Re: [p2prg] Comments to draft-schulzrinne-p2prg-rtc-security-00

Enrico Marocco <enrico.marocco@telecomitalia.it> Tue, 14 April 2009 12:43 UTC

Return-Path: <enrico.marocco@telecomitalia.it>
X-Original-To: p2prg@core3.amsl.com
Delivered-To: p2prg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2F97828C0F2 for <p2prg@core3.amsl.com>; Tue, 14 Apr 2009 05:43:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.41
X-Spam-Level:
X-Spam-Status: No, score=-0.41 tagged_above=-999 required=5 tests=[AWL=0.309, BAYES_00=-2.599, HELO_EQ_IT=0.635, HOST_EQ_IT=1.245]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zKriS4o2ILVw for <p2prg@core3.amsl.com>; Tue, 14 Apr 2009 05:43:46 -0700 (PDT)
Received: from GRFEDG702BA020.telecomitalia.it (grfedg702ba020.telecomitalia.it [156.54.233.201]) by core3.amsl.com (Postfix) with ESMTP id DFF303A6DD7 for <p2prg@ietf.org>; Tue, 14 Apr 2009 05:43:45 -0700 (PDT)
Received: from GRFHUB701BA020.griffon.local (10.188.101.111) by GRFEDG702BA020.telecomitalia.it (10.188.45.101) with Microsoft SMTP Server (TLS) id 8.1.340.0; Tue, 14 Apr 2009 14:44:29 +0200
Received: from [10.229.8.41] (10.229.8.41) by smtp.telecomitalia.it (10.188.101.114) with Microsoft SMTP Server (TLS) id 8.1.358.0; Tue, 14 Apr 2009 14:44:28 +0200
Message-ID: <49E4852B.4030108@telecomitalia.it>
Date: Tue, 14 Apr 2009 14:44:27 +0200
From: Enrico Marocco <enrico.marocco@telecomitalia.it>
User-Agent: Mozilla-Thunderbird 2.0.0.19 (X11/20090103)
MIME-Version: 1.0
To: Song Haibin <melodysong@huawei.com>
References: <005e01c9bca8$63d60db0$400ca40a@china.huawei.com>
In-Reply-To: <005e01c9bca8$63d60db0$400ca40a@china.huawei.com>
X-Enigmail-Version: 0.95.0
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="sha1"; boundary="------------ms000203090203020600020500"
Cc: "p2prg@ietf.org" <p2prg@ietf.org>
Subject: Re: [p2prg] Comments to draft-schulzrinne-p2prg-rtc-security-00
X-BeenThere: p2prg@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Peer-to-Peer Research Group <p2prg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/p2prg>, <mailto:p2prg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/p2prg>
List-Post: <mailto:p2prg@irtf.org>
List-Help: <mailto:p2prg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/p2prg>, <mailto:p2prg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Apr 2009 12:43:47 -0000

Thanks for an accurate review, Haibin, we'll integrate your comments in
the next version of the draft. A few notes inline.

Song Haibin wrote:
> 1. In Section 1, paragraph 1, "P2P networks are now also being used for
> applications such as Voice over IP (VoIP) [SKYPE] [Singh] and television
> [JOOST] [COOLSTREAM]."
>  
> [Haibin] As far as I know, Joost has just changed its basic P2P system
> architecture and turned to client/server architecture. It’s better to
> remove this reference.

Yes, indeed, probably now PPLive is a better example of P2P systems for
realtime content delivery.

> 2. Section 2.1 Incentive of attacker
>  
> [Haibin]  I could give some additional common incentives of attackers.
> For example, some attacks are motivated by the business competition or
> for selling security products. E.g., I heard some firewall product
> companies usually attack some company’s network, and tell them their
> network is not safe, so that they could sell them firewalls. Attacks due
> to competition are also common cases. These kinds of attacks may happen
> to p2p overlays.

While it is arguably a real issue in C/S scenarios, I'm not sure who, in
a P2P system, could be the target customer of such security solutions.
Maybe you are thinking of sort of a hybrid model, but the case of some
company selling a security product for an application distributed by
another company doesn't seem much realistic. OTOH I agree that
competition could be a real incentive.

> 5. In Section 5.1.2, Reactive identification, "In a file-sharing
> application for example, after downloading content from a node, if the
> peer observes that data does not match its original query it can
> identify the corresponding node as malicious."
>  
> [Haibin] It is hard to determine which node is the malicious node in
> this context. But at least this content in this node can be marked with
> “malicious”, or this node can be marked with “suspicious”.

Identification of malicious peers is actually a very complex topic,
subject itself of many possible attacks. The example in section 5.1.2,
surely over-simplistic, has the only intent to pass to the reader a
quick image of the reactive approach, but it is of course far from a
real solution.

> 7. In section 7.1.2 When to upgrade
>  
> [Haibin] It lists some information to determine the peer load, e.g.
> number of clients attached, bandwidth usage for DHT maintenance, memory
> usage for DHT routing table. I hope p2psip diagnostics
> (draft-ietf-p2psip-diagnostics) mechanisms can be used to collect the
> listed corresponding information from the overlay.

At the time of writing the p2psip-diagnostics work was still very early,
but I agree that now it would be worth referenced here.

-- 
Ciao,
Enrico