Re: [tram] [Tsv-art] Tsvart last call review of draft-ietf-tram-turnbis-25

"Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com> Fri, 21 June 2019 09:36 UTC

Return-Path: <TirumaleswarReddy_Konda@mcafee.com>
X-Original-To: tram@ietfa.amsl.com
Delivered-To: tram@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFEF21201D4; Fri, 21 Jun 2019 02:36:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.308
X-Spam-Level:
X-Spam-Status: No, score=-4.308 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mcafee.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k26FmoxkpkI5; Fri, 21 Jun 2019 02:36:20 -0700 (PDT)
Received: from DNVWSMAILOUT1.mcafee.com (dnvwsmailout1.mcafee.com [161.69.31.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8917F120098; Fri, 21 Jun 2019 02:36:17 -0700 (PDT)
X-NAI-Header: Modified by McAfee Email Gateway (5500)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mcafee.com; s=s_mcafee; t=1561109198; h=From: To:CC:Subject:Thread-Topic:Thread-Index:Date: Message-ID:References:In-Reply-To:Accept-Language: Content-Language:X-MS-Has-Attach:X-MS-TNEF-Correlator: dlp-product:dlp-version:dlp-reaction:authentication-results: x-originating-ip:x-ms-publictraffictype:x-ms-office365-filtering-correlation-id: x-microsoft-antispam:x-ms-traffictypediagnostic: x-ms-exchange-purlcount:x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers:x-forefront-prvs: x-forefront-antispam-report:received-spf:x-ms-exchange-senderadcheck: x-microsoft-antispam-message-info:Content-Type: MIME-Version:X-MS-Exchange-CrossTenant-Network-Message-Id: X-MS-Exchange-CrossTenant-originalarrivaltime: X-MS-Exchange-CrossTenant-fromentityheader: X-MS-Exchange-CrossTenant-id:X-MS-Exchange-CrossTenant-mailboxtype: X-MS-Exchange-CrossTenant-userprincipalname: X-MS-Exchange-Transport-CrossTenantHeadersStamped: X-OriginatorOrg:X-NAI-Spam-Flag:X-NAI-Spam-Threshold: X-NAI-Spam-Score:X-NAI-Spam-Version; bh=k yl/jGXf+bEWKjaNC+v3nXtzivVOr+ITYjWaGkPUG9 Q=; b=GiP3aodqt0ieKZa8egOXmxB1sydoOk7JdHt2hq9Ksg+L VnWfL/U5BlHK8LYQMufMqMz56r8czuMS2NJW6boAq6S6AKw0nm zeJYyTMns5MI87GNovAQ1Dx6V0C8zYUR03leaJIL4RDHGc37fz 8lN8VO1F3AGkBS0BchONYfgzQjw=
Received: from DNVEXAPP1N04.corpzone.internalzone.com (DNVEXAPP1N04.corpzone.internalzone.com [10.44.48.88]) by DNVWSMAILOUT1.mcafee.com with smtp (TLS: TLSv1/SSLv3,256bits,ECDHE-RSA-AES256-SHA384) id 2a17_b62b_14ed2fe8_88fc_4589_807f_b675fe594bc6; Fri, 21 Jun 2019 03:26:37 -0600
Received: from DNVEXAPP1N04.corpzone.internalzone.com (10.44.48.88) by DNVEXAPP1N04.corpzone.internalzone.com (10.44.48.88) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Fri, 21 Jun 2019 03:35:10 -0600
Received: from DNVO365EDGE1.corpzone.internalzone.com (10.44.176.66) by DNVEXAPP1N04.corpzone.internalzone.com (10.44.48.88) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Fri, 21 Jun 2019 03:35:10 -0600
Received: from NAM01-BN3-obe.outbound.protection.outlook.com (10.44.176.242) by edge.mcafee.com (10.44.176.66) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Fri, 21 Jun 2019 03:35:05 -0600
Received: from DM5PR16MB1705.namprd16.prod.outlook.com (10.172.44.147) by DM5PR16MB2373.namprd16.prod.outlook.com (52.132.142.164) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1987.13; Fri, 21 Jun 2019 09:35:04 +0000
Received: from DM5PR16MB1705.namprd16.prod.outlook.com ([fe80::3d0a:95ec:9842:68f7]) by DM5PR16MB1705.namprd16.prod.outlook.com ([fe80::3d0a:95ec:9842:68f7%9]) with mapi id 15.20.1987.014; Fri, 21 Jun 2019 09:35:04 +0000
From: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>
To: Joe Touch <touch@strayalpha.com>
CC: Magnus Westerlund <magnus.westerlund@ericsson.com>, "tram@ietf.org" <tram@ietf.org>, Brandon Williams <brandon.williams@akamai.com>, "draft-ietf-tram-turnbis.all@ietf.org" <draft-ietf-tram-turnbis.all@ietf.org>, "tsv-art@ietf.org" <tsv-art@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>
Thread-Topic: [Tsv-art] [tram] Tsvart last call review of draft-ietf-tram-turnbis-25
Thread-Index: AQHVJeLARC6n0ucJHkeMQsIbR9Bl76ai+JZQgAAP9QCAAAGloIAABJ0AgAAAh9CAAAQQAIAAAWEwgACd7QCAACe0kIAByCyAgAALnoA=
Date: Fri, 21 Jun 2019 09:35:03 +0000
Message-ID: <DM5PR16MB1705519BCB57D895948F4966EAE70@DM5PR16MB1705.namprd16.prod.outlook.com>
References: <155971464360.28104.6837263931145163343@ietfa.amsl.com> <F306B122-79F3-4C7A-8CE2-1C094D9F0FCC@strayalpha.com> <DM5PR16MB1705A4C370C4405AFFD63546EA100@DM5PR16MB1705.namprd16.prod.outlook.com> <5F2F8A3B-2887-4107-81E2-B4E222A4044E@strayalpha.com> <DM5PR16MB1705BD4E31370D2F5A179F17EA130@DM5PR16MB1705.namprd16.prod.outlook.com> <2C6B5776-CB95-4607-8D0C-07FDE2F6D515@strayalpha.com> <DM5PR16MB1705638AD29F3288E4AC0952EAED0@DM5PR16MB1705.namprd16.prod.outlook.com> <HE1PR0701MB252250AE4E7C158F985B0CC895ED0@HE1PR0701MB2522.eurprd07.prod.outlook.com> <D9A01E28-F9FB-4C86-AFD3-A2BA8D89C340@strayalpha.com> <a3bbeb17-e768-9ab2-9f34-3d179fa8fe38@akamai.com> <E41C125D-F3B4-475E-8AD0-124F531F1DC9@strayalpha.com> <DM5PR16MB170564C0438321CC3FDD0ACFEAEF0@DM5PR16MB1705.namprd16.prod.outlook.com> <4C41A2BC-0CBC-42D5-B313-22F9A9D51F6E@strayalpha.com> <DM5PR16MB1705874C023145D26DCB58E6EAEE0@DM5PR16MB1705.namprd16.prod.outlook.com> <edcd66c2-0dfb-8f89-d6a3-53482c433d4e@strayalpha.com> <DM5PR16MB17057CCD4D2543D84254EFD1EAEB0@DM5PR16MB1705.namprd16.prod.outlook.com> <HE1PR0701MB2522DCB2459055A6319C439B95EA0@HE1PR0701MB2522.eurprd07.prod.outlook.com> <DM5PR16MB1705E3EF8260B456A9B02C10EAEA0@DM5PR16MB1705.namprd16.prod.outlook.com> <HE1PR0701MB2522C0A1063877D45985619795EA0@HE1PR0701MB2522.eurprd07.prod.outlook.com> <BD41AC2D-3925-4E11-B1EC-AD24680376AE@strayalpha.com> <DM5PR16MB1705F636477B6234FEA35A04EAE50@DM5PR16MB1705.namprd16.prod.outlook.com> <A47BFD15-B787-484D-A678-698B2C7D77A6@strayalpha.com> <DM5PR16MB1705339D00B060CC7D8366FAEAE50@DM5PR16MB1705.namprd16.prod.outlook.com> <F7645044-C75D-4C52-87A1-514B576A41B6@strayalpha.com> <DM5PR16MB1705CFF84A31E550EB0415C9EAE50@DM5PR16MB1705.namprd16.prod.outlook.com> <125E7AE0-97D6-4BFD-BE1F-F1FB2B74BFB1@strayalpha.com> <DM5PR16MB1705D7AB3DB31338F0905D87EAE50@DM5PR16MB1705.namprd16.prod.outlook.com> <6C2A2BBA-801B-4B17-BFD3-A8235BE2C10C@strayalpha.com> <DM5PR16MB17054AE0DA33AE71D7B44AB3EAE40@DM5PR16MB1705.namprd16.prod.outlook.com> <BC91A2DA-210B-419A-963E-1F50E8D74121@strayalpha.com>
In-Reply-To: <BC91A2DA-210B-419A-963E-1F50E8D74121@strayalpha.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.3.0.8
dlp-reaction: no-action
authentication-results: spf=none (sender IP is ) smtp.mailfrom=TirumaleswarReddy_Konda@McAfee.com;
x-originating-ip: [103.245.47.20]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 119f6ba6-4082-47ca-b66e-08d6f62bbd6e
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:DM5PR16MB2373;
x-ms-traffictypediagnostic: DM5PR16MB2373:
x-ms-exchange-purlcount: 5
x-microsoft-antispam-prvs: <DM5PR16MB2373AF896D13DA15BD213FA6EAE70@DM5PR16MB2373.namprd16.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0075CB064E
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(376002)(39860400002)(346002)(366004)(136003)(51914003)(32952001)(199004)(189003)(6246003)(6436002)(6916009)(72206003)(25786009)(33656002)(316002)(54906003)(4326008)(9686003)(54896002)(6306002)(53936002)(55016002)(68736007)(966005)(236005)(478600001)(8936002)(53546011)(5660300002)(6506007)(86362001)(102836004)(186003)(26005)(81156014)(8676002)(2906002)(66946007)(64756008)(73956011)(81166006)(66476007)(66556008)(66446008)(486006)(7696005)(99286004)(66066001)(52536014)(76176011)(11346002)(446003)(76116006)(476003)(606006)(71200400001)(71190400001)(14454004)(7736002)(229853002)(5024004)(80792005)(256004)(74316002)(3846002)(6116002)(790700001)(9326002)(85282002); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR16MB2373; H:DM5PR16MB1705.namprd16.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: McAfee.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: oGi9qJjwyLst2cHL7IuVmolFd7XHOFUXWKINm+NBhNNyCCCv/ssXCL9qfxlbrO1NwwMAEhR6zy7xGiO7jfR/2B7EmdZoMsn5dpKWkjASILKXA/oA3OmkR+aUnixJo7qBFdP9XQhAn0TMGT1rZoYCyEFWIgxss/JyBxM4TAq0Kt8tDBAdQPvHdj1G/Ot34v01PR5H+xUSSm3vWevLRVb2jLOD7ZFSK5ANYNEmWV78YPM23AUy1ce21oPBZX15XCyhrogBqbsPDytLmlTVPSE1FSPzTGmf34EvIJbS5bccyER73A33feB+przKFRJjw6mOiavQWZNdDTa3W9/H7hHZUP0JmbbZSF9JeCs/20B18QlVvbh154o2Ubm8T8+db6JMhkmR//ZqpcZi2716BtIyrCk7Ju25KJSZRIzhiSZMwG8=
Content-Type: multipart/alternative; boundary="_000_DM5PR16MB1705519BCB57D895948F4966EAE70DM5PR16MB1705namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 119f6ba6-4082-47ca-b66e-08d6f62bbd6e
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Jun 2019 09:35:04.0589 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4943e38c-6dd4-428c-886d-24932bc2d5de
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: TirumaleswarReddy_Konda@McAfee.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR16MB2373
X-OriginatorOrg: mcafee.com
X-NAI-Spam-Flag: NO
X-NAI-Spam-Threshold: 15
X-NAI-Spam-Score: 0
X-NAI-Spam-Version: 2.3.0.9418 : core <6573> : inlines <7108> : streams <1825120> : uri <2858515>
Archived-At: <https://mailarchive.ietf.org/arch/msg/tram/wHIblHtKtE7aYnJIlQYfrn4-8FI>
Subject: Re: [tram] [Tsv-art] Tsvart last call review of draft-ietf-tram-turnbis-25
X-BeenThere: tram@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussing the creation of a Turn Revised And Modernized \(TRAM\) WG, which goal is to consolidate the various initiatives to update TURN and STUN." <tram.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tram>, <mailto:tram-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tram/>
List-Post: <mailto:tram@ietf.org>
List-Help: <mailto:tram-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tram>, <mailto:tram-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jun 2019 09:36:24 -0000

Hi Joe,

Please see inline [TR1]

From: Joe Touch <touch@strayalpha.com>
Sent: Friday, June 21, 2019 11:34 AM
To: Konda, Tirumaleswar Reddy <TirumaleswarReddy_Konda@McAfee.com>
Cc: Magnus Westerlund <magnus.westerlund@ericsson.com>; tram@ietf.org; Brandon Williams <brandon.williams@akamai.com>; draft-ietf-tram-turnbis.all@ietf.org; tsv-art@ietf.org; ietf@ietf.org
Subject: Re: [Tsv-art] [tram] Tsvart last call review of draft-ietf-tram-turnbis-25


CAUTION: External email. Do not click links or open attachments unless you recognize the sender and know the content is safe.

________________________________
Hi, Tiru,


On Jun 20, 2019, at 3:46 AM, Konda, Tirumaleswar Reddy <TirumaleswarReddy_Konda@McAfee.com<mailto:TirumaleswarReddy_Konda@McAfee.com>> wrote:

Hi Joe,

Please see inline [TR]
...
This sort of patch isn’t sufficient. It doesn’t address the confusion throughout section 15 as to what’s actually happening.

Sec 15 shouldn’t talk about “setting” IP header values at all; it should refer to “configuring transport sessions” in the desired ways. Otherwise you’re implying direct packet-level conversion. Even the title of that section is a problem in this regard.

[TR] What title do you want me to use for Section 15 ?

Sec 14 could be “UDP relay”

Sec 15 could be “Mixed transport relay” or “TCP/UDP and UDP/TCP relay”

In both cases, the issue isn’t to focus on the IP header fields.

[TR1] Okay. Updated Section 14 title  to “UDP-to-UDP relay”, Section 15 “TCP-to-UDP relay” and added new Section 16 “UDP-to-TCP relay”

Tthe sections themselves should be revised to similarly refer to transport-level actions, not packet level, e.g.:
15.1 TCP to UDP
              - because DSCP should not vary within a TCP session, there is no packet-level tracking of copying DSCP from TCP to UDP; instead, DSCP would be a property of the TCP session that would be used to configure the UDP socket pair.

[TR] Agreed, but the text looks correct to me. It says “Note, the TCP connection can only use a single DSCP code point so inter flow differentiation is not possible”.

It’s not a note. It’s the point. You don’t set the outgoing to the incoming per se; you set the *TCP connection* to use the DSCP of the first UDP packet.

[TR1] Agreed, updated text as follows:

      The TCP connection can only use a single DSCP
      code point so inter flow differentiation is not possible, see
      Section 5.1 of [RFC7657].  The server sets the outgoing value to
      the DSCP code point used by the TCP connection, unless the server
      includes a differentiated services classifier and marker
        [RFC2474].

              - IP fragmentation control needs to be explained in terms of UDP interactions

[TR] Yes, DONT-FRAGMENT attribute in the TURN message is used to set the DF bit in the outgoing IP header to 1. What specific change are you expecting ?

Again, you’re talking about building a network layer packet header. The point is that you should be describing this in terms of “setting the UDP packet to not fragment”. That is NOT merely IP DF=1; that would only prevent *in-network* fragmentation. You need to tell UDP not to source fragment too.

And all of this should be described in a way that doesn’t imply that the only approach is to have the user build the packet all the way to the IP headers.

Here’s why it matters - an IPv4 packet can *already be source fragmented* and still have the individual fragments set DF=0. DF=0 just means the *network* should not sub-fragment what it receives, not that the packet is “atomic” (not fragmented a the source AND not fragmentable by the network)

[TR1] Got it, Thanks for the clarification. Updated text as follows:
When the server sends a packet to a peer in response to a Send indication containing the DONT-FRAGMENT attribute, then set the outgoing UDP packet to not fragment.


              - IPv6 fragmentation has nothing to do with the received packet (which is TCP

[TR] Same as above,  DONT-FRAGMENT attribute in the TURN message is used to set the DF bit in the outgoing IP header to 1.

The server doesn’t ignore the the fragment fields of the received packets; it uses them to reassemble (by the IP stack). They are ignored in terms of whether to set the *transport* to avoid UDP using source fragmentation. Again, though, this isn’t about setting IP header fields.

[TR1] Okay, fixed as follows:
If the TCP traffic arrives over IPv6, the server relies on the presence of DON’T-FRAGMENT attribute in the send indication to set the outgoing UDP packet to not fragment.


              - IP options are *as default*; it’ isn’t correct that you never use IP options (or are you actively disabling them?)
                              NOTE: that goes for the direct IPv4 to IPv6 translation in section 4 (which is similarly problematic)

[TR]   I am not aware of default IPv4 options and extension headers, and I don’t see any default IPv4 options discussed inhttps://tools.ietf.org/html/rfc6274. What IP4 options and IPv6 extension headers are default ?

By “default” I’m referring to system-wide configurations to use particular IP options. Your description appears to prevent their use; are you actively prohibiting all IP options? Even system-wide defaults, if so configured?

[TR1] No, system defaults are not prohibited.


          RTP/RTCP do not use any IPv4 options and IPv6 extension headers. What is the loss of functionality if IP options and extension headers are not set by the TURN server for outgoing UDP packets to the peer ?

You would be expecting the transport to override a system-wide network default, which may not be possible on some systems.

You can probably just say “use system defaults”.

[TR1] Works for me, updated both IPv4 option and IPv6 extension headers in all sections.


15.2 UDP to TCP
              - the last sentence of the second paragraph seems at odds with the first; the first says “set these once per connection”, it is sufficient IMO.

[TR] Okay, removed the last sentence of the second paragraph.

              -TCP DSCP should be based on the *first* UDP value seen (it could vary)

[TR] No, the client first establishes TCP connection with the server and exchanges TURN messages for allocation and permission, UDP packets can only be sent by the peer after permission is created. Please seehttps://tools.ietf.org/html/rfc7657#section-5.3

OK, but then you need to say *in this section* how you expect to set the TCP DSCP. The text is confusing - it talks about “server-to-client” matching “client-to-server” - that’s just the other direction of the same TCP connection. If you are referring to other endpoints or transport protocols, be specific and clear.

[TR] I will modify the text as follows:
Ignore the incoming DSCP value. When TCP  is used between the client and the server, a single DSCP should be used for all traffic on that TCP connection. Note, TURN/ICE occurs before application data is exchanged.

-Tiru


Cheers,
-Tiru

              - same issue with IP extension headers and options (presumably you use the default

Joe



On Jun 19, 2019, at 8:14 AM, Konda, Tirumaleswar Reddy <TirumaleswarReddy_Konda@McAfee.com<mailto:TirumaleswarReddy_Konda@McAfee.com>> wrote:

Hi Joe,

The IPv4 and IPv6 fragmentation description is specific to TCP-to-UDP relaying between the client and the peer (only for TCP-to-UDP relay, the DF attribute in the TURN message will be used to set the DF bit in the outgoing UDP packet to the peer). To avoid confusion, I have added two new sub-sections:
15.1.  IP Header Fields for TCP-to-UDP relaying and 15.2 IP Header Fields for UDP-to-TCP relaying

Please see the attached updated draft.

Cheers,
-Tiru
_______________________________________________
Tsv-art mailing list
Tsv-art@ietf.org<mailto:Tsv-art@ietf.org>
https://www.ietf.org/mailman/listinfo/tsv-art