Re: [tram] Request to update STUN's IANA registration in STUNbis work

Marc Petit-Huguenin <petithug@acm.org> Fri, 16 May 2014 19:37 UTC

Return-Path: <petithug@acm.org>
X-Original-To: tram@ietfa.amsl.com
Delivered-To: tram@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59DE81A01EE for <tram@ietfa.amsl.com>; Fri, 16 May 2014 12:37:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.236
X-Spam-Level:
X-Spam-Status: No, score=-1.236 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_PASS=-0.001, SPF_SOFTFAIL=0.665] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oM4jmOdDAjHQ for <tram@ietfa.amsl.com>; Fri, 16 May 2014 12:37:05 -0700 (PDT)
Received: from implementers.org (implementers.org [IPv6:2604:3400:dc1:41:216:3eff:fe5b:8240]) by ietfa.amsl.com (Postfix) with ESMTP id 7A2E31A015F for <tram@ietf.org>; Fri, 16 May 2014 12:37:05 -0700 (PDT)
Received: from [IPv6:2001:5c0:1101:2d00:74c0:8cb4:a9d9:6159] (unknown [IPv6:2001:5c0:1101:2d00:74c0:8cb4:a9d9:6159]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (Client CN "Marc Petit-Huguenin", Issuer "implementers.org" (verified OK)) by implementers.org (Postfix) with ESMTPS id 515F220731; Fri, 16 May 2014 21:36:54 +0200 (CEST)
Message-ID: <537668D3.3020501@acm.org>
Date: Fri, 16 May 2014 13:36:51 -0600
From: Marc Petit-Huguenin <petithug@acm.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Icedove/24.5.0
MIME-Version: 1.0
To: Simon Perreault <simon@per.reau.lt>, tram@ietf.org
References: <536734AA.2050006@ericsson.com> <536A0326.7040704@getjive.com> <53765692.60509@per.reau.lt>
In-Reply-To: <53765692.60509@per.reau.lt>
X-Enigmail-Version: 1.6+git0.20140323
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/tram/ZdJX6qINi649En6UPIGEBFGiXJE
Subject: Re: [tram] Request to update STUN's IANA registration in STUNbis work
X-BeenThere: tram@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussing the creation of a Turn Revised And Modernized \(TRAM\) WG, which goal is to consolidate the various initiatives to update TURN and STUN." <tram.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tram>, <mailto:tram-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tram/>
List-Post: <mailto:tram@ietf.org>
List-Help: <mailto:tram-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tram>, <mailto:tram-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 May 2014 19:37:07 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 05/16/2014 12:18 PM, Simon Perreault wrote:
>> +----------------+ | 127 < B < 192 -+--> forward to RTP |
>> | packet -->  |  19 < B < 64  -+--> forward to DTLS |                | |
>> B < 2   -+--> forward to STUN +----------------+
> 
> Here's my reasoning...
> 
> I'm pretty sure the RFC 5764 authors looked at RFC 3489, for which B < 2
> would have been correct. The fact that draft-mcgrew-tls-srtp-00, which did
> contain the above graph, was published long before RFC 5389 was reinforces
> that hypothesis.

But the STUN usage is ICE connectivity check, which explicitly forbids RFC
3489 (see section 7 of RFC 5245).

> 
> With RFC 5389, B < 64 would be necessary, ergo the conflict with DTLS.
> 
> I'm unable to find a justification for 19 < B < 64 --> DTLS. Can anyone
> please spell it out for me? I'm just going to assume it is correct.

It's not, as it restricts TLS ContentType:

http://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-5.

At a minimum 0-19 and 64-255 should be marked as reserved.

> 
> Fact: There are currently no registered STUN methods which would actually
> cause STUN packets to be wrongly forwarded to DTLS by an implementation of
> RFC 5764.
> 
> Fact: B < 2 limits the number of STUN methods to 128. There are currently
> 13 methods registered. I know of no plans to register many STUN methods
> such that a limit of 128 would become problematic.

TURN had a limited deployment until now.  With WebRTC I expect more TURN
extensions coming and I myself have some currently being designed.  So that's
certainly not the right time to restrict the number of methods possible.

> 
> Fact: If STUN-bis restricts to 128 the range of STUN methods, current 
> implementations, of either STUNv1, STUNv2, or RFC 5764, will *not* need to
> be modified. STUN-bis could split on 0-63 for IETF Review and 64-127 for
> Designated Expert so that we can keep our dual registration procedures.

Maybe.  The main problem is that (implicit) assignments were done in TWO IANA
registries without following the process.  That's what need to stop.

> 
> Opinion: The only disadvantage I can see to making this change in STUN-bis
> would be a loss of STUN method range. I think we can live with it. If at
> some point we can't live with it anymore, which I doubt will ever happen,
> then we would need to revise both RFC 5764 and STUN-bis. There's no need
> for a revision of RFC 5764 now.

Or, we can reclaim 2-63 for STUN now and not have to pull an ugly EDNS(x)-like
workaround later.

- -- 
Marc Petit-Huguenin
Email: marc@petit-huguenin.org
Blog: http://blog.marc.petit-huguenin.org
Profile: http://www.linkedin.com/in/petithug
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=qfng
-----END PGP SIGNATURE-----