Re: [rtcweb] Please require user consent for data channels

Tim Panton <tim@phonefromhere.com> Mon, 20 July 2015 13:45 UTC

Return-Path: <tim@phonefromhere.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E76161A886F for <rtcweb@ietfa.amsl.com>; Mon, 20 Jul 2015 06:45:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xv674blR3XJw for <rtcweb@ietfa.amsl.com>; Mon, 20 Jul 2015 06:45:37 -0700 (PDT)
Received: from smtp001.apm-internet.net (smtp001-out.apm-internet.net [85.119.248.222]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3990B1A8890 for <rtcweb@ietf.org>; Mon, 20 Jul 2015 06:45:37 -0700 (PDT)
Received: (qmail 71025 invoked from network); 20 Jul 2015 13:45:35 -0000
X-AV-Scan: clean
X-APM-Authkey: 83769/0 9757
Received: from unknown (HELO zimbra003.verygoodemail.com) (85.119.248.218) by smtp001.apm-internet.net with SMTP; 20 Jul 2015 13:45:35 -0000
Received: from zimbra003.verygoodemail.com (localhost [127.0.0.1]) by zimbra003.verygoodemail.com (Postfix) with ESMTP id A9ECA18A18CF; Mon, 20 Jul 2015 14:45:32 +0100 (BST)
Received: from limit.westhawk.co.uk (unknown [192.67.4.33]) by zimbra003.verygoodemail.com (Postfix) with ESMTPSA id 8F5E118A17F6; Mon, 20 Jul 2015 14:45:32 +0100 (BST)
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 8.2 \(2102\))
From: Tim Panton <tim@phonefromhere.com>
In-Reply-To: <55ACF718.3010000@jive.com>
Date: Mon, 20 Jul 2015 14:45:32 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <AB6B1C60-7026-4623-9A65-AB3C55B402CD@phonefromhere.com>
References: <CA+65OspMD_PVjk0BXh7t4LtjmFDcDatoeNjFQOO_OVtC-Br+OA@mail.gmail.com> <55A95364.2070806@gmail.com> <CAOJ7v-3t9BQabR2e4EHs4G0Sec4sU9DFC2aiSXXYrat+an+RYg@mail.gmail.com> <55A96DA3.1040907@gmail.com> <CAOJ7v-1ui7349NzK6NZNRHPbnHWZajctk4cDgMKqRZSv47EYdA@mail.gmail.com> <55A9860D.8030903@gmail.com> <CAOJ7v-3LGd32rnpFVW_U0s3+iVaJXsL4vt_YAo=cyp6YyOArdw@mail.gmail.com> <CALiegfmiS18Jux-kCgOhTKKiyGtMertj6xCegpFrox5NOf9EJg@mail.gmail.com> <CABkgnnW0Tmjqz823vKiF84_u6HasBJC7ERMYCO2HL_NPj5saTA@mail.gmail.com> <CALiegfkpbLy1QXxr-RRF0oOpVv1sWsFeab=vvC4iT4DnPtjKQw@mail.gmail.com> <CABkgnnVWcuhX2NjZgx87L+Uo6df6rEBWW73cxbaX3mu_VfHmCA@mail.gmail.com> <CALiegfkQWAn-jMrjhcDPA3rtowOPVk-S8z3c-jvjpNmjtf=3hA@mail.gmail.com> <CABkgnnWERM4oxozNCSvRf1o0Wm-d9Bjw=9B+xh_NJ+h6GfBJ6Q@mail.gmail.com> <7F818FAC-5559-4074-B1FC-EB9516A98FB7@phonefromhere.com> <55ACEA74.8050 300@jive.com> <13F9D9AE-7B6B-40DE-BDD7-DDED28382EAB@phonefromhere.com> <55ACF718.3010000@jive.com>
To: Simon Perreault <sperreault@jive.com>
X-Mailer: Apple Mail (2.2102)
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtcweb/SKmNTaRNHGmEgby1DLSXArkTjHc>
Cc: rtcweb@ietf.org
Subject: Re: [rtcweb] Please require user consent for data channels
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 Jul 2015 13:45:39 -0000

> On 20 Jul 2015, at 14:26, Simon Perreault <sperreault@jive.com> wrote:
> 
> Le 2015-07-20 14:58, Tim Panton a écrit :
>> If I understand correctly we bind to each and every interface
>> that is up and send out packets to all remote candidates down _every_ interface,
>> ignoring any preferences set by the admin in the local routing table which
>> were set to ensure (say) only critical traffic is sent down certain interfaces.
> 
> I have difficulty understanding what it is that's bugging you. Is it the
> signalling payload (i.e., sending the list of address), or is it the
> connectivity checks that are done on all candidate pairs?

I’m not worried about the signalling payload (i.e. the list of local interface addresses - 
except of course the mac-based ipv6 auto conf one).
I am worried about what can be learnt from /caused by sending packets down interfaces
when the sysadmin isn’t expecting it.

(In the end some of those learnings may end up in signalling as candidates too).

> 
>> I can think of some financial institutions who’s IDSs will go off when packets
>> to public external addresses start turning up on internal LANS . (hopefully they 
>> will get dropped at the egress router, but by then the IDS will have paged someone).
> 
> But that's not going to happen unless there's a route. I think there
> could be a misunderstanding here. For example, if there's a VPN with a
> 10.0.0.0/8 route but no default route, the ICE client will *not* send a
> request to a TURN server listening on 192.0.2.1 over the VPN interface.
> That would make no sense whatsoever.

And yet that’s what I read Martin to say : 
"> The point is that you don't even choose the interface. The OS will do for you.
The OS can - and frequently does - get that wrong. The default route can fail when another might succeed."

I read that as 'another interface’ - but if he means  ‘another route’ then I’m happier - I think.
Can @justin or @martin confirm what the browsers currently do ?


> 
>> Likewise my fantastically expensive BGAN link which is used for
>> emergencies only will suddenly start carrying STUN requests irrespective of how I configure my
>> routes ?
> 
> Only if it's possible to route the packet to the STUN server over the
> BGAN link. There must be a route.

There must be a _locally_ configured route - It doesn’t matter if the egress router at the far end of the BGAN drops 
the STUN packet I’ve still wasted my money :-(

> 
> Simon

Tim.