Re: [P2PSIP] Alexey Melnikov's Discuss on draft-ietf-p2psip-sip-18: (with DISCUSS and COMMENT)

"Thomas C. Schmidt" <t.schmidt@haw-hamburg.de> Tue, 19 April 2016 17:20 UTC

Return-Path: <t.schmidt@haw-hamburg.de>
X-Original-To: p2psip@ietfa.amsl.com
Delivered-To: p2psip@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1696412ED44; Tue, 19 Apr 2016 10:20:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.896
X-Spam-Level:
X-Spam-Status: No, score=-2.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, RP_MATCHES_RCVD=-0.996] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XD1cHzfFKrjo; Tue, 19 Apr 2016 10:20:29 -0700 (PDT)
Received: from mx3.haw-public.haw-hamburg.de (mx3.haw-public.haw-hamburg.de [141.22.6.2]) (using TLSv1.2 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22BBB12EDE0; Tue, 19 Apr 2016 10:20:26 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="5.24,506,1454972400"; d="scan'208";a="28190264"
Received: from post.haw-hamburg.de (HELO HUB01.mailcluster.haw-hamburg.de) ([141.22.24.50]) by mail3.is.haw-hamburg.de with ESMTP/TLS/AES256-SHA; 19 Apr 2016 19:20:25 +0200
Received: from CAS02.mailcluster.haw-hamburg.de (2002:8d16:183d::8d16:183d) by HUB01.mailcluster.haw-hamburg.de (2002:8d16:1832::8d16:1832) with Microsoft SMTP Server (TLS) id 14.3.248.2; Tue, 19 Apr 2016 19:20:25 +0200
Received: from [141.22.57.242] (141.22.250.35) by haw-mailer.haw-hamburg.de (141.22.24.61) with Microsoft SMTP Server (TLS) id 14.3.248.2; Tue, 19 Apr 2016 19:20:24 +0200
To: Alexey Melnikov <aamelnikov@fastmail.fm>
References: <2995d676192d4d1ca3a22232ec6995cd@HUB02.mailcluster.haw-hamburg.de> <5713FB2D.2020405@haw-hamburg.de> <03ce1ff85a2d46fa8c19c1bc6abbae85@HUB02.mailcluster.haw-hamburg.de>
From: "Thomas C. Schmidt" <t.schmidt@haw-hamburg.de>
Message-ID: <571668CD.2090704@haw-hamburg.de>
Date: Tue, 19 Apr 2016 19:20:13 +0200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.7.2
MIME-Version: 1.0
In-Reply-To: <03ce1ff85a2d46fa8c19c1bc6abbae85@HUB02.mailcluster.haw-hamburg.de>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Originating-IP: [141.22.250.35]
Archived-At: <http://mailarchive.ietf.org/arch/msg/p2psip/bWec1X9RZb06Ee2uLKM7Hl_hJmA>
Cc: "p2psip-chairs@ietf.org" <p2psip-chairs@ietf.org>, "draft-ietf-p2psip-sip@ietf.org" <draft-ietf-p2psip-sip@ietf.org>, The IESG <iesg@ietf.org>, "p2psip@ietf.org" <p2psip@ietf.org>
Subject: Re: [P2PSIP] Alexey Melnikov's Discuss on draft-ietf-p2psip-sip-18: (with DISCUSS and COMMENT)
X-BeenThere: p2psip@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Peer-to-Peer SIP working group discussion list <p2psip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/p2psip>, <mailto:p2psip-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/p2psip/>
List-Post: <mailto:p2psip@ietf.org>
List-Help: <mailto:p2psip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2psip>, <mailto:p2psip-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Apr 2016 17:20:32 -0000

Hi Alexey,

please see the two open answers inline.

On 18.04.2016 09:37, Alexey Melnikov wrote:
> Hi Thomas,
>
>> On 17 Apr 2016, at 22:07, Thomas C. Schmidt <t.schmidt@haw-hamburg.de> wrote:
>>
>> Hi Alexey,
>>
>> many thanks for your careful review. Please see inline:
>>
>>>
>>> ----------------------------------------------------------------------
>>> DISCUSS:
>>> ----------------------------------------------------------------------
>>>
>>> I will move to No Objection once my comments are discussed. They should
>>> be easy to address.
>>>
>>> In Section 7:
>>>
>>>       Access Control  USER-NODE-MATCH.  Note that this matches the SIP
>>> AOR
>>>        against the rfc822Name in the X509v3 certificate.  The rfc822Name
>>>        does not include the scheme so that the "sip:" prefix needs to be
>>>        removed from the SIP AOR before matching.
>>>
>>> In general the advice of stripping "sip:" is misleading, because URIs
>>> might have %-encoding, which is not present in rfc822Name, which is an
>>> email address. I think adding text that %-encoding should be decoded
>>> would be a good idea.
>>
>> Thanks for pointing at this: We added
>>
>>   "Escaped characters ('%' encoding) in the SIP AOR also need to be decoded prior to matching."
>
> Adding a reference to RFC 3986 would be good here.

O.K. - we added.

>>
>>> Also, the first reference to rfc822Name (earlier in the document) needs a
>>> normative reference to RFC 5280.
>>
>> We added the ref. in Section 2.
>>
>>>
>>> ----------------------------------------------------------------------
>>> COMMENT:
>>> ----------------------------------------------------------------------
>>>
>>> In 3.2:
>>>
>>>        If the registration is of type "sip_registration_uri", then the
>>>        contents are an opaque string containing the AOR as specified in
>>>        Section 2.
>>>
>>> Is the reference correct? Section 2 is "Terminology".
>>
>> Nope, this is a historic editing mistake -> removed.
>>
>>> What does "opaque string" means here? You still need to define syntax of
>>> the field.
>>
>> "opaque string" is the appropriate (single valued) data type of RELOAD (see https://tools.ietf.org/html/rfc6940#section-7.2). Further specifications are given as "the AOR".
>
> Ok. Maybe put in quotes or point this out in the terminology section?

Actually, in the terminology section is an explicit mentioning of the 
AOR from RFC 3261 and how to use it here. From my understanding, any 
additional marking might rather generate confusion than clarity - in 
particular since an understanding of SIP terminology is rather natural 
in the context of this document ("SIP Usage").

Do you agree?

Best,
  Thomas

>>
>>> In 3.3:
>>>
>>>     Before a Store is permitted, the storing peer MUST check that:
>>>
>>>     o  The AOR of the request is a valid Resource Name with respect to
>>>        the namespaces defined in the overlay configuration document.
>>>
>>>     o  The certificate contains a username that is a SIP AOR which hashes
>>>        to the Resource-ID it is being stored at.
>>>
>>>     o  The certificate contains a Node-ID that is the same as the
>>>        dictionary key it is being stored at.
>>>
>>> Is there a document that defines how exactly a username and a Node-ID can
>>> be represented in an X.509 certificate? If yes, adding a normative
>>> reference here would be useful. If not, adding specific details here
>>> would be useful.
>>
>> Username is a SIP AOR as specified in RFC 3261 (this is normatively referenced in Section 2). A Node-ID is an Overlay Hash, which is defined in RFC 6940 (also normatively referenced in Section 2).
>
> Ok.
>>
>>> On page 10:
>>>
>>>     Inclusion of a <domain-restrictions> element in an overlay
>>>     configuration document is OPTIONAL.  If the element is not included,
>>>     the default behavior is to accept any AOR.  If the element is
>>>     included and the "enable" attribute is not set or set to false, the
>>>     overlay MUST only accept AORs that match the domain name of the
>>>     overlay.
>>>
>>> What happens if "enable" is false/unspecified and patter subelements are
>>> included? Are they ignored?
>>
>> According to the writing, this means that
>>
>> " the
>>    overlay MUST only accept AORs that match the domain name of the
>>    overlay."
>>
>> The case you are describing is an inconsistently extended overlay configuration document. Hence, this spec tells to ignore inconsistent extensions (isolated pattern subelements), which I believe makes sense. Any counter-arguments?
>
> No, this sounds entirely sensible.
>>
>>>     The <domain-restrictions> element serves as a container for zero to
>>>     multiple <pattern> sub-elements.  A <pattern> element MAY be present
>>>     if the "enable" attribute of its parent element is set to true.  Each
>>>     <pattern> element defines a pattern for constructing admissible
>>>     resource names.  It is of type xsd:string and interpreted as a
>>>     regular expression according to "POSIX Extended Regular Expression"
>>>     (see the specifications in [IEEE-Posix]).
>>>
>>> This repeats part of the second paragraph of the same section. Is this
>>> repetition needed?
>>
>> Oopsi - no. This is an editing mistake, most likely from copying a block while revising text. It is removed now.
>>
>> Thanks again for finding these lapses!
>>
>> We revise and submit.
>
> Thank you!
>

-- 

Prof. Dr. Thomas C. Schmidt
° Hamburg University of Applied Sciences                   Berliner Tor 7 °
° Dept. Informatik, Internet Technologies Group    20099 Hamburg, Germany °
° http://www.haw-hamburg.de/inet                   Fon: +49-40-42875-8452 °
° http://www.informatik.haw-hamburg.de/~schmidt    Fax: +49-40-42875-8409 °