Re: [sip-overload] AD review of draft-ietf-soc-load-control-event-package-08

Charles Shen <charles@cs.columbia.edu> Sat, 25 May 2013 19:52 UTC

Return-Path: <charles.newyork@gmail.com>
X-Original-To: sip-overload@ietfa.amsl.com
Delivered-To: sip-overload@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0CFB21F8AD1 for <sip-overload@ietfa.amsl.com>; Sat, 25 May 2013 12:52:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.976
X-Spam-Level:
X-Spam-Status: No, score=-2.976 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id w8rBJDeuZS08 for <sip-overload@ietfa.amsl.com>; Sat, 25 May 2013 12:52:47 -0700 (PDT)
Received: from mail-oa0-f53.google.com (mail-oa0-f53.google.com [209.85.219.53]) by ietfa.amsl.com (Postfix) with ESMTP id 5E29921F8A54 for <sip-overload@ietf.org>; Sat, 25 May 2013 12:52:47 -0700 (PDT)
Received: by mail-oa0-f53.google.com with SMTP id g12so7444996oah.26 for <sip-overload@ietf.org>; Sat, 25 May 2013 12:52:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:sender:in-reply-to:references:from:date :x-google-sender-auth:message-id:subject:to:cc:content-type; bh=rq9zvEiglOP3d52vScSgyVOEzCJH3DPly8NeK48FyKU=; b=lFSe6m+5i3JH54YfSKyXhwmPzJ1mwuxSguva38H8Ik+hXPHMSOuK1YT33PVrMX/qrt J3VO/eLqEuHcpAlIk9UT4LGWnVZfCjErpIUpRhbjxOecBG232QYPOSwORlenGgG5a0zq z6Iu1HCSWyaFSK6MuPXPiE2ArMoimyBIQAH4dsqUMSmTWndPt8f+6AzrUQF+x/haKibP 5XrokSAV1XXI9vZBmMFLk23/xkV2K/swZ35QZbuQegrpveRnpw7M+6qO0O1BAmEKm/R3 h6B6nV64XVyjBZQz7mVNnCF2JxaPfVt0eM1f4xJz5Xt1TFYGgT2xCZ3fP7pFUHVkFiai 7Mcw==
X-Received: by 10.60.38.169 with SMTP id h9mr14675614oek.120.1369511566867; Sat, 25 May 2013 12:52:46 -0700 (PDT)
MIME-Version: 1.0
Sender: charles.newyork@gmail.com
Received: by 10.182.66.227 with HTTP; Sat, 25 May 2013 12:52:25 -0700 (PDT)
In-Reply-To: <CAL02cgQW3eJg+f0nwEwihJGRgE82o+B0gSx0LJ6vTP1M8F+n5w@mail.gmail.com>
References: <CAL02cgQW3eJg+f0nwEwihJGRgE82o+B0gSx0LJ6vTP1M8F+n5w@mail.gmail.com>
From: Charles Shen <charles@cs.columbia.edu>
Date: Sat, 25 May 2013 15:52:25 -0400
X-Google-Sender-Auth: bYsGthsskcx81fUZpf0jmNbePks
Message-ID: <CAPSQ9ZWuu5fS1jQw6XS4tyPt2ho2pkiCe0FKfboxNv8NrbsNZg@mail.gmail.com>
To: Richard Barnes <rlb@ipv.sx>
Content-Type: multipart/alternative; boundary="089e0149530a75847204dd90426a"
Cc: sip-overload@ietf.org, draft-ietf-soc-load-control-event-package@tools.ietf.org
Subject: Re: [sip-overload] AD review of draft-ietf-soc-load-control-event-package-08
X-BeenThere: sip-overload@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: SIP Overload <sip-overload.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip-overload>
List-Post: <mailto:sip-overload@ietf.org>
List-Help: <mailto:sip-overload-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip-overload>, <mailto:sip-overload-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2013 19:52:51 -0000

Dear Richard,

Thank you so much for the great review. I am so sorry for the much delayed
response. Please see my comments inline.

On Wed, Apr 17, 2013 at 1:53 PM, Richard Barnes <rlb@ipv.sx> wrote:

> I have reviewed this document, and have a few questions before IETF LC:
>
> Major:
>
> In a few places, for example Section 5.3., the document suggests that this
> event package could be used to communicate load filtering policies between
> domains.  This seems like a bad idea for a few reasons.  First, policies
> can be based on "P-Asserted-Identity", which is itself limited to use
> within a trust domain / Spec(T).  It doesn't make sense to have policies
> based on these identifiers outside of the domain in which they are used.
>  Second, inter-domain policies can create subtle and dangerous security
> risks.  For example, according to the current specification, Domain A could
> tell Domain B to drop all calls between Domain B and Domain C.  It's not
> clear how you would prevent these sorts of attacks, especially where "tel:"
> URIs are involved.  I think both of these issues go away if this event
> package is limited in a similar way to P-Asserted-Identity, i.e., limited
> to use within a trust domain.
>
>
[CS] How about phrasing it as being applicable "within trusted intra-domain
and/or trusted inter-domain" scenarios?



>  Section 6.3., "SUBSCRIBE Bodies" doesn't actually say anything about what
> goes in the body of a SUBSCRIBE message.  On the one hand, it implies that
> there could be a body (since the last sentence considers a request without
> a body as a special case), but it doesn't say what goes in the body if
> there is one.  Please either (1) define what may go in the body, (2)
> explicitly say that this document does not specify what goes in SUBSCRIBE
> bodies, or (3) require that the body be empty.
>

[CS] Earlier version of this document specifies that

"A SUBSCRIBE request for the SIP load control event package MAY contain a
body to filter the requested load control event notification. The details
of the subscription filter specification are not yet defined."

That sentence was later removed because it might cause confusion.   (
http://www.ietf.org/mail-archive/web/sip-overload/current/msg00866.html)

I am OK going for your option (2) or option (3), although slightly prefer
option (2).


> (Also, the first paragraph of this section seems out of place here, since
> it also has nothing to do with the body.)
>
>
[CS] removed, since the meaning of this paragraph has already been conveyed
elsewhere in the document [Section 5.3].


>  In Section 6.5., the last sentence is wrong.  The presence of an Accept
> header indicates that the response body should be one of the indicated
> types.  The indicated behavior would only be acceptable if the Accept
> header included "multipart/mixed".  Suggest deleting the last sentence.
>  (Also,  it would be clearer to change "the request body will contain" to
> "the request body MUST contain".)
>
>
[CS] Done.


>  In Section 7.3.1, you need to specify how a "tel:" URI is matched against
> a domain value starting with "+".  Your examples seem to indicate simple
> string prefix matching, but I doubt that's what you actually want, since
> non-digit characters can break things.  For example, "+1212" should match "
> +1-212-555-1212".  Please specify a matching algorithm here.
>
>
[CS]

So there are a number of possible scenarios that I can think of:

a) Matching based on Tel URI comparison:

According to RFC 3966 Section 4. Tel URIs like +8135252324, +81-33525-2324,
+81 33525 2324 all become 8135252324 during comparison because separators
are removed, and they are therefore equivalent.

b) Matching based on SIP URI comparison:

Defined in RFC3261 Section 19.1.4

c) Matching for Tel converted SIP URI. I am not sure if this is something
we need to worry about.

Since whitespace is not allowed in URI, Tel URIs like +8135252324,
+81-33525-2324, +81 33525 2324 will yield

+8135252324@host
+81-33525-2324@host

Which will be considered different (will it?). If it is not possible to
identify which SIP URI is a Tel-converted SIP URI, then we need to specify
both in the filter identity conditions, otherwise, we can decide to
similarly remove the separators in the username, and make them the same
URI.

d) Prefix matching

Is it sufficient to state that for prefix-based matching, regular
expression and rules as determined by the provider of the applicable
domains SHOULD be used?

We've also dug around, and we have not found any algorithm in published RFC
to match numbers such as +8135252324, +81-33525-2324, and +81 33525 2324.
There's some note on DRINKS spec about applying regular expression to
telephone number. But it just wrote that we could define regular expression
for telephone number. It does not illustrate or specify any specific
examples either.

 In Section 7.3.2, please change "Non-initial requests ... are not
> subjected" to "Non-initial requests ... MUST NOT be subjected".
>

[CS] done


>
> Section 7.4. doesn't adequately define the actions to be taken.  Each of
> the action elements (<rate>, <window>, <percent>) need to define a concrete
> action that the proxy should take.
>
>
[CS] It seems to me that how to enforce the rate/window/percent becomes
more implementation specific, and these action items are what the rest of
the WG documents (http://datatracker.ietf.org/wg/soc/) are using as well.
The first paragraph of Section 7.4 also referenced RFC6357 on more details
about these actions. Therefore, I am not sure what more concrete actions
you are referring to, could you please elaborate a bit on this?


>  RFC 4745 allows rules to combine when multiple rules match a given call.
>  This document needs to define combination rules for the actions defined
> here.
>

[CS] For a particular filter policy condition, I don't seem to see how/why
an upstream server would send a filter policy action combining different
action types (rate/window/percent) or combining multiple values for the
same action type. Should we simply make it explicit that no combination is
allowed, or do you have any combination scenario in mind?


> What's the reason for having both the "drop" action and the "reject"
> action?  It seems like the "drop" action is almost always harmful.  With
> unreliable transport, it causes retransmits, and even with reliable
> transport, it causes the client to wait unnecessarily until the connection
> times out.  In any case, the "simple drop" action is underspecified.  For
> example, does the server simply ignore the SIP message, or does it close
> the transport connection?
>
>
[CS] "simple drop" here means simply ignoring the request without doing
anything.  i.e., in the reliable transport case, it does not have to close
the transport connection. It still saves some processing needed in sending
out the rejection in reliable transport. But I am open to eleminating it if
the group prefers so.


>
> Minor:
>
> In Section 7.3, "we re-define" -- the document doesn't re-define any of
> the elements in RFC 4745 (that's good; redefinition is bad).  Instead, you
> should say you define new identity elements.
>
>
[CS] Done.

 In Section 7.3.1, please break up paragraph starting "To include the two
> forms..." for greater readability.  Suggested break points: Before "Note
> that the tradeoff...", and before "It should be noted..."
>

[CS] Done.


>
> In Section 7.3.3, it would be helpful to break up the paragraph starting
> "The following are two example...".  Break before "Usecase I" and "Usecase
> II".  Also, s/Usecase/Use case/g
>
>
[CS] Done.


Thanks!

Charles



>
> Thanks,
> --Richard
>
> _______________________________________________
> sip-overload mailing list
> sip-overload@ietf.org
> https://www.ietf.org/mailman/listinfo/sip-overload
>
>