Re: [P2PSIP] I-D Action: draft-ietf-p2psip-sip-15.txt

"Bless, Roland (TM)" <roland.bless@kit.edu> Tue, 11 August 2015 15:48 UTC

Return-Path: <roland.bless@kit.edu>
X-Original-To: p2psip@ietfa.amsl.com
Delivered-To: p2psip@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BEFBD1A1BDD for <p2psip@ietfa.amsl.com>; Tue, 11 Aug 2015 08:48:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.85
X-Spam-Level:
X-Spam-Status: No, score=-3.85 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SKjGsRY-6CuM for <p2psip@ietfa.amsl.com>; Tue, 11 Aug 2015 08:48:12 -0700 (PDT)
Received: from iramx2.ira.uni-karlsruhe.de (iramx2.ira.uni-karlsruhe.de [141.3.10.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22D5E1A06E9 for <p2psip@ietf.org>; Tue, 11 Aug 2015 08:48:10 -0700 (PDT)
Received: from i72vorta.tm.uni-karlsruhe.de ([141.3.71.26] helo=i72vorta.tm.kit.edu) by iramx2.ira.uni-karlsruhe.de with esmtp port 25 iface 141.3.10.81 id 1ZPBma-000677-Ht; Tue, 11 Aug 2015 17:48:08 +0200
Received: from [IPv6:::1] (ip6-localhost [IPv6:::1]) by i72vorta.tm.kit.edu (Postfix) with ESMTPS id 7D9AEB011AA; Tue, 11 Aug 2015 17:48:08 +0200 (CEST)
Message-ID: <55CA1938.8020609@kit.edu>
Date: Tue, 11 Aug 2015 17:48:08 +0200
From: "Bless, Roland (TM)" <roland.bless@kit.edu>
Organization: Institute of Telematics, Karlsruhe Institute of Technology
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.8.0
MIME-Version: 1.0
To: p2psip@ietf.org, "Thomas C. Schmidt" <schmidt@informatik.haw-hamburg.de>
References: <20150704120654.8491.52141.idtracker@ietfa.amsl.com>
In-Reply-To: <20150704120654.8491.52141.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 8bit
X-ATIS-AV: ClamAV (iramx2.ira.uni-karlsruhe.de)
X-ATIS-Timestamp: iramx2.ira.uni-karlsruhe.de 1439308088.
Archived-At: <http://mailarchive.ietf.org/arch/msg/p2psip/vdcYoRGiS-fSZx6lqxJ1Y5ad4zk>
Subject: Re: [P2PSIP] I-D Action: draft-ietf-p2psip-sip-15.txt
X-BeenThere: p2psip@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Peer-to-Peer SIP working group discussion list <p2psip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/p2psip>, <mailto:p2psip-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/p2psip/>
List-Post: <mailto:p2psip@ietf.org>
List-Help: <mailto:p2psip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/p2psip>, <mailto:p2psip-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Aug 2015 15:48:17 -0000

Hi,

I reviewed the latest version -15 now:
Sec. 3.1:

   "Note that
   the registration lifetime known from the regular SIP REGISTER method
   is inherited from the lifetime attribute of the basic RELOAD
   StoredData structure (see Section 7 in [RFC6940])."

Not sure that it's expressed in the right order. Maybe better:
   Note that the lifetime attribute of the basic RELOAD
   StoredData structure (see Section 7 in [RFC6940]) now corresponds
   to the registration lifetime given by a regular SIP REGISTER method
   in the "expires:" parameter.

Sec. 5.1.
   "Once the AppAttach succeeds, the peer sends plain or (D)TLS encrypted
   SIP messages over the connection as in normal SIP."

I find this still confusing as there is no way to send "plain"
SIP messages via RELOAD, they will always be sent via an encrypted
(D)TLS transport from end-to-end.
Maybe:
   Once the AppAttach succeeds, the peer sends SIP messages (for SIP
   and SIPS sessions) over the connection as in normal SIP. It is
   noteworthy that according to [RFC6940] all overlay links built
   by AppAttach are utilizing (D)TLS secured transport.

(then delete the redundant:
It is noteworthy that according to
   [RFC6940] all overlay links are built on (D)TLS secured transport.)

Similarly:
   "While hop-wise encrypted paths do not prevent the use of plain SIP,
   SIPS requires end-to-end protection that may include client links and
   endpoint certificates."
Since every AppAttach Link will be end-to-end protected by (D)TLS,
I think this statement is superfluous.


>> Sec. 6:
>>     GRUUs in RELOAD are constructed by embedding a
>>     base64-encoded destination list in the gr URI parameter of the GRUU.
>>
>> I guess that the destination list is encoded in the same way as
>> described in section  6.3.2.2. of RFC 6940. Simply a list of
>> Destination entries without any preceding length field?!
>>
> 
> Well yes, we're using the RELOAD destination list (term and definition) here. The above encoding describes the URI-encoding, not the representation of the data structure in the overlay. 

That at least caused an ambiguous interpretation on my side. I thought
that I need to build the binary representation of the destination list
data structure first and then encode it in base64. This is obviously
wrong and should be clarified.

Regards,
 Roland