Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new draft: Christer's comments - corrected version

Justin Uberti <juberti@google.com> Tue, 25 May 2021 19:38 UTC

Return-Path: <juberti@google.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F9453A1ACB for <mmusic@ietfa.amsl.com>; Tue, 25 May 2021 12:38:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.599
X-Spam-Level:
X-Spam-Status: No, score=-17.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rxzH0pDviY5S for <mmusic@ietfa.amsl.com>; Tue, 25 May 2021 12:38:27 -0700 (PDT)
Received: from mail-yb1-xb2b.google.com (mail-yb1-xb2b.google.com [IPv6:2607:f8b0:4864:20::b2b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A03AD3A1AC5 for <mmusic@ietf.org>; Tue, 25 May 2021 12:38:27 -0700 (PDT)
Received: by mail-yb1-xb2b.google.com with SMTP id y197so2957548ybe.11 for <mmusic@ietf.org>; Tue, 25 May 2021 12:38:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=5E0b7XOuvzl9NBC/zNMIJ/ws2JCjBkxR7Mxb4SsWzMs=; b=ijZrmPV9HS645I7ynh11JjAk2q6d/Tc8v4sz/IqnhqCbCMadFN36eM0bTFoPeAB+Zr BpGkCwyRkwDkgBU/g6Ku0SRZs9xoIQKibbDA8ICdU/HF5Lj9M73F4jZqIhkM+NvjUGkO WxD4PdQzbIfZ29WGdjlcNLIsTFotr+xQOla1g4ddPrqUUBXmoOuqZh1gdxzjQCj8hjJF NBmYjYBBoFXJ3J2O7nqS16pH5ktupLhQgEZb6AjAMQeQYLYyuFMopoNc9O1MhnaHTcHa AZP+7VehVnpwnsau2XkM99GilbiR4bLHCJMcEefkxR1iIm8Rc9f6rT1UmAla5kd+iW0x CslA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=5E0b7XOuvzl9NBC/zNMIJ/ws2JCjBkxR7Mxb4SsWzMs=; b=pvq+rffgjEep+iBJGYy8b0TbEl7MYVBhKGoWi3InDfoFYG4sm4kaIm3DOuZfw+viTo +9s0YNZsx56eBoBEAULNp+R4uk0FNZoTTpkV4Y1d2UTakwhIenrYPABpHnTmHz5lVl0M /Q5rvydPawzsuPsvy+LwX7g6/dWj56bd16Uys6aFnbOn+iIvVkW5TmyXrSVg9OHc1Kyg QMj20OysyTT89pi30EPsEKwm62fIO54w+ltMJeX5V97E+o6tLLLZlfQAppKXld4PADzU 9bIdP2QZv7CtybGanVniihRggAWCuEwAaBEhNgMipQ9lXVJttdjAa7+y9zcCnZ8XsVOT 7hyg==
X-Gm-Message-State: AOAM533VQrHLKAK6hYdUdwmcX4ir3S9+8PMxq3oyEFDOrGwRgQ4aZjxe mq5IOIV2bY2XISbZ+1BQ1fLqqTf2BiD1+ggVZTbhj2VfxT8=
X-Google-Smtp-Source: ABdhPJxu7hu/lhp/hn07f7JDWVNioaQ8sVINXJASVeZmmRDUJrHd3P8UGlJQt18DJrJst+dZqVdzaQ9vqe3Qw8Q35Z8=
X-Received: by 2002:a25:3342:: with SMTP id z63mr45886902ybz.46.1621971505041; Tue, 25 May 2021 12:38:25 -0700 (PDT)
MIME-Version: 1.0
References: <AM0PR07MB3860453DCCB6278DD57BF27093299@AM0PR07MB3860.eurprd07.prod.outlook.com> <0DE13BAA-1F65-4876-AA0E-4F491A606877@apple.com>
In-Reply-To: <0DE13BAA-1F65-4876-AA0E-4F491A606877@apple.com>
From: Justin Uberti <juberti@google.com>
Date: Tue, 25 May 2021 12:38:13 -0700
Message-ID: <CAOJ7v-2ACeC0q-L7RQ_g-c2Qz=xjfBTwh4CBeszORVKqP6X9Qg@mail.gmail.com>
To: Youenn Fablet <youenn=40apple.com@dmarc.ietf.org>
Cc: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org>, mmusic WG <mmusic@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000065787505c32cab54"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/eepX4jD1s7dB5DBCZlQT_1iQslc>
Subject: Re: [MMUSIC] ietf-mmusic-mdns-ice-candidates new draft: Christer's comments - corrected version
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 May 2021 19:38:31 -0000

On Tue, May 25, 2021 at 12:53 AM Youenn Fablet <youenn=
40apple.com@dmarc.ietf.org> wrote:

> Thanks for the review,
>
> Based on your review, I filed two issues at
> https://github.com/rtcweb-wg/mdns-ice-candidates
> Please see below for some answers.
>
> On 21 May 2021, at 19:49, Christer Holmberg <
> christer.holmberg=40ericsson.com@dmarc.ietf.org> wrote:
>
> It seems like I added some of the Q4 text to Q3. Here is a corrected
> version of my question:
>
> Q1:
>
> I think it needs to be more clear that mDNS domain names (.local) can only
> be resolved by remote peers within the same local network.
>
>
> Right, this is a (useful) restriction from mDNS though mDNS extensions
> could potentially alleviate this.
> We might want to say this explicitly and detail that host candidates are
> useful for peers in the same local network as well.
> I filed https://github.com/rtcweb-wg/mdns-ice-candidates/issues/133.
>
>
> Section 5.1 does talk about this, and it may be an implicit assumption,
> but I think it should be pointed out in the beginning of the document.
>
> ---
>
> Q2:
>
> Related to Q1, think it needs to be more clear that the mechanism prevents
> IP address leaking to peers outside the local network. Inside the local
> network I assume that web apps can still find out about the local address
> simply by performing an mDNS lookup on the mDNS domain name.
>
>
> Web apps cannot do mDNS lookups for privacy reasons.
> It is a good thing for privacy reasons that a web page does not have
> access to its local address without some form of user opt-in.
>
>
> ---
>
> Q3:
>
> The draft makes an assumption that the mDNS domain names are unique. Why
> making that assumption? If the local network supports multicast, there may
> even be non-WebRTC applications using mDNS, which increases the risk for
> collision.
>
>
> mDNS is supposed to handle name collision.
> This spec relies on the mDNS specification to handle such cases, which I
> think is the correct layering.
>
>
> ---
>
> Q4:
>
> Section 3.1.1 says that an ICE agent, when it gathers candidates,
> generates a UNIQUE mDNS domain name. I assume that means that the mDNS
> domain name will only be valid for the duration of the ICE session.
>
>
> For the lifetime of the ICE agent, this may be more than the ICE session.
> Though there is no hard requirement, section 3.3.3 states that mDNS domain
> name lifetime should be scoped by the lifetime of the web page (agents are
> free to be stricter than that).
>
>
> Doesn't that mean that there is no need for other ICE agents to cache the
> mDNS domain name:IP address mapping for "future use", because the mDNS
> domain name won't be used in future anyway?
>
>
> The idea is for ICE agents to keep alive their own mDNS name as long as
> needed.
> ICE agents should not try to buffer other ICE candidate mDNS:IP mapping.
> This is an optimization that should be left to the mDNS layer.
>
>
> Also, I am not sure whether ICE implementations should cache mappings to
> begin with. That's the task of the mDNS client of the host.
>
>
> Agreed.
>
>
> ---
>
> Q5:
>
> Section 5.3 says:
>
>   "When an endpoint that supports mDNS communicates with an endpoint that
> does not, the legacy
>   endpoint will still provide its local IP addresses, and accordingly a
> direct connection can still be attempted,
>   even though the legacy endpoint cannot resolve the mDNS names provided
> by the new endpoint."
>
> Please make it more clear that the legacy endpoint is the one that does
> not support mDNS. Something like:
>
>    "When an endpoint that supports mDNS communicates with a legacy
> endpoint that does not, the..."
>
>
> I filed https://github.com/rtcweb-wg/mdns-ice-candidates/issues/134.
>
>
> ---
>
> Q6:
>
> If I remember correctly, people have raised issues with legacy parsers not
> being able to parse non-IP-addresses. If so, shouldn't that be mentioned in
> Section 5.3?
>
> (NOTE: Eventhough the draft updates RFC 8839, to support mDNS domain
> names, it does not solve the issue for legacy parsers.)
>
>
> In practice, deployment has not seen this issue, maybe because legacy
> parsers are not widely used in mode 3 applications, i.e. applications that
> do not access to any camera/microphone.
> It seems fine mentioning legacy parsers in the document.
> Let’s handle it in the same issue as above,
> https://github.com/rtcweb-wg/mdns-ice-candidates/issues/134.
>

As long as the legacy parser doesn't blow up the session, this will work
fine, as noted in the text.

We have seen one issue with a particular endpoint that did not implement
ICE prflx candidates and could not follow the guidance in the text. This is
already alluded to in S 4.3, but we may want to explicitly use the phrase
"peer-reflexive" to make clear what behavior is needed from the legacy ICE
agent.

>
>
> ---
>
> Q7:
>
> The draft does not give any guidance regarding how long an ICE agent can
> safely cache an mDNS
>
>
> Are you referring to remote mDNS mapping? If so, I think we want to leave
> caching to the mDNS layer.
>
>
> ---
>
> Regards,
>
> Christer
>
>
> Thanks again for the review.
>
>
> _______________________________________________
> mmusic mailing list
> mmusic@ietf.org
> https://www.ietf.org/mailman/listinfo/mmusic
>
>
> _______________________________________________
> mmusic mailing list
> mmusic@ietf.org
> https://www.ietf.org/mailman/listinfo/mmusic
>