Re: [tram] [Tsv-art] Tsvart last call review of draft-ietf-tram-turnbis-25

Joe Touch <touch@strayalpha.com> Tue, 11 June 2019 18:03 UTC

Return-Path: <touch@strayalpha.com>
X-Original-To: tram@ietfa.amsl.com
Delivered-To: tram@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8D8F3120045; Tue, 11 Jun 2019 11:03:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.219
X-Spam-Level:
X-Spam-Status: No, score=-1.219 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NEUTRAL=0.779] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=strayalpha.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Cb9kA1jmOftO; Tue, 11 Jun 2019 11:03:29 -0700 (PDT)
Received: from server217-3.web-hosting.com (server217-3.web-hosting.com [198.54.115.226]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BAAB6120018; Tue, 11 Jun 2019 11:03:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=strayalpha.com; s=default; h=To:References:Message-Id:Cc:Date:In-Reply-To: From:Subject:Mime-Version:Content-Type:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=Ee0hwCJM1yMVoKVuNSIyzaxPGAqvCHMgjM6RrJvMv9g=; b=KkoJ6l0Uh39gq/3dvjspm0hkF iqVmS2AQDoqGzik627zaRPpeyHf25BzJZ+mX6Q6WxFdvMOXUIWpnNh9eylqwNDO/6f9nJuZNreN6X 0QcF2dS9TvalmYJDlbd6vr+KArEQI3jNJbkHP72WfAKpGYT5QulksO6HqQyLybXhwjGW0F99/2cs1 v4fBALO+yGYs6mTwhTIXj32I/jBGM9AmrMzhIgy+M/vSm+KjWFhm7TMExMcFC5ZEg7M6KWCuLM8bJ OrWlAtLMnPo1DGgBcr8ZkjivQIeEgEesW50QNDyEeiFwTHlfq56Xk30+e23tPOeDPNHoAmv25Z2iP iUs3Jdj/Q==;
Received: from [38.64.80.138] (port=54228 helo=[172.21.13.154]) by server217.web-hosting.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.92) (envelope-from <touch@strayalpha.com>) id 1hal7D-001Yoy-Fj; Tue, 11 Jun 2019 14:03:28 -0400
Content-Type: multipart/alternative; boundary="Apple-Mail=_DFB79A66-E38A-4159-BE57-239F251C9D53"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
From: Joe Touch <touch@strayalpha.com>
In-Reply-To: <HE1PR0701MB252250AE4E7C158F985B0CC895ED0@HE1PR0701MB2522.eurprd07.prod.outlook.com>
Date: Tue, 11 Jun 2019 11:03:22 -0700
Cc: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>, "tsv-art@ietf.org" <tsv-art@ietf.org>, "draft-ietf-tram-turnbis.all@ietf.org" <draft-ietf-tram-turnbis.all@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "tram@ietf.org" <tram@ietf.org>
Message-Id: <D9A01E28-F9FB-4C86-AFD3-A2BA8D89C340@strayalpha.com>
References: <155971464360.28104.6837263931145163343@ietfa.amsl.com> <DM5PR16MB170560F51A9F7C281A9BC752EA170@DM5PR16MB1705.namprd16.prod.outlook.com> <F306B122-79F3-4C7A-8CE2-1C094D9F0FCC@strayalpha.com> <DM5PR16MB1705A4C370C4405AFFD63546EA100@DM5PR16MB1705.namprd16.prod.outlook.com> <5F2F8A3B-2887-4107-81E2-B4E222A4044E@strayalpha.com> <DM5PR16MB1705BD4E31370D2F5A179F17EA130@DM5PR16MB1705.namprd16.prod.outlook.com> <2C6B5776-CB95-4607-8D0C-07FDE2F6D515@strayalpha.com> <DM5PR16MB1705638AD29F3288E4AC0952EAED0@DM5PR16MB1705.namprd16.prod.outlook.com> <HE1PR0701MB252250AE4E7C158F985B0CC895ED0@HE1PR0701MB2522.eurprd07.prod.outlook.com>
To: Magnus Westerlund <magnus.westerlund@ericsson.com>
X-Mailer: Apple Mail (2.3445.9.1)
X-OutGoing-Spam-Status: No, score=-0.5
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - server217.web-hosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - strayalpha.com
X-Get-Message-Sender-Via: server217.web-hosting.com: authenticated_id: touch@strayalpha.com
X-Authenticated-Sender: server217.web-hosting.com: touch@strayalpha.com
X-Source:
X-Source-Args:
X-Source-Dir:
X-From-Rewrite: unmodified, already matched
Archived-At: <https://mailarchive.ietf.org/arch/msg/tram/uAjt9dDXQ_G2nhCyaPZZy1WeKug>
Subject: Re: [tram] [Tsv-art] Tsvart last call review of draft-ietf-tram-turnbis-25
X-BeenThere: tram@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussing the creation of a Turn Revised And Modernized \(TRAM\) WG, which goal is to consolidate the various initiatives to update TURN and STUN." <tram.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tram>, <mailto:tram-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tram/>
List-Post: <mailto:tram@ietf.org>
List-Help: <mailto:tram-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tram>, <mailto:tram-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jun 2019 18:03:33 -0000

Hi, all,

Here are my key points:

- whether you deal with TCP options or simply ignore those on incoming connections and use defaults on outgoing, the issue needs to be addressed - as well as its impact on your use.
- UDP options are not experimental; they’re standards-track; it could be mentioned here non-normatively as a possible workaround to the IP fragmentation issue.

Finally, IMO, assuming that RTP/RTCP can or should provide extended functions that might already be provided by existing TCP options or emerging UDP options seems like both wasted effort and a failed opportunity to tune the transport as it was intended.

Overall, the point is that simply ignoring this issue is insufficient - at a minimum, this doc needs to clearly state that this issue is being ignored and why, as well as addressing that issue in the security sections.

Finally, I’m quite bothered by the glib idea that transport packets can simply be translated into each other either between two TCP connections or between TCP and UDP. The notion is simply false; TCP doesn’t preserve message boundaries and TCP segments are not guaranteed to match application message boundaries. 

I.e., the transport implications of this “hack” are inadequately addressed.

Joe

> On Jun 11, 2019, at 1:28 AM, Magnus Westerlund <magnus.westerlund@ericsson.com> wrote:
> 
> Hi Joe and Tiru, 
> 
> May I hazard a guess why this have not arisen is that there are no transport protocol options that makes sense to use end-to-end and are not protocol specific. Thus, in UDP <-> TCP translations by TURN server there has so far not been a need to carry any of them over. Joe, can you think of any that would make sense? 
> 
> For UDP <-> UDP the experimental proposal for UDP options I don't see that we can require this specification to have to specify that. I do think it is an interesting question for https://datatracker.ietf.org/doc/draft-ietf-tsvwg-udp-options/ <https://datatracker.ietf.org/doc/draft-ietf-tsvwg-udp-options/> if that should write more about what to do with the options when performing translation operations? 
> 
> When it comes to RTP and RTCP that is widely used over TURN relays when those applications need extended functionality they have gone ahead and extended RTP/RTCP rather than attempting to affect lower layers where other entities than the end-points are required to be upgraded.
> 
> Cheers
> 
> Magnus
> 
> 
> 
> 
> On 2019-06-11 07:20, Konda, Tirumaleswar Reddy wrote:
>> Hi Joe,
>>  
>> I meant the specifications that use TURN (ICE, SIP and WebRTC) do not discuss setting any TCP option for application data (RTP, RTCP and WebRTC data channels).  Please note TCP is only used as fallback transport only if UDP traffic is blocked to the TURN server.
>> TURN has been widely deployed in the field, and there was no discussion in the WG to explicitly handle TCP options.
>>  
>> Cheers,
>> -Tiru
>>  
>> From: Joe Touch <touch@strayalpha.com> <mailto:touch@strayalpha.com> 
>> Sent: Monday, June 10, 2019 7:59 PM
>> To: Konda, Tirumaleswar Reddy <TirumaleswarReddy_Konda@McAfee.com> <mailto:TirumaleswarReddy_Konda@McAfee.com>
>> Cc: tsv-art@ietf.org <mailto:tsv-art@ietf.org>; draft-ietf-tram-turnbis.all@ietf.org <mailto:draft-ietf-tram-turnbis.all@ietf.org>; ietf@ietf.org <mailto:ietf@ietf.org>; tram@ietf.org <mailto:tram@ietf.org>
>> Subject: Re: [Tsv-art] [tram] Tsvart last call review of draft-ietf-tram-turnbis-25
>>  
>> CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe.
>> 
>> Hi, Tiru,
>> 
>> 
>> On Jun 9, 2019, at 11:43 PM, Konda, Tirumaleswar Reddy <TirumaleswarReddy_Konda@McAfee.com <mailto:TirumaleswarReddy_Konda@McAfee.com>> wrote:
>>  
>> On Jun 7, 2019, at 4:39 AM, Konda, Tirumaleswar Reddy
>> <TirumaleswarReddy_Konda@mcafee.com <mailto:TirumaleswarReddy_Konda@mcafee.com>> wrote:
>> 
>> 
>> The specification has two sections 14 and 15 (IP Header Fields for
>> UDP-to-
>> UDP translation and IP Header Fields for TCP-to-UDP translation) to
>> discuss direct translations. https://tools.ietf.org/html/rfc5766 <https://tools.ietf.org/html/rfc5766> only
>> covered UDP-to- UDP translation in Section 12.
>> 
>> Yes, but both sections ignore the impact of transport options - both
>> current for TCP and pending for UDP. These are ignored both when
>> packets with such transport options are received (the input packet to
>> the translation) and whether / how they are used on transmit (the
>> output packet)
>> 
>> TURN is used to relay real-time data (e.g. audio and video streams)
>> and the approach taken by VOIP related specifications is to avoid
>> fragmentation for RTP packets
>> 
>> Sec 2.8 mentions RTP as one use case envisioned (at this point, it’d be fair to
>> ask this revision to clarify whether that turned out to be true). But it isn’t
>> indicated as the only use case.
>> 
>> The draft says TURN is invented to support multimedia sessions signaled using SIP and is typically used with ICE. TURN is also used with WebRTC, and WebRTC data channels also 
>> avoid IP fragmentation (see https://tools.ietf.org/html/draft-ietf-rtcweb-data-channel-13 <https://tools.ietf.org/html/draft-ietf-rtcweb-data-channel-13>). 
>>  
>> The application protocols TURN is designed for or typically used for is not relevant to my point above, unless you’re claiming that these uses never use transport options (which is doubtful for TCP, for which some transport options are pervasively used by default).
>> 
>> 
>> 
>> 
>> 
>> Regardless, though, this doesn’t impact the concern raised above. RTP could
>> still employ transport options.
>> 
>> I checked again and don't see any RTP, Back-to-Back User Agents (B2BUAs), SIP proxies and WebRTC gateway specifications discussing transport options for translations.
>>  
>> The fact that others have this gap does not justify continuing to fail to address it in this document. If anything, it makes it that much more important to address.
>>  
>> Joe
> 
> -- 
> 
> Magnus Westerlund 
> 
> ----------------------------------------------------------------------
> Network Architecture & Protocols, Ericsson Research
> ----------------------------------------------------------------------
> Ericsson AB                 | Phone  +46 10 7148287
> Torshamnsgatan 23           | Mobile +46 73 0949079
> SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com <mailto:magnus.westerlund@ericsson.com>
> ----------------------------------------------------------------------
> _______________________________________________
> Tsv-art mailing list
> Tsv-art@ietf.org
> https://www.ietf.org/mailman/listinfo/tsv-art