Re: [rtcweb] UDP transport problem

Cb B <cb.list6@gmail.com> Thu, 13 February 2014 22:58 UTC

Return-Path: <cb.list6@gmail.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2AAEE1A0470 for <rtcweb@ietfa.amsl.com>; Thu, 13 Feb 2014 14:58:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.75
X-Spam-Level:
X-Spam-Status: No, score=-1.75 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y-9Lcbixi0M9 for <rtcweb@ietfa.amsl.com>; Thu, 13 Feb 2014 14:57:58 -0800 (PST)
Received: from mail-wi0-x233.google.com (mail-wi0-x233.google.com [IPv6:2a00:1450:400c:c05::233]) by ietfa.amsl.com (Postfix) with ESMTP id 13E2C1A0021 for <rtcweb@ietf.org>; Thu, 13 Feb 2014 14:57:57 -0800 (PST)
Received: by mail-wi0-f179.google.com with SMTP id hn9so9343347wib.6 for <rtcweb@ietf.org>; Thu, 13 Feb 2014 14:57:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=eNJLtRseXQYKz1BF62v3fJrDhVBQZiRN49xnxcTOpbI=; b=jqqySSXuo7GHgWF9Eff+/1BjjJvI9cd++LLTcxXKYCJyVR65xjLsnWfj9PAVP26cZW IUQpSuIfaIaYMLT3/aSYn71AaMXnaFUU9zBWvXfAb0mc4KQmQgdUkVEaxUMqrik8Ok/z wYmGA4SIOutWOyYLh7aICO2uo/3nopmChUD4aNveh0bA2dNeDitZioIYP2oRnbDv2Nbi l5huo4kcuL/hfOvBjw9X+uhJRbm8Zcrg008uvv4vB8H1d/Mk6IJfJvDe09sKciwT8Bnj AsXr0YRsvOSoedUWf2dE20H3aaj/nnMcMmvwRQTiFZB50TZN/xs7Lz1XY52CkIbSdroZ yRRg==
MIME-Version: 1.0
X-Received: by 10.194.78.16 with SMTP id x16mr88494wjw.86.1392332276309; Thu, 13 Feb 2014 14:57:56 -0800 (PST)
Received: by 10.194.133.169 with HTTP; Thu, 13 Feb 2014 14:57:56 -0800 (PST)
In-Reply-To: <52FD4AD9.7080204@alvestrand.no>
References: <CAD6AjGRiQ1UF5n3JG9HPRQFM+TD54Xz-dpTn5u9bX+__BMfesQ@mail.gmail.com> <CABkgnnVbZp7yBvpY1ARuaBXS=TOipY=BhXzrd=h5DY-76oF9Pw@mail.gmail.com> <CAD6AjGSxS4jNRGotsE_no0XhewvDqcVZ+Kmx1aMW9qorqSKR+w@mail.gmail.com> <52FD2FA4.8040701@alvestrand.no> <CAD6AjGTbSJEV2cJj5QyLktyZPv8SJa7h-QHKVtdUXnF3K6xwHA@mail.gmail.com> <52FD4AD9.7080204@alvestrand.no>
Date: Thu, 13 Feb 2014 14:57:56 -0800
Message-ID: <CAD6AjGS=F_wOvOv8CJsw8cqC7=u0kh1cyQi7SpK02bEj_RrgiQ@mail.gmail.com>
From: Cb B <cb.list6@gmail.com>
To: Harald Alvestrand <harald@alvestrand.no>
Content-Type: text/plain; charset="ISO-8859-1"
Archived-At: http://mailarchive.ietf.org/arch/msg/rtcweb/XyoM8miDuq9nWKCtgiUDN4QJzWI
Cc: "rtcweb@ietf.org" <rtcweb@ietf.org>
Subject: Re: [rtcweb] UDP transport problem
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Feb 2014 22:58:00 -0000

On Thu, Feb 13, 2014 at 2:44 PM, Harald Alvestrand <harald@alvestrand.no> wrote:
> On 02/13/2014 10:20 PM, Cb B wrote:
>> On Thu, Feb 13, 2014 at 12:48 PM, Harald Alvestrand
>> <harald@alvestrand.no> wrote:
>>> On 02/13/2014 06:56 PM, Cb B wrote:
>>>> On Thu, Feb 13, 2014 at 9:47 AM, Martin Thomson
>>>> <martin.thomson@gmail.com> wrote:
>>>>> On 12 February 2014 22:06, Cb B <cb.list6@gmail.com> wrote:
>>>>>> For about a year now, i have been very concerned about IPv4 UDP.  It
>>>>>> has been increasingly associated with DDoS traffic [1],
>>>>> Is your concern that WebRTC will increase the potential for DoS (which
>>>>> would presume the DoS mitigation measures in ICE [RFC 5245] are
>>>>> insufficient), or is it just that UDP is so toxic to network operators
>>>>> that you predict it will be turned off?
>>>> My concern is that IPv4 UDP is so toxic it will be blocked.  It may be
>>>> wise to start SCTP in the standard from the start.
>>> The bad guys will follow wherever the ports are open (and are usually
>>> faster at writing code than the standards guys are at writing specs); so
>>> will the traversal artists.
>>>
>> Harald, the issue is not open ports. The issue is the entire transport
>> type is polluted.
>
> And I think that notion is bogus. Faced with the choice of dealing with
> the devil they know (UDP) and the devil they don't have a clue about
> (SCTP), firewall operators are going to stick with building out the
> rulesets around UDP, and continuing to refuse all the "new stuff".
>

I never mentioned firewall operators.  I mentioned access networks and
internet backbone operators.

As many network operators know, there is a big issue with UDP going on
that is crushing some networks

http://blog.cloudflare.com/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack

https://puck.nether.net/pipermail/outages/2014-February/006651.html

This is the point in bring to the WG.

> So I don't think the plan has legs - adding SCTP without the UDP wrapper
> to our options will not help anyone do anything.
>

it's a path out.

> But this is trying to forecast the thinking and action of humans that
> are not me, which is something I frequently get wrong - so other
> opinions would be welcome.
>
>>
>>> WebRTC over port 53, anyone?
>>>
>>> (DNS is the one UDP-based service that's so important to the Internet,
>>> it *cannot* be turned off unconditionally - so I expect that if UDP in
>>> general gets blocked, port 53 will be the port 80 of UDP-land.)
>>>
>> DNS runs over TCP as well.
>
> For AXFR, yes. For daily lookups .... better not tell any root DNS
> operator you're advocating that they should have all their lookups over
> TCP; you wouldn't like the expletives that result.
>

cute. But, TCP works.  Maybe you can ask someone at Android to support
EDNS0 so that TCP is used less.  Because for now, android required TCP
for any response over 512 bytes.

>>
>> But that's not the point.  The question is can we include native SCTP
>> as an option in  draft-ietf-rtcweb-transports?  What is the downside?
>>
>
> Clutter.
>
>