Re: [rtcweb] Review of draft-ietf-rtcweb-stun-consent-freshness-05

Paul Kyzivat <pkyzivat@alum.mit.edu> Fri, 18 July 2014 03:17 UTC

Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 666781B2815 for <rtcweb@ietfa.amsl.com>; Thu, 17 Jul 2014 20:17:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.235
X-Spam-Level:
X-Spam-Status: No, score=-1.235 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_SOFTFAIL=0.665] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3Bt_V5flJv2D for <rtcweb@ietfa.amsl.com>; Thu, 17 Jul 2014 20:17:14 -0700 (PDT)
Received: from qmta06.westchester.pa.mail.comcast.net (qmta06.westchester.pa.mail.comcast.net [IPv6:2001:558:fe14:43:76:96:62:56]) by ietfa.amsl.com (Postfix) with ESMTP id 9F3111B27DC for <rtcweb@ietf.org>; Thu, 17 Jul 2014 20:17:14 -0700 (PDT)
Received: from omta13.westchester.pa.mail.comcast.net ([76.96.62.52]) by qmta06.westchester.pa.mail.comcast.net with comcast id TesF1o00117dt5G56fHE3E; Fri, 18 Jul 2014 03:17:14 +0000
Received: from Paul-Kyzivats-MacBook-Pro.local ([50.138.229.164]) by omta13.westchester.pa.mail.comcast.net with comcast id TfHD1o00U3ZTu2S3ZfHEUv; Fri, 18 Jul 2014 03:17:14 +0000
Message-ID: <53C891B9.6060103@alum.mit.edu>
Date: Thu, 17 Jul 2014 23:17:13 -0400
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.6.0
MIME-Version: 1.0
To: Martin Thomson <martin.thomson@gmail.com>
References: <53C87F76.8070007@alum.mit.edu> <CABkgnnXQp20Wuz5kXS05K7UL4ioH+fbDCmOsv6kMQTHD0cPhSg@mail.gmail.com>
In-Reply-To: <CABkgnnXQp20Wuz5kXS05K7UL4ioH+fbDCmOsv6kMQTHD0cPhSg@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.net; s=q20140121; t=1405653434; bh=d3RffazbNehKXQ1CjLruXLJUmRRNK8MtfeGfSZOCWKU=; h=Received:Received:Message-ID:Date:From:MIME-Version:To:Subject: Content-Type; b=ubBnNti2ETf+J5kNGX5/m4v1uRFT+SHy2kTPV0+QC9xYcpEi3UMCkkN05i1BjW++j 1JQ3jz+j4T/fFMMO9iRqLUjCROS/Pmlsz6RIdheTnF08VkqfJ5tRoitiHYK3Pm65Wh 9z/sHT4flFIyrD5WK4dZUBja/niMnqSOsWbWomflyaecTgG6jZEVTAQytz2vTTA4EQ +gNodi6S54lEVVdvCERRL001Y8MW8OrNpKNSlCKir4RFAP6yWJVLhb+IPBaFO8z2Ke +UnTlDgrIM60DmtE3Ca+VGyAqeSrJIWX27mCgi8smQgm6hMej/P7sraE3bv4N9ZJxc JOg0kKPIy9H3w==
Archived-At: http://mailarchive.ietf.org/arch/msg/rtcweb/MKHNNrx-OE2sJnMuC0crQBJKcxY
Cc: "rtcweb@ietf.org" <rtcweb@ietf.org>
Subject: Re: [rtcweb] Review of draft-ietf-rtcweb-stun-consent-freshness-05
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Jul 2014 03:17:15 -0000

On 7/17/14 10:19 PM, Martin Thomson wrote:
> On 17 July 2014 18:59, Paul Kyzivat <pkyzivat@alum.mit.edu> wrote:
>>     WebRTC devices are required to support full ICE as specified in
>>     section 3.4 of [I-D.ietf-rtcweb-transports].  However, when WebRTC
>>     devices interwork with other endpoints that support only ICE-lite
>>     (e.g. gateways) those endpoints will not generate consent checks, but
>>     just respond to consent checks they receive.
>
> Yes, this.

OK.

>> Section 4.1:
>>
>>     ...  To prevent expiry of consent, a STUN binding
>>     request is sent every N milliseconds, where N SHOULD be 5000
>>     milliseconds and MUST be randomized at least 20% above and 20% below
>>     that value (to prevent prevent network synchronization).  Using the
>>     value 5000 milliseconds and that 20% randomization range, N would be
>>     a value between 4000 and 6000.  ...
>
> We've just discussed this particular point and concluded that the
> randomization requirement isn't necessary, since there is no need for
> any sort of lock step avoidance in a peer-to-peer system like this.

Will these two be covered in -06?

	Thanks,
	Paul