[tram] Multiple allocations SV: I-D Action: draft-ietf-tram-turnbis-15.txt

"Karl Stahl" <karl.stahl@ingate.com> Thu, 05 April 2018 15:54 UTC

Return-Path: <karl@ingate.com>
X-Original-To: tram@ietfa.amsl.com
Delivered-To: tram@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E188112D88D for <tram@ietfa.amsl.com>; Thu, 5 Apr 2018 08:54:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.999
X-Spam-Level:
X-Spam-Status: No, score=-0.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, MSGID_MULTIPLE_AT=1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ingate.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9F2hnh1FY1jY for <tram@ietfa.amsl.com>; Thu, 5 Apr 2018 08:54:13 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00061.outbound.protection.outlook.com [40.107.0.61]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9915412D87D for <tram@ietf.org>; Thu, 5 Apr 2018 08:54:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ingate.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=V4Mqg4126GSyCPSZVVRhooZCgr6JXdkyBn4GWhwRrMI=; b=mLa6jvHTjhZM5SvBuuI90px5BHeS11en8C2LaFNA2gTarkAu6w5b4xnEP72Lj4so9Pho/5AQmxdEqGfNNYfGc43gMxZfp0NevP+efYdkwK9NrtNEVbPB4sNSt+t/t1OBYEdfBNfvaiAqKnYH8ZuMbXJbNn485uvanzPtqFr+IRI=
Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=karl@ingate.com;
Received: from Kallei7 (90.229.133.175) by VI1PR01MB1837.eurprd01.prod.exchangelabs.com (2a01:111:e400:7bd8::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.631.10; Thu, 5 Apr 2018 15:54:06 +0000
From: Karl Stahl <karl.stahl@ingate.com>
To: 'Justin Uberti' <juberti@google.com>, "'Olle E. Johansson'" <oej@edvina.net>
Cc: 'Brandon Williams' <brandon.williams@akamai.com>, 'Simon Perreault' <sperreault@jive.com>, TirumaleswarReddy_Konda@mcafee.com, tram@ietf.org
References: <152136260256.18150.10551009018364033510@ietfa.amsl.com> <BN6PR16MB1425D61744AC7480972C800AEAD50@BN6PR16MB1425.namprd16.prod.outlook.com> <BEC020EA-C973-48E5-A918-EF2D25953E33@edvina.net> <BN6PR16MB1425327E5CD094CF18A040F2EAAA0@BN6PR16MB1425.namprd16.prod.outlook.com> <c3584946-2782-2ac7-7f7c-7e7ae273fec9@akamai.com> <CANO7kWC5H_0jv-=MsRzQaO7C=SsTbqz-UJhARm2f1SWOA6uutA@mail.gmail.com> <0e354f75-5ca9-07d2-9e63-2b9bc49fd4fe@akamai.com> <708D2731-0E8B-4AB8-B4C1-27C86573341D@edvina.net> <CAOJ7v-0kXgHp2FmnzKwjGjFawcr=ByWsfAfEH8yEugPbp-u9cA@mail.gmail.com>
In-Reply-To: <CAOJ7v-0kXgHp2FmnzKwjGjFawcr=ByWsfAfEH8yEugPbp-u9cA@mail.gmail.com>
Date: Thu, 05 Apr 2018 17:54:11 +0200
Message-ID: <01c701d3ccf6$58c430b0$0a4c9210$@stahl>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_01C8_01D3CD07.1C4D00B0"
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: AdPLCRMhSo/inRkHSs6EKro3zRax5wB3SUlg
Content-Language: sv
X-Originating-IP: [90.229.133.175]
X-ClientProxiedBy: AM0PR06CA0055.eurprd06.prod.outlook.com (2603:10a6:208:aa::32) To VI1PR01MB1837.eurprd01.prod.exchangelabs.com (2a01:111:e400:7bd8::23)
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: ee9b75d0-a2a4-488f-c0a8-08d59b0d76f9
X-Microsoft-Antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(7021125)(5600026)(4604075)(4534165)(7022125)(4603075)(4627221)(201702281549075)(7048125)(7024125)(7027125)(7028125)(7023125)(2017052603328)(7153060)(7193020); SRVR:VI1PR01MB1837;
X-Microsoft-Exchange-Diagnostics: 1; VI1PR01MB1837; 3:fue3BbAKLM8ZN8YMd+/XpZLs9HHxvTvynvIxVS+RTLYeZkdl0GhVsxbwkXSoqxWrgoEsT7Ks4v0CxQfBw77w/E9X6LQRxwIJ9a0mFY9ZNyQR0z3MEprKWHm39lj+a5ur0PVrf6LFEIdveNIgh8AXgujd9YiU6AzO8efXk93EmkxsadkRXhnrAQq9vBXqitCT0O7p+M5/VZ0r/yUcxwKdkMiijkIXxovTVTcYC5D0K38dLatEVEWZNPwdJzxPNnzY; 25:YC5D403ae2+Arwi8aN1nGJ7VKbdV+cr2NFE97iGmwGj5jdwUZXD6BWGAgSYTMg550wHWvC0hIcc2MqznFevDFT28/99c4m3TioXJSdwlB9REpvEHRZcmKzkojeuuNRBYbjB1JRC4Y9Wt5I1Q87Q+Zl0YpddaaK+qYwgym0RDz+lpHZuwbsH9615sobjOwAyK6zqgJNhQ7Tc7wHl1gGdG8hr5dyU4ghsMF5R44PaprbW9Ho2rLP3/fCCdk4mKD8IqM1j+yOxli/KCw2ULP1kHZmfxit1g8cQPEz63oNtc4ZtbpCj8jVpyWVnde7A6pSjARhzk0HY7x0tLNW5UVTgoKw==; 31:pjleGQFXnYBmka9WaQFNwGtrfV+0nIPqb+CHBwkSnK/3wzRwW+ldArdqSqi6Yp8u8SBwRmFFQjYS5H1Zk96Nwh9iPR17gTC+HJkMLCtQULL+LUVz3WbtVMqD3+c+wsm1FXtBise8mrFx1AFefKMGrhzsX/pJhXtZcPBryPAJLdcziZ9/X631QMsoUICE5t6dqXDaNB43fR76uCwPaDrZNHhjf+5d+Pq7ayAT3IJRtGM=
X-MS-TrafficTypeDiagnostic: VI1PR01MB1837:
X-Microsoft-Antispam-PRVS: <VI1PR01MB1837B042523823D00AC67EE6B1BB0@VI1PR01MB1837.eurprd01.prod.exchangelabs.com>
X-Exchange-Antispam-Report-Test: UriScan:(28532068793085)(158342451672863)(192374486261705)(211936372134217)(100405760836317)(21748063052155)(123452027830198);
X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(5005006)(8121501046)(3231221)(944501327)(52105095)(93006095)(93001095)(10201501046)(3002001)(6041310)(2016111802025)(20161123564045)(20161123558120)(20161123560045)(20161123562045)(6043046)(6072148)(201708071742011); SRVR:VI1PR01MB1837; BCL:0; PCL:0; RULEID:; SRVR:VI1PR01MB1837;
X-Microsoft-Exchange-Diagnostics: 1; VI1PR01MB1837; 4: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
X-Forefront-PRVS: 06339BAE63
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(39380400002)(376002)(39830400003)(396003)(366004)(346002)(199004)(189003)(377424004)(54906003)(105586002)(66066001)(476003)(4326008)(1857600001)(44736005)(93886005)(61296003)(7826002)(39060400002)(54896002)(478600001)(61793004)(53946003)(236005)(53936002)(6486002)(486006)(18717965001)(966005)(9686003)(7736002)(102836004)(6306002)(561944003)(186003)(96836002)(16526019)(36756003)(110136005)(26005)(316002)(16586007)(2906002)(606006)(106356001)(25786009)(6116002)(790700001)(386003)(6496006)(3846002)(956004)(8676002)(446003)(11346002)(84326002)(5660300001)(33964004)(53546011)(59450400001)(52116002)(76176011)(68736007)(97736004)(33896004)(84116003)(6666003)(1420700001)(14726001)(71636004)(50226002)(81166006)(81156014)(8936002)(21314002); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR01MB1837; H:Kallei7; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
Received-SPF: None (protection.outlook.com: ingate.com does not designate permitted sender hosts)
X-Microsoft-Exchange-Diagnostics: 1;VI1PR01MB1837;23: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
X-Microsoft-Antispam-Message-Info: HbyWNTDDBuRbfhgGrc4MV0mygLlkxHzcTNwZn2evxjuTxMo2+Rza8BnrW7MxdvEP6Cbky0/SZMUHyD2MnTD7n/+XjS/z71OlSG/yQPkXddAylQyaiW+sLM3cML2BA2jNIwvhzZL+SrUIse+B+O0SKeVnoeapJX4sNGgWHrgPT3JnnCuRv0bo9NOKN5Xz8TMX
X-Microsoft-Exchange-Diagnostics: 1; VI1PR01MB1837; 6:KQAN+6XdxZUvRBm1xJtIVPcf1ed/DF++iJr2qBNesrpv43lHr98ItVCyJDRkqdqvMsERcBQ/8/scC9RrV2jqtEU+RvH+BqPFZWadWwVSTwPgQM7eTW+Vg8Hsz/KANd1qT7zQmnso2UJKKZwQtoxR166ks3uwjZuG5u1nP4bByBY3FoLWJ3Yxcuo9Xpni9d/7AHUGuWZfKK4MA3rNz06iUEIurK9kwpRP1RSxjOSpPyNUwVSTL88YgN80iDDEM+bX62rjVq2JW5ecCewnxTfx+QVfaYMwXcd7i/Ltz+9Hd8j1tDkUKPdTaaQCn8JR5Na+TFeKlkXgy1BRRSrxABJ6sOhfjKsk6Le6Xyl6VxAykHqgTJ1ePLjXyAAe3E6P4aZgU54w3+FAF1y6wCjNjEcOmpQdlJEWN3rMDF8222PoCmU4ErThsMTF4udhi0BaeWbw4vvLPgqxs4U6qJpnG+By+Q==; 5:WuIphhuKe2OU8h+fVX3KGUqfX/1hd0uEI0YVCJaG8/OEM/qrlu5ZA5cVf4kmtbHVXVbvUr28bN++/JMHjTmuwCYn2HWOXGdNh25Srw86QpHFSNuwRRpUwsw3nM1lbriJxmUi786XQQzGtxR5RJrRjV4bZUGLLXI6w9YJUKrvKRo=; 24:u2Wwh7vn6PP4mtKN80BpBUzrVfUZPOefm2hqBV+EHYqKqqSoybhUImX2x85Aigmxxab813v+7IT7C+GozOkSCkBqYFVSdLnNs0BT3OGksmE=
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-Microsoft-Exchange-Diagnostics: 1; VI1PR01MB1837; 7:zn8wwgSnrplayuVAtb9QeXuZr0LAycaUHAHMIK3epC++TiYSbLCV/ocU92elGDDTyFjpsLPkoX3+iyG+29Bb/eAC+DYw5ZY9kHhwPCHi4zfWgVJ5URBCJlFcLqaYdY2zsi3cYiEdO0PpoP/4+Q7JWJqR2u5gqrBw8Jo2Nuj0ewsQVp7UrDikxn+4OuqFOmQ16Q7CkFKjeL7mRTaAuQEN1TeUIDHBRKcsc7wVgjNruiWm0NsS5ZfUVFxp5W45ckT3
X-OriginatorOrg: ingate.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Apr 2018 15:54:06.8252 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: ee9b75d0-a2a4-488f-c0a8-08d59b0d76f9
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: c3eda49a-3ed0-46c6-8a9e-d0d8ce3d2fae
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR01MB1837
Archived-At: <https://mailarchive.ietf.org/arch/msg/tram/Uh0M_j-wFgb9hx0_jxAkXaRkqhQ>
Subject: [tram] Multiple allocations SV: I-D Action: draft-ietf-tram-turnbis-15.txt
X-BeenThere: tram@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Discussing the creation of a Turn Revised And Modernized \(TRAM\) WG, which goal is to consolidate the various initiatives to update TURN and STUN." <tram.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tram>, <mailto:tram-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tram/>
List-Post: <mailto:tram@ietf.org>
List-Help: <mailto:tram-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tram>, <mailto:tram-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Apr 2018 15:54:18 -0000

Justin> It's not clear to me why multiple addresses of the same family are ever needed

SIMPLY: Real-time media is not only over the public Internet

In fact, most of today’s telephony VoIP goes over other networks that the Internet.

 

Most SIP trunking into enterprise PBXs comes on higher quality pipes for that telephony VoIP, and the large enterprises that  block UDP access from their LANs (and which the https://tools.ietf.org/html/rfc7478 Web Real-Time Communication Use Cases and Requirements as well as your and Benjamin’s  https://www.ietf.org/archive/id/draft-ietf-rtcweb-return-02.txt 

have the aim of supporting) most often ALSO have a higher quality WANs between their branch offices. There is big business putting VoIP over those networks (today it is SIP based using SBCs, future will use WebRTC and Network Provided Turn-servers.

 

And a third need is in even seen in home access routers: Those telephony RJ11 FXS-ports you see on them, are typically connected to SPs VoIP higher quality than Internet networks (maybe an IMS network). There is a lot of policy based routing going in, especially with real-time media.

 

For doing that with ICE/TURN and network provided TURN server on the LAN, the “TURN Proxy” as you call it, simply needs the multiple Allocation. It is a simple and elegant solution (You would NOT like the alternative of addressing several TURN servers (auto discovered) on the LAN from the Client). 

 

Justin> and even if we supported this, how the client would be expected to select between them

Do you see problems with the approach of offering all and selecting the first that works, just like Happy Eyeballs?

 

I don’t have SSODA background and not so much HTTPS proxy background as you – More from real-time communication with SIP VoIP and arranging  NAT/Firewall traversal using SBC (don’t like that misused name on our products that are really SIP aware firewalls in line with the MIDCOM work from the time before ICE/TURN/STUN) which may be why we see different needs. 

 

I’m not saying anything of that SSODA is wrong or work wasted – on the contrary – I want it generalized because we need it! 

 

Olle, I also think there one day will (have to be) a separate document that … clearly how network-provided TURN-servers is supposed to work (there is more that should/could be done in there also), but now we need have the base standards to support instead of hinder it, which was one thing TRAM was supposed to achieve..

 

Olle> security section of RFC 8155 … On the other hand, I don’t really like how it was added to that RFC

It was the other way around…

The TRAM intent of what became https://www.rfc-editor.org/rfc/pdfrfc/rfc8155.txt.pdf  was (from mile stone) “TURN server discovery mechanism for enterprises and ISPs to IESG” that is Network Provided TURN server in local or access network.

 

The intent was NOT Brandon’s Network Provided TURN servers that are OUTSIDE the local or access network and it is very unfortunate that https://www.rfc-editor.org/rfc/rfc8155.txt took the approach “This document describes three discovery mechanisms, so as to maximize the opportunity for discovery, based on the network in which the TURN client finds itself.” (We definitely don’t want to find Brandon’s turn servers when trying to discover the very private TURN server on the LAN – unfortunately making RFC 8155 more or less useless for its intended purpose (under my protest).

 

/Karl

Från: Justin Uberti [mailto:juberti@google.com] 
Skickat: den 3 april 2018 07:03
Till: Olle E. Johansson
Kopia: Brandon Williams; Simon Perreault; TirumaleswarReddy_Konda@mcafee.com; tram@ietf.org; Karl Stahl
Ämne: Re: [tram] Multiple allocations SV: I-D Action: draft-ietf-tram-turnbis-15.txt

 

I spent time with Pal and others coming up with the initial dual allocation concept (SSODA) and there are clear reasons for this approach (as discussed in the intro of the original SSODA doc).

 

It's not clear to me why multiple addresses of the same family are ever needed though, and even if we supported this, how the client would be expected to select between them. It seems like a large expansion of scope beyond the goals of SSODA.

 

On Mon, Apr 2, 2018 at 11:47 AM Olle E. Johansson <oej@edvina.net> wrote:

Hi!

Well, since Network-provided servers was added to the security section of RFC 8155, I kind of think it’s now in scope for
everything TURN and from that standpoint I do understand Karl’s objections.

On the other hand, I don’t really like how it was added to that RFC and like the idea of a separate document that
clears this mess up and explains clearly how network-provided TURN-servers is supposed to work, the requirements
and additions to the TURN protocol.

The problem with that is that implementors may think it’s just an add-on and not implement it in the TURN client
implementations, which would be harmful in the long run.

Question: Will adding operations or modifying existing ones in a new document make it a mandatory
part of the TURN protocol, an update to the TURN RFC (turnbis as an RFC that is)?

/O




> On 2 Apr 2018, at 18:46, Brandon Williams <brandon.williams@akamai.com> wrote:
>
> Karl,
>
> There is no WG decision to hinder this, simply a disagreement about approach.
>
> Some of us (the editors in particular) have been working on the turnbis draft for quite some time. It went into WGLC several months ago and it is already well behind the originally agreed schedule in the charter.
>
> Considering the fact that this is not something that was ever called out previously, we are only questioning why it has suddenly become critical to expand the scope of turnbis and thus delay publishing even further.
>
> If there were already a draft that explains the rationale, use cases, and protocol changes, it would be easier to assess the impact and consider inclusion. This was the path followed by a few other new capabilities that were eventually rolled directly into turnbis.
>
> If the WG came to the conclusion that we should not delay turnbis any further but instead should advance the capability as a new RFC candidate, we would already be in a good position to that if we had a draft in hand. If the WG decided to include this in turnbis, we would already have text available.
>
> IOW, I am only resisting the idea of expanding the scope of turnbis without WG consensus to do so; I am not resisting your proposal itself. The suggestion that you take the time to write down your idea in I-D format seems like a good way for you to drive the required WG discussion.
>
> --Brandon
>
> On 03/22/2018 05:17 PM, Karl Stahl wrote:
>> No and this draft cannot be approved without the generalization I have pointed out.
>> I really don’t understand why we are having this resistance.
>> Already the second paragraph of the Abstract states:
>> The TURN protocol was designed to be used as part of the ICE
>>    (Interactive Connectivity Establishment) approach to NAT traversal,
>>    though it also can be used without ICE.
>> And further in the Introduction
>> TURN was designed as one piece in the larger ICE approach to NAT
>>    traversal.  Implementors of TURN are *_urged_* to investigate ICE and
>>    seriously consider using it for their application.
>> **
>> I cannot imagine that there is some WG decision to hinder ICE usage for network provided TURN servers EXCEPT FOR EXACTLY BRANDON’S NETWORK.
>> For now I refrain from writing/debating more – which would override the effort of what is required to generalize as asked.
>> Please be happy that most of the dual allocation work done, can be reused to fulfill the generalization.
>> Tiru and Brandon are encouraged to read the TRAM charter …
>> /Karl
>> *Från:*Simon Perreault [mailto:sperreault@jive.com]
>> *Skickat:* den 21 mars 2018 18:13
>> *Till:* Brandon Williams
>> *Kopia:* Konda, Tirumaleswar Reddy; Olle E. Johansson; Karl Stahl; tram@ietf.org
>> *Ämne:* Re: [tram] Multiple allocations SV: I-D Action: draft-ietf-tram-turnbis-15.txt
>> 2018-03-21 17:05 GMT+00:00 Brandon Williams <brandon.williams@akamai.com <mailto:brandon.williams@akamai.com>>:
>> Chairs, Any suggestions on approach?
>> The proposal on the table is for Karl+Olle to write their idea into a new draft.
>> Karl+Olle, can you guys live with that?
>> Simon
>> **********************
>> Let me explain more clearly why multiple allocations is needed:
>> ICE is about finding all/many paths for the media, e.g. with the help of
>> TURN servers.
>> Those paths are not over ONE IPv4 network, over ONE IPv6 network or EXACTLY
>> ONE OF EACH.
>> If fact, it is more common that you have several IPv4 networks paths.
>> Now that we have network provided TURN servers, you only ask for Allocation
>> once (contrary to application provided TURN servers, where you can be
>> directed to Allocate several times.) and thus we need all relay addresses in
>> one allocation request.
>> Wasn't that the reason dual allocation was requested? The need for multiple
>> allocation is stronger!
>> Please address this, e.g. like below (seems you are almost there).
>> /Karl
>> ******************* Previous *******************
>> Allowing a turn allocation to return multiple relayed transport addresses,
>> beyond ONE IPv4 and ONE IPv6 (which may sit on the same or on different
>> interfaces/network segments), seems like very small step now when the dual
>> allocation was put in place in this draft. We certainly need it (some
>> reasons below) if TURN is going to be used where needed and we cannot wait
>> for any additional draft.
>> Seems like it is sufficient to extent this table (found in draft 14) with 3
>> new values (as shown):
>> 16.  STUN Attributes
>>    This STUN extension defines the following attributes:
>>      0x000C: CHANNEL-NUMBER
>>      0x000D: LIFETIME
>>      0x0010: Reserved (was BANDWIDTH)
>>      0x0012: XOR-PEER-ADDRESS
>>      0x0013: DATA
>>      0x0016: XOR-RELAYED-ADDRESS
>>      0x0017: REQUESTED-ADDRESS-FAMILY
>>      0x0018: EVEN-PORT
>>      0x0019: REQUESTED-TRANSPORT
>>      0x001A: DONT-FRAGMENT
>>      0x0021: Reserved (was TIMER-VAL)
>>      0x0022: RESERVATION-TOKEN
>>      TBD-CA: ADDITIONAL-ADDRESS-FAMILY
>> ADDITIONAL-ADDRESS-ALL
>> ADDITIONAL-ADDRESS-ALLV4
>> ADDITIONAL-ADDRESS-ALLV6
>>      TBD-CA: ADDRESS-ERROR-CODE
>>      TBD-CA: ICMP
>> Actually, browsing through the draft for ADDITIONAL-ADDRESS-FAMILY, very
>> little text seems to be added for generalization to  ADDITIONAL-ADDRESS-xxx.
>> Almost everything applies to ADDITIONAL-ADDRESS-xxx and can be reused.
>> ADDITIONAL-ADDRESS-ALL should be the default for any modern TURN client.
>> Check! - We need this now.
>> Thanks,
>> Karl
>
> --
> Brandon Williams; Chief Architect
> Cloud Networking; Akamai Technologies Inc.
>
> _______________________________________________
> tram mailing list
> tram@ietf.org
> https://www.ietf.org/mailman/listinfo/tram

_______________________________________________
tram mailing list
tram@ietf.org
https://www.ietf.org/mailman/listinfo/tram