Re: [tram] Comments on draft-patil-tram-turn-serv-selection-00

"Aijun Wang" <wangaijun@tsinghua.org.cn> Tue, 13 January 2015 01:14 UTC

Return-Path: <wangaijun@tsinghua.org.cn>
X-Original-To: tram@ietfa.amsl.com
Delivered-To: tram@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6119A1ACE57 for <tram@ietfa.amsl.com>; Mon, 12 Jan 2015 17:14:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.391
X-Spam-Level: *
X-Spam-Status: No, score=1.391 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, J_CHICKENPOX_44=0.6, RCVD_IN_PSBL=2.7, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RYRBhPyg7o7Z for <tram@ietfa.amsl.com>; Mon, 12 Jan 2015 17:14:47 -0800 (PST)
Received: from tsinghua.org.cn (mail.tsinghua.org.cn [211.151.65.103]) by ietfa.amsl.com (Postfix) with ESMTP id ED3A71A8826 for <tram@ietf.org>; Mon, 12 Jan 2015 17:14:45 -0800 (PST)
Received: from ctbriwangaij (unknown [219.142.69.75]) by app1 (Coremail) with SMTP id Z0GX06BL_QMOXLRUOgbPAA==.17715S4; Tue, 13 Jan 2015 07:43:28 +0800 (CST)
From: Aijun Wang <wangaijun@tsinghua.org.cn>
To: 'Justin Uberti' <juberti@google.com>
References: <913383AAA69FF945B8F946018B75898A3552A606@xmb-rcd-x10.cisco.com> <00d301d02e31$9f79a8d0$de6cfa70$@org.cn> <CAOJ7v-3UvAV6HWYWQOJoHmiMmMvGUsRCjOeF+aNFHBBokTg8KQ@mail.gmail.com>
In-Reply-To: <CAOJ7v-3UvAV6HWYWQOJoHmiMmMvGUsRCjOeF+aNFHBBokTg8KQ@mail.gmail.com>
Date: Tue, 13 Jan 2015 09:14:21 +0800
Message-ID: <002a01d02ece$4c063400$e4129c00$@org.cn>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_002B_01D02F11.5A297400"
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: AdAumR57Lu2j/rgmT7ypHYfWE5j3tAAM7SjA
Content-Language: zh-cn
X-CM-TRANSID: Z0GX06BL_QMOXLRUOgbPAA==.17715S4
X-Coremail-Antispam: 1U3129KBjvJXoW3GFW5GF45Xw45ury7XFy5Arb_yoWfuryfpF WF9ryay3WkJF1xAw15Zw409F1fu395WrZrJrn8Gr17Z393Jr10vrnxt3y5CFy7Gr95GFyY vrWjv3WDZ3WrAFJanT9S1TB71UUUUU7v73VFW2AGmfu7bjvjm3AaLaJ3UjIYCTnIWjlmb7 Iv0xC_Jr1l5I8CrVAYj202j2C_Gr0_Xr1l5I8CrVAqjxCE14ACF2xKxwAqx4xG64kEw2xG 04xIwI0_Jr0_Gr1l5I8CrVCF0I0E4I0vr24lb4IE77IF4wAFF20E14v26r4j6ryUM7C26x Cjj4IEI4klw4CSwwAFxVCaYxvI4VCIwcAKzIAtMcIj6x8ErcxFaVAv8VW8AwC2zVAF1VAY 17CE14v26r1Y6r17MIIF0xvEx4A2jsIE14v26r1j6r4UMIIF0xvEx4A2jsIEc7CjxVAFwI 0_Jr0_GrUI43ZEXa7VU1RuWJUUUUU==
Archived-At: <http://mailarchive.ietf.org/arch/msg/tram/M38cia4mWgfbniZULIVr6WotYtA>
Cc: tram@ietf.org, "'Tirumaleswar Reddy (tireddy)'" <tireddy@cisco.com>
Subject: Re: [tram] Comments on draft-patil-tram-turn-serv-selection-00
X-BeenThere: tram@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussing the creation of a Turn Revised And Modernized \(TRAM\) WG, which goal is to consolidate the various initiatives to update TURN and STUN." <tram.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tram>, <mailto:tram-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tram/>
List-Post: <mailto:tram@ietf.org>
List-Help: <mailto:tram-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tram>, <mailto:tram-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Jan 2015 01:14:51 -0000

Hi, Justin:

 

Please refer to the reply below.

 

 

From: Justin Uberti [mailto:juberti@google.com] 
Sent: Tuesday, January 13, 2015 4:23 AM
To: Aijun Wang
Cc: Tirumaleswar Reddy (tireddy); tram@ietf.org
Subject: Re: [tram] Comments on draft-patil-tram-turn-serv-selection-00

 

 

 

On Sun, Jan 11, 2015 at 10:32 PM, Aijun Wang <wangaijun@tsinghua.org.cn> wrote:

Hi, 

 

Do you refer to the draft http://www.ietf.org/id/draft-schwartz-rtcweb-return-04.txt as RETURN draft? This draft describes only TURN-in-TURN, not TURN-to-TURN. It does not describe the situation that the communication peers select the different public TURN server, and need the TURN server to relay the app data(TURN to TURN).

 

That is just normal UDP. 

 

[Aijun]: For TURN to TURN situation, I am discussing it with the Brandon, please refer to that thread.  We should consider carefully for the transport mechanism between A/TURN Server A; TURN Server A/TURN Server B and TURN Server B/B when peer A want to talk to B via the two TURN Server A/B.

 

In situation that mentioned in RETURN draft, Why not to let ICE or App Server to select the appropriate TURN server(corporate private TURN server or public TURN server) based on the information of the two communication parts? This can even eliminate the solution of  RETURN:  two peer will use the corporate TURN server when they are both within corporate, and will use the public TURN server when one of them is located outside the corporation?

 

a) The TURN server isn't needed when both endpoints are within the enterprise. The TURN server sits on the enterprise border, and is used for inter-enterprise traffic.

b) The public TURN server may not be reachable from the enterprise. This is why the corporate TURN server is needed on the border.

c) The app may require use of its own TURN server for location privacy purposes, so both TURN servers may be used in this case.

 

This is all spelled out in https://tools.ietf.org/html/draft-schwartz-rtcweb-return-04#section-1.

 

[Aijun] Would you like to explain more detail about “but using only the enterprise's TURN server reveals information about the user (e.g. organizational affiliation)”,  and how do you achieve this goal via the RETURN mechanism?

 

Best Regards.

 

 

From: Tirumaleswar Reddy (tireddy) [mailto:tireddy@cisco.com] 
Sent: Monday, January 12, 2015 1:35 PM
To: Aijun Wang; 'Justin Uberti'
Cc: tram@ietf.org
Subject: RE: [tram] Comments on draft-patil-tram-turn-serv-selection-00

 

As Justin has pointed out we will be updating the draft with more details on the decisions that could be made by ICE and the application to select the TURN server. TURN-in-TURN communication is already explained in RETURN draft.

 

-Tiru

 

From: tram [mailto:tram-bounces@ietf.org] On Behalf Of Aijun Wang
Sent: Monday, January 12, 2015 7:08 AM
To: Tirumaleswar Reddy (tireddy); 'Justin Uberti'
Cc: tram@ietf.org
Subject: Re: [tram] Comments on draft-patil-tram-turn-serv-selection-00

 

Hi, Reddy and Justin:

 

I suggest the TURN server selection should be made by ICE, not the client itself.  This can eliminate the needs for the communication between different TURN server that selected by communication peer. ICE has more information about the communication situation, and is suitable to make this decision.

 

There are several issues needed to be solved when the communication peers select the different TURN server, for example, how to find the second TURN server, what is the communication mechanism between different TURN servers, the channel connection among different data segments: client/first TURN server, first TURN server/second TURN server, and second TURN server/peer etc.

 

Best Regards.

 

From: tram [ <mailto:tram-bounces@ietf.org> mailto:tram-bounces@ietf.org] On Behalf Of Tirumaleswar Reddy (tireddy)
Sent: Sunday, January 11, 2015 1:40 PM
To: Justin Uberti
Cc:  <mailto:tram@ietf.org> tram@ietf.org
Subject: Re: [tram] Comments on draft-patil-tram-turn-serv-selection-00

 

Inline [TR]

 

From: Justin Uberti [ <mailto:juberti@google.com> mailto:juberti@google.com] 
Sent: Sunday, January 11, 2015 2:17 AM
To: Tirumaleswar Reddy (tireddy)
Cc:  <mailto:tram@ietf.org> tram@ietf.org
Subject: Re: [tram] Comments on draft-patil-tram-turn-serv-selection-00

 

 

 

On Fri, Jan 9, 2015 at 7:38 PM, Tirumaleswar Reddy (tireddy) <tireddy@cisco.com> wrote:

Hi Justin,

 

Enterprise-provided TURN server cannot provide location privacy may not be always true. For example Enterprise network could use TURN server provided by a cloud service and the user needs to know that the Enterprise TURN server can provide location privacy and not proceed with TURN-in-TURN. 

 

We will have to discuss if TURN server can advertise that it can provide location privacy in a new attribute or this info can be conveyed out-of-band (e.g. PAC). 

 

The other problem not discussed in the draft is, what if the user wants privacy against the calling site and let’s say uses Tor for privacy. In this scenario app TURN server must not be selected.

 

RETURN handles this situation fine, since the traffic will be routed through the network-provided TURN server before being routed to the app TURN server. Of course, if the application does not try to provide location privacy, only the network-provided TURN server will be used.

 

[TR] But the problem is how will the endpoint how if network-provided TURN server can provide location privacy or not ?

         TURN server can convey this information in a new STUN attribute to the client.

 

However, I think the user is much more likely to trust the application than its network provider to provide privacy protection.

 

[TR] User may or may not trust the application server. https://tools.ietf.org/html/draft-ietf-rtcweb-security-arch-10 discusses users using privacy techniques like Tor so that app server does not learn the user's IP address. The Poker example given in the above draft explains that the users in the call do not trust the calling service. In this case IdP ensures that even if malicious calling service replaces the media addresses with its own addresses  and replaces the certificate fingerprint in SDP with its own certificate, IdP assertion would ensure that the Poker site cannot act as  man-in-middle device. In this scenario user may not want to pick app provided TURN server.

 

-Tiru

 

 

 

From: tram [mailto: <mailto:tram-bounces@ietf.org> tram-bounces@ietf.org] On Behalf Of Justin Uberti
Sent: Friday, January 09, 2015 4:04 AM
To:  <mailto:tram@ietf.org> tram@ietf.org
Subject: [tram] Comments on draft-patil-tram-turn-serv-selection-00

 

At IETF 91, I promised to send feedback on this document, so here goes.

 

Generally, I think many of the issues mentioned in this document are important, but the recommendations are confusing and possibly contradictory; a developer with little knowledge of TURN will have a hard time figuring out exactly what to do. Furthermore, many of the properties discussed in this document are dynamic, and should be handled by the ICE process, rather than in TURN server selection (for example, the notion of RTT as it relates to user experience).

 

Therefore, I think this document should take a stronger stance and put forth explicit best practices for selection (as opposed to "things to consider"), for non-dynamic properties, and leave the decisions on dynamic properties to be resolved by ICE. 

 

For example, I think we should omit the text in Section 3 about what to do with non-working TURN servers, and measuring RTT. Same for Section 3.3, which also discusses RTT, and Section 3.4, which talks about multiple interfaces. This can all be handled by ICE.

 

In addition, the sections on local config and location privacy are unnecessary when RETURN is used. When RETURN is used, the application can always use the app TURN server for location privacy, and the relationship between local TURN server and app TURN server is fully spelled out, so there is nothing for the application to decide on.

 

This leaves only the Security, Authentication, and Mobility sections. 

 

For security, I think we can give some clear guidance on what applications should do. For security, I think the guidance should be to use only DTLS + TLS, if both are available, with fallback to UDP or TCP if DTLS or TLS aren't available. If privacy is paramount, UDP/TCP fallback may be contraindicated, but at this point in time, DTLS deployment isn't widespread enough to truly recommend this.

 

This relates to the Authentication section - but I think any failures to authenticate the server cert should cause the TURN allocation to fail. This is just like any other misconfiguration on the TURN server - there's no reason we should even allow use of TURN servers whose cert chains don't validate. So, this section could probably be removed.

 

Lastly, the Mobility section says that if "all other parameters [are] equal", a TURN server with mobility should be used. Clearly, all other parameters will not be equal (e.g. RTT), and even if they were, the client has no way to know if a server is mobility-capable a priori. So I think this recommendation ought to be removed, or perhaps turned into some sort of recommendation for TURN server developers (e.g. TURN servers SHOULD support TLS/DTLS, SHOULD support mobility, SHOULD support redirect), probably in a separate doc.

 

These recommendations should reduce the size of this document and provide much clearer advice to app developers.