Re: [p2prg] Comments to draft-schulzrinne-p2prg-rtc-security-00

Emil Ivov <emcho@sip-communicator.org> Wed, 15 April 2009 14:27 UTC

Return-Path: <emil@sip-communicator.org>
X-Original-To: p2prg@core3.amsl.com
Delivered-To: p2prg@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 94B753A6E7C for <p2prg@core3.amsl.com>; Wed, 15 Apr 2009 07:27:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.512
X-Spam-Level:
X-Spam-Status: No, score=-2.512 tagged_above=-999 required=5 tests=[AWL=0.087, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Zb02WVDe2lnT for <p2prg@core3.amsl.com>; Wed, 15 Apr 2009 07:27:24 -0700 (PDT)
Received: from mail-bw0-f169.google.com (mail-bw0-f169.google.com [209.85.218.169]) by core3.amsl.com (Postfix) with ESMTP id 3416E3A694A for <p2prg@ietf.org>; Wed, 15 Apr 2009 07:27:24 -0700 (PDT)
Received: by bwz17 with SMTP id 17so2935338bwz.37 for <p2prg@ietf.org>; Wed, 15 Apr 2009 07:28:35 -0700 (PDT)
Received: by 10.204.97.204 with SMTP id m12mr278578bkn.22.1239805715495; Wed, 15 Apr 2009 07:28:35 -0700 (PDT)
Received: from porcinet.local (shm67-5-88-165-90-188.fbx.proxad.net [88.165.90.188]) by mx.google.com with ESMTPS id z10sm8320986fka.18.2009.04.15.07.28.32 (version=TLSv1/SSLv3 cipher=RC4-MD5); Wed, 15 Apr 2009 07:28:34 -0700 (PDT)
Sender: Emil Ivov <emil@sip-communicator.org>
Message-ID: <49E5EF0F.2020708@sip-communicator.org>
Date: Wed, 15 Apr 2009 16:28:31 +0200
From: Emil Ivov <emcho@sip-communicator.org>
Organization: SIP Communicator
User-Agent: Thunderbird 2.0.0.21 (Macintosh/20090302)
MIME-Version: 1.0
To: Henry Sinnreich <hsinnrei@adobe.com>
References: <C60B4BDB.D2B2%hsinnrei@adobe.com>
In-Reply-To: <C60B4BDB.D2B2%hsinnrei@adobe.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: quoted-printable
Cc: "p2prg@ietf.org" <p2prg@ietf.org>
Subject: Re: [p2prg] Comments to draft-schulzrinne-p2prg-rtc-security-00
X-BeenThere: p2prg@irtf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Peer-to-Peer Research Group <p2prg.irtf.org>
List-Unsubscribe: <http://www.irtf.org/mailman/listinfo/p2prg>, <mailto:p2prg-request@irtf.org?subject=unsubscribe>
List-Archive: <http://www.irtf.org/mail-archive/web/p2prg>
List-Post: <mailto:p2prg@irtf.org>
List-Help: <mailto:p2prg-request@irtf.org?subject=help>
List-Subscribe: <http://www.irtf.org/mailman/listinfo/p2prg>, <mailto:p2prg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Apr 2009 14:27:25 -0000

Hey Henry,

Henry Sinnreich wrote:
>> [Haibin] As far as I know, Joost has just changed its basic P2P system
>> architecture and turned to client/server architecture. It’s better to
>> remove this reference.
> 
> There is still Bittorrent and several others.

Indeed, but as we mention in the text the sentence is there only to show
uses other than file sharing. We are not trying to provide an exhaustive
enumeration.

Cheers
Emil
> 
> Henry
> 
> 
> On 4/14/09 7:44 AM, "Enrico Marocco" <enrico.marocco@telecomitalia.it>
> wrote:
> 
>     Thanks for an accurate review, Haibin, we'll integrate your comments in
>     the next version of the draft. A few notes inline.
> 
>     Song Haibin wrote:
>     > 1. In Section 1, paragraph 1, "P2P networks are now also being used for
>     > applications such as Voice over IP (VoIP) [SKYPE] [Singh] and
>     television
>     > [JOOST] [COOLSTREAM]."
>     >
>     > [Haibin] As far as I know, Joost has just changed its basic P2P system
>     > architecture and turned to client/server architecture. It’s better to
>     > remove this reference.
> 
>     Yes, indeed, probably now PPLive is a better example of P2P systems for
>     realtime content delivery.
> 
>     > 2. Section 2.1 Incentive of attacker
>     >
>     > [Haibin]  I could give some additional common incentives of attackers.
>     > For example, some attacks are motivated by the business competition or
>     > for selling security products. E.g., I heard some firewall product
>     > companies usually attack some company’s network, and tell them their
>     > network is not safe, so that they could sell them firewalls.
>     Attacks due
>     > to competition are also common cases. These kinds of attacks may happen
>     > to p2p overlays.
> 
>     While it is arguably a real issue in C/S scenarios, I'm not sure who, in
>     a P2P system, could be the target customer of such security solutions.
>     Maybe you are thinking of sort of a hybrid model, but the case of some
>     company selling a security product for an application distributed by
>     another company doesn't seem much realistic. OTOH I agree that
>     competition could be a real incentive.
> 
>     > 5. In Section 5.1.2, Reactive identification, "In a file-sharing
>     > application for example, after downloading content from a node, if the
>     > peer observes that data does not match its original query it can
>     > identify the corresponding node as malicious."
>     >
>     > [Haibin] It is hard to determine which node is the malicious node in
>     > this context. But at least this content in this node can be marked with
>     > “malicious”, or this node can be marked with “suspicious”.
> 
>     Identification of malicious peers is actually a very complex topic,
>     subject itself of many possible attacks. The example in section 5.1.2,
>     surely over-simplistic, has the only intent to pass to the reader a
>     quick image of the reactive approach, but it is of course far from a
>     real solution.
> 
>     > 7. In section 7.1.2 When to upgrade
>     >
>     > [Haibin] It lists some information to determine the peer load, e.g.
>     > number of clients attached, bandwidth usage for DHT maintenance, memory
>     > usage for DHT routing table. I hope p2psip diagnostics
>     > (draft-ietf-p2psip-diagnostics) mechanisms can be used to collect the
>     > listed corresponding information from the overlay.
> 
>     At the time of writing the p2psip-diagnostics work was still very early,
>     but I agree that now it would be worth referenced here.
> 
>     --
>     Ciao,
>     Enrico
> 
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> p2prg mailing list
> p2prg@irtf.org
> http://www.irtf.org/mailman/listinfo/p2prg