdYKjW EKMWXRRiuS2ZzrFpShFO7ta5/4FA/vc=
X-Google-Smtp-Source: APXvYqzi8YXEqjag4E1AtxtEp3za8qi4BVmwRzVu+GBhMaMQ6QR5LzBOYP6b/1OjOOehe/GCv+3eUQ==
X-Received: by 2002:a17:902:7883:: with SMTP id q3mr35651437pll.89.1558740536840; Fri, 24 May 2019 16:28:56 -0700 (PDT)
Received: from mail-pg1-f180.google.com (mail-pg1-f180.google.com. [209.85.215.180]) by smtp.gmail.com with ESMTPSA id c185sm4086541pfc.64.2019.05.24.16.28.55 for <mmusic@ietf.org> (version=TLS1_3 cipher=AEAD-AES128-GCM-SHA256 bits=128/128); Fri, 24 May 2019 16:28:56 -0700 (PDT)
Received: by mail-pg1-f180.google.com with SMTP id n27so5831651pgm.4 for <mmusic@ietf.org>; Fri, 24 May 2019 16:28:55 -0700 (PDT)
X-Received: by 2002:a63:f44f:: with SMTP id p15mr108636561pgk.65.1558740535695; Fri, 24 May 2019 16:28:55 -0700 (PDT)
MIME-Version: 1.0
References: <CAMRcRGRnKRNL9t+c6AQ7L+vszaPrJvAuwVG6BhUuJovBRuc=NA@mail.gmail.com> <CAOW+2dtgBASYp7hbrj8rcC+bUWjmxQLxLfdYr0sMtdkTSsXo+w@mail.gmail.com> <5c44aa14-523d-a797-0002-7bf828585788@cisco.com> <B2BA676E-19D7-4C99-9059-0D0BAA256171@ericsson.com> <20e7ae31-4633-4851-1ae2-d755dfb66acc@cisco.com> <HE1PR07MB31613305D6274FD9526F2A9B93020@HE1PR07MB3161.eurprd07.prod.outlook.com> <d8abb288-0289-ea69-9709-72252fc8b10a@cisco.com> <214C40AA-6E58-4EB6-A707-52C4C42B582F@ericsson.com> <CAD5OKxsFNgMazmywxvCzZGjkuO5e5dTr=2fBX-2wJvTm7X95nw@mail.gmail.com> <CAMRcRGQDFP=XQCm2joR9HTLYnT1oJR-C_LndkkTn7unUsp0N=g@mail.gmail.com>
In-Reply-To: <CAMRcRGQDFP=XQCm2joR9HTLYnT1oJR-C_LndkkTn7unUsp0N=g@mail.gmail.com>
From: Roman Shpount <roman@telurix.com>
Date: Fri, 24 May 2019 19:28:47 -0400
X-Gmail-Original-Message-ID: <CAD5OKxsAz4jRFW605nBehc0uSBCx0A3OEV_X1gXN-JU8vvJwgA@mail.gmail.com>
Message-ID: <CAD5OKxsAz4jRFW605nBehc0uSBCx0A3OEV_X1gXN-JU8vvJwgA@mail.gmail.com>
To: Suhas Nandakumar <suhasietf@gmail.com>
Cc: Bernard Aboba <bernard.aboba@gmail.com>, Christer Holmberg <christer.holmberg@ericsson.com>, Flemming Andreasen <fandreas@cisco.com>, mmusic WG <mmusic@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000ed61770589aa8ffa"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/THTmQIHI0dLl08dxwry8USxiG7s>
Subject: Re: [MMUSIC] FQDN Support Final Vote
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 May 2019 23:29:00 -0000

Suhas,

I have created a pull request on top of the mismatch branch:
https://github.com/suhasHere/ice-sip-sdp/pull/3

New language in ICE Verification procedures is:

The transport address from the peer for the default destination is an
FQDN.  Regardless of the procedures used to resolve FQDN or the
resolution result, this MUST not be considered as a ICE failure by the peer
agent and the ICE processing MUST continue as usual.

New language for connection address:

<connection-address>: :: is taken from RFC 4566 <<RFC4566>>. It is the IP
address of the candidate, allowing for IPv4 addresses, IPv6 addresses, and
fully qualified domain names (FQDNs).  When parsing this field, an agent
can differentiate  an IPv4 address and an IPv6 address by presence of a
colon in its value - the presence of a colon indicates IPv6.  An agent
generating local candidates MUST not use FQDN addresses. An agent
processing remote candidates MUST ignore candidate lines that include
candidates with FQDN or IP address
versions that are not supported or recognized.  The procedures for
generation and handling FQDN candidates, as well as, how agents indicate
support of such procedures, need to
be specified in an extension specification.

I have kept Christer's edits and, since we provide no guidance on how to do
this, I added extra language that agents must not use FQDN when generating
local candidates.

Regards,
_____________
Roman Shpount


On Fri, May 24, 2019 at 6:42 PM Suhas Nandakumar <suhasietf@gmail.com>
wrote:

> Thanks Roman .. just to ensure we are all on same page . Would you be ok
> to create a new PR for FdN support from yours and Christers proposal  . We
> will have one place to approve it and get it merged
>
> Please let me know
>
> Thanks
> Suhas
>
> On Sat, May 25, 2019 at 3:17 AM Roman Shpount <roman@telurix.com> wrote:
>
>> On Fri, May 24, 2019 at 3:33 PM Christer Holmberg <
>> christer.holmberg@ericsson.com> wrote:
>>
>>> I am fine (and I have seen nobody object) to the following part of
>>> Roman's suggested text (with some modifications by myself), which is about
>>> discarding FQDN candidates:
>>>
>>> "<connection-address>: :: is taken from RFC 4566 <<RFC4566>>. It is the
>>> IP address of the candidate, allowing for IPv4 addresses, IPv6 addresses,
>>> and fully qualified domain names (FQDNs).  When parsing this field, an
>>> agent can differentiate  an IPv4 address and an IPv6 address by presence
>>> of a colon in its value - the presence of a colon indicates IPv6.  An
>>> agent processing remote candidates MUST ignore candidate lines that include
>>> candidates with FQDN or IP address versions that are not supported or
>>> recognized.  The procedures for handling FQDN candidates, and for agents
>>> to indicate support of such procedures, need to be specified in an
>>> extension specification."
>>>
>>
>> I am fine with this change.
>>
>>
>>> >> Now, in addition to that, Roman wants to cover FQDNs in c= lines. for
>>> “verification of ICE support”. If that is needed, could it be in a separate
>>> section and/or paragraph?
>>> > Can you please provide a concrete text suggestion that satisfies your
>>> concerns.
>>>
>>> The second part of Roman's text covered that:
>>>
>>> "If candidate with FQDN <connection-address> is the default
>>> destination/candidate, the "c=" address type MUST be set the IP address
>>> family for the
>>> FQDN DNS resolution result and the "c=" connection address MUST be set
>>> to FQDN. Differences in the "c=" line address family and type with FQDN
>>> resolution result MUST not cause ICE support verification failure."
>>>
>>> I had some problems to parse the text, but that is probably only
>>> editorial. But, I *think* Suhas raised some technical issues with it.
>>>
>>> One way could be to simply say that, if the c= line contains a FQDN, the
>>> agent simply does not look for a matching candidate. Because, if the agent
>>> is anyway going to discard FQDN candidates, why does it matter whether the
>>> c= line FQDN has a matching FQDN candidate?
>>>
>>>
>> I like this. let's just add an appropriate clause to the verifying ICE
>> support procedures.
>>
>> Current language in section 3.2.5 specifies:
>>
>> If this condition is not met, the agents MUST process the SDP based on
>> normal [RFC3264] procedures, without using any of the ICE mechanisms
>> described in the remainder of this specification with the few exceptions
>> noted below:
>>
>> 1.  The presence of certain application layer gateways MAY modify the
>> transport address information as described in Section 8.2.2.  The behavior
>> of the responding agent in such a situation is implementation defined.
>> Informally, the responding agent MAY consider the mismatched transport
>> address information as a plausible new candidate learnt from the peer and
>> continue its ICE processing with that transport address included.
>> Alternatively, the responding agent MAY include an "a=ice-mismatch"
>> attribute in its answer and MAY also omit a=candidate attributes for such
>> data streams.
>>
>> 2.  The transport address from the peer for the default destination
>> correspond to IP address values "0.0.0.0"/"::" and port value of "9".  This
>> MUST not be considered as a ICE failure by the peer agent and the ICE
>> processing MUST continue as usual.
>>
>> I would suggest adding:
>>
>> 3.  The transport address from the peer for the default destination is
>> an FQDN.  Regardless of the procedures used to resolve FQDN or the
>> resolution result, this MUST not be considered as a ICE failure by the peer
>> agent and the ICE processing MUST continue as usual.
>>
>>
>> If this is added the second part that Christer found confusing can be
>> removed.
>>
>> Regards,
>> _____________
>>
>> Roman Shpount
>>
>>
>