Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new draft: Christer's comments - corrected version
Justin Uberti <juberti@google.com> Tue, 25 May 2021 19:38 UTC
Return-Path: <juberti@google.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 2F9453A1ACB
for <mmusic@ietfa.amsl.com>; Tue, 25 May 2021 12:38:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.599
X-Spam-Level:
X-Spam-Status: No, score=-17.599 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1,
DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1,
ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001,
SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5,
USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
header.d=google.com
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id rxzH0pDviY5S for <mmusic@ietfa.amsl.com>;
Tue, 25 May 2021 12:38:27 -0700 (PDT)
Received: from mail-yb1-xb2b.google.com (mail-yb1-xb2b.google.com
[IPv6:2607:f8b0:4864:20::b2b])
(using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id A03AD3A1AC5
for <mmusic@ietf.org>; Tue, 25 May 2021 12:38:27 -0700 (PDT)
Received: by mail-yb1-xb2b.google.com with SMTP id y197so2957548ybe.11
for <mmusic@ietf.org>; Tue, 25 May 2021 12:38:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025;
h=mime-version:references:in-reply-to:from:date:message-id:subject:to
:cc; bh=5E0b7XOuvzl9NBC/zNMIJ/ws2JCjBkxR7Mxb4SsWzMs=;
b=ijZrmPV9HS645I7ynh11JjAk2q6d/Tc8v4sz/IqnhqCbCMadFN36eM0bTFoPeAB+Zr
BpGkCwyRkwDkgBU/g6Ku0SRZs9xoIQKibbDA8ICdU/HF5Lj9M73F4jZqIhkM+NvjUGkO
WxD4PdQzbIfZ29WGdjlcNLIsTFotr+xQOla1g4ddPrqUUBXmoOuqZh1gdxzjQCj8hjJF
NBmYjYBBoFXJ3J2O7nqS16pH5ktupLhQgEZb6AjAMQeQYLYyuFMopoNc9O1MhnaHTcHa
AZP+7VehVnpwnsau2XkM99GilbiR4bLHCJMcEefkxR1iIm8Rc9f6rT1UmAla5kd+iW0x
CslA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:mime-version:references:in-reply-to:from:date
:message-id:subject:to:cc;
bh=5E0b7XOuvzl9NBC/zNMIJ/ws2JCjBkxR7Mxb4SsWzMs=;
b=pvq+rffgjEep+iBJGYy8b0TbEl7MYVBhKGoWi3InDfoFYG4sm4kaIm3DOuZfw+viTo
+9s0YNZsx56eBoBEAULNp+R4uk0FNZoTTpkV4Y1d2UTakwhIenrYPABpHnTmHz5lVl0M
/Q5rvydPawzsuPsvy+LwX7g6/dWj56bd16Uys6aFnbOn+iIvVkW5TmyXrSVg9OHc1Kyg
QMj20OysyTT89pi30EPsEKwm62fIO54w+ltMJeX5V97E+o6tLLLZlfQAppKXld4PADzU
9bIdP2QZv7CtybGanVniihRggAWCuEwAaBEhNgMipQ9lXVJttdjAa7+y9zcCnZ8XsVOT
7hyg==
X-Gm-Message-State: AOAM533VQrHLKAK6hYdUdwmcX4ir3S9+8PMxq3oyEFDOrGwRgQ4aZjxe
mq5IOIV2bY2XISbZ+1BQ1fLqqTf2BiD1+ggVZTbhj2VfxT8=
X-Google-Smtp-Source: ABdhPJxu7hu/lhp/hn07f7JDWVNioaQ8sVINXJASVeZmmRDUJrHd3P8UGlJQt18DJrJst+dZqVdzaQ9vqe3Qw8Q35Z8=
X-Received: by 2002:a25:3342:: with SMTP id z63mr45886902ybz.46.1621971505041;
Tue, 25 May 2021 12:38:25 -0700 (PDT)
MIME-Version: 1.0
References: <AM0PR07MB3860453DCCB6278DD57BF27093299@AM0PR07MB3860.eurprd07.prod.outlook.com>
<0DE13BAA-1F65-4876-AA0E-4F491A606877@apple.com>
In-Reply-To: <0DE13BAA-1F65-4876-AA0E-4F491A606877@apple.com>
From: Justin Uberti <juberti@google.com>
Date: Tue, 25 May 2021 12:38:13 -0700
Message-ID: <CAOJ7v-2ACeC0q-L7RQ_g-c2Qz=xjfBTwh4CBeszORVKqP6X9Qg@mail.gmail.com>
To: Youenn Fablet <youenn=40apple.com@dmarc.ietf.org>
Cc: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org>,
mmusic WG <mmusic@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000065787505c32cab54"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/eepX4jD1s7dB5DBCZlQT_1iQslc>
Subject: Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new draft: Christer's
comments - corrected version
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>,
<mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>,
<mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 May 2021 19:38:31 -0000
On Tue, May 25, 2021 at 12:53 AM Youenn Fablet <youenn= 40apple.com@dmarc.ietf.org> wrote: > Thanks for the review, > > Based on your review, I filed two issues at > https://github.com/rtcweb-wg/mdns-ice-candidates > Please see below for some answers. > > On 21 May 2021, at 19:49, Christer Holmberg < > christer.holmberg=40ericsson.com@dmarc.ietf.org> wrote: > > It seems like I added some of the Q4 text to Q3. Here is a corrected > version of my question: > > Q1: > > I think it needs to be more clear that mDNS domain names (.local) can only > be resolved by remote peers within the same local network. > > > Right, this is a (useful) restriction from mDNS though mDNS extensions > could potentially alleviate this. > We might want to say this explicitly and detail that host candidates are > useful for peers in the same local network as well. > I filed https://github.com/rtcweb-wg/mdns-ice-candidates/issues/133. > > > Section 5.1 does talk about this, and it may be an implicit assumption, > but I think it should be pointed out in the beginning of the document. > > --- > > Q2: > > Related to Q1, think it needs to be more clear that the mechanism prevents > IP address leaking to peers outside the local network. Inside the local > network I assume that web apps can still find out about the local address > simply by performing an mDNS lookup on the mDNS domain name. > > > Web apps cannot do mDNS lookups for privacy reasons. > It is a good thing for privacy reasons that a web page does not have > access to its local address without some form of user opt-in. > > > --- > > Q3: > > The draft makes an assumption that the mDNS domain names are unique. Why > making that assumption? If the local network supports multicast, there may > even be non-WebRTC applications using mDNS, which increases the risk for > collision. > > > mDNS is supposed to handle name collision. > This spec relies on the mDNS specification to handle such cases, which I > think is the correct layering. > > > --- > > Q4: > > Section 3.1.1 says that an ICE agent, when it gathers candidates, > generates a UNIQUE mDNS domain name. I assume that means that the mDNS > domain name will only be valid for the duration of the ICE session. > > > For the lifetime of the ICE agent, this may be more than the ICE session. > Though there is no hard requirement, section 3.3.3 states that mDNS domain > name lifetime should be scoped by the lifetime of the web page (agents are > free to be stricter than that). > > > Doesn't that mean that there is no need for other ICE agents to cache the > mDNS domain name:IP address mapping for "future use", because the mDNS > domain name won't be used in future anyway? > > > The idea is for ICE agents to keep alive their own mDNS name as long as > needed. > ICE agents should not try to buffer other ICE candidate mDNS:IP mapping. > This is an optimization that should be left to the mDNS layer. > > > Also, I am not sure whether ICE implementations should cache mappings to > begin with. That's the task of the mDNS client of the host. > > > Agreed. > > > --- > > Q5: > > Section 5.3 says: > > "When an endpoint that supports mDNS communicates with an endpoint that > does not, the legacy > endpoint will still provide its local IP addresses, and accordingly a > direct connection can still be attempted, > even though the legacy endpoint cannot resolve the mDNS names provided > by the new endpoint." > > Please make it more clear that the legacy endpoint is the one that does > not support mDNS. Something like: > > "When an endpoint that supports mDNS communicates with a legacy > endpoint that does not, the..." > > > I filed https://github.com/rtcweb-wg/mdns-ice-candidates/issues/134. > > > --- > > Q6: > > If I remember correctly, people have raised issues with legacy parsers not > being able to parse non-IP-addresses. If so, shouldn't that be mentioned in > Section 5.3? > > (NOTE: Eventhough the draft updates RFC 8839, to support mDNS domain > names, it does not solve the issue for legacy parsers.) > > > In practice, deployment has not seen this issue, maybe because legacy > parsers are not widely used in mode 3 applications, i.e. applications that > do not access to any camera/microphone. > It seems fine mentioning legacy parsers in the document. > Let’s handle it in the same issue as above, > https://github.com/rtcweb-wg/mdns-ice-candidates/issues/134. > As long as the legacy parser doesn't blow up the session, this will work fine, as noted in the text. We have seen one issue with a particular endpoint that did not implement ICE prflx candidates and could not follow the guidance in the text. This is already alluded to in S 4.3, but we may want to explicitly use the phrase "peer-reflexive" to make clear what behavior is needed from the legacy ICE agent. > > > --- > > Q7: > > The draft does not give any guidance regarding how long an ICE agent can > safely cache an mDNS > > > Are you referring to remote mDNS mapping? If so, I think we want to leave > caching to the mDNS layer. > > > --- > > Regards, > > Christer > > > Thanks again for the review. > > > _______________________________________________ > mmusic mailing list > mmusic@ietf.org > https://www.ietf.org/mailman/listinfo/mmusic > > > _______________________________________________ > mmusic mailing list > mmusic@ietf.org > https://www.ietf.org/mailman/listinfo/mmusic >
- Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new … Christer Holmberg
- Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new … Youenn Fablet
- Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new … Justin Uberti
- Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new … Christer Holmberg