[ppsp] Tracker draft review

Arno Bakker <arno@cs.vu.nl> Mon, 26 March 2012 08:16 UTC

Return-Path: <a.bakker@vu.nl>
X-Original-To: ppsp@ietfa.amsl.com
Delivered-To: ppsp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2FAF021F8527 for <ppsp@ietfa.amsl.com>; Mon, 26 Mar 2012 01:16:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.611
X-Spam-Level:
X-Spam-Status: No, score=-1.611 tagged_above=-999 required=5 tests=[AWL=1.404, BAYES_05=-1.11, HELO_EQ_NL=0.55, HOST_EQ_NL=1.545, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G-aNgFhqySlh for <ppsp@ietfa.amsl.com>; Mon, 26 Mar 2012 01:16:00 -0700 (PDT)
Received: from mailin.vu.nl (mailin.vu.nl [130.37.164.17]) by ietfa.amsl.com (Postfix) with ESMTP id E4C5521F851D for <ppsp@ietf.org>; Mon, 26 Mar 2012 01:15:56 -0700 (PDT)
Received: from PEXHB012B.vu.local (130.37.236.67) by mailin.vu.nl (130.37.164.17) with Microsoft SMTP Server (TLS) id 14.1.218.12; Mon, 26 Mar 2012 10:15:55 +0200
Received: from [130.161.211.249] (130.37.238.20) by mails.vu.nl (130.37.236.67) with Microsoft SMTP Server (TLS) id 14.1.218.12; Mon, 26 Mar 2012 10:15:54 +0200
Message-ID: <4F7025C4.4010201@cs.vu.nl>
Date: Mon, 26 Mar 2012 10:16:04 +0200
From: Arno Bakker <arno@cs.vu.nl>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:11.0) Gecko/20120312 Thunderbird/11.0
MIME-Version: 1.0
To: ppsp <ppsp@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Originating-IP: [130.37.238.20]
Subject: [ppsp] Tracker draft review
X-BeenThere: ppsp@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: arno@cs.vu.nl
List-Id: discussing to draw up peer to peer streaming protocol <ppsp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ppsp>, <mailto:ppsp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ppsp>
List-Post: <mailto:ppsp@ietf.org>
List-Help: <mailto:ppsp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ppsp>, <mailto:ppsp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Mar 2012 08:16:02 -0000

Hi all

here is my review of the draft-gu-ppsp-tracker-protocol-07 proposal:

p.5. Would the proposed usage guide not be a better place for
the 1.1 + 1.2 tutorials?

p.8. IMHO the draft should list the requirements for the enrollment 
certificates.

p.8. Typo: "encoded alternative" -> "encoded alternatives"

p.10. Peer-Peer messages. Please add a reference to the peer protocol WG 
item.

p.12. "Each peer ... contacts the tracker to advertise which information
it has available". This is not required for all trackers, just the ones
that use this info to steer peer selection. See PPSP.TP.REQ-7.

p.13. Typo: "5. Peer requests for" -> "5. Peer requests"

p.14. Typo: "registers in the tracker" -> "registers with the tracker"

p.15. Concept PeerMode type is used without introduction.

p.15. Typo: "to request to the tracker" -> "to request from the tracker"

p.15. IMHO one can remove the TERMINATED state.

p.16. State machine: Does a peer need to be connected to a tracker all 
the time?

p.20 "Content-Lenght" -> "Content-Length"

p.23. What is the value of "Content-Type" for the tracker protocol?

p.23. Concept PeerGroup is used without introduction.

p.24. Elements like PeerMode, PeerGroup will not be used by all tracker 
implementations, so should be marked "MAY".

p.25. What are the security implications of the PeerMode, 
uploadBWlevel, onlineTime elements? What if malicious peers claims to 
e.g. have high bandwidth, can they gain an advantage here that would 
allow them to eclipse or disrupt the service?

p.26. What are the security implications of having a peer announce its
own IP address, connection, ASN, etc. instead of the tracker gathering
this information independently from the network?

p.28. What are the security implications of a peer sending information 
about its available bandwidth?

p.30. CONNECT: Please specify which fields are mandatory and which 
optional. E.g. link status.

p.32. No PeerID in CONNECT response?

p.34. Typo: "SUCCESSFULL" -> "SUCCESFUL"

p.35. Why doesn't a peer in SEED mode connect to other peers? Especially 
in a world with NAT boxes it may be necessary for seeders to initiate 
the connection themselves.

p.39. Typo: "START_REPORT" -> "STAT_REPORT"

p.40. "If the length of the message does not matches the Content-Length"
How will you know, given HTTP is run over TCP which is a byte stream?

p.42. Peers may also refuse to servce content and put QoS at risk.

p.42. Will the tracker protocol function today, without this global 
trust mechanism?

p.46. Appendix B. Where do the MPDs play a role in the tracker protocol?
The proposed usage guide may be a better place, and a reference to the 
ISO/IEC 23009-1 would suffice IMHO.

p.50. - PPSP-REQ-6: What is the chunk addressing scheme used? Should 
support multiple.

p.50. - PPSP.TP.REQ-7: ChunkMaps are optional.
p.51. - PPSP.TP.REQ-8: BASE64-encoding is not compact, actually it takes 
more bytes than original data. I.e. no compression here.

p.51. - PPSP.SEC.REQ-1: How does the tracker protocol support closed 
swarms? What's its role?

p.51. - PPSP.SEC.REQ-2: What role does tracker play in content 
confidentiality?

p.51. - PPSP.SEC.REQ-7: How does the design support distributed 
architectures like DHTs and gossip?

p.52. - PPSP.SEC.REQ-9: Using MPDs for content integrity protection is 
only one particular scheme. Please allow for multiple.

Regards,
     Arno