From daemon@optimus.ietf.org Thu Nov 1 10:03:40 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20390 for ; Thu, 1 Nov 2001 10:03:39 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id KAA04166 for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 10:03:43 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA03792; Thu, 1 Nov 2001 09:59:35 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA03760 for ; Thu, 1 Nov 2001 09:59:33 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA20265 for ; Thu, 1 Nov 2001 09:59:29 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.2) with SMTP id M2001110114564122258 ; Thu, 01 Nov 2001 14:56:41 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Thu, 1 Nov 2001 14:58:49 -0000 Message-ID: <00533D13955AD411AF3800A0C9B426390EC4AF@ThisAddressDoesNotExist> From: Barry Scott To: "'James Ho'" , midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates Date: Thu, 1 Nov 2001 14:58:42 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C162E5.B2715850" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C162E5.B2715850 Content-Type: text/plain; charset="ISO-8859-1" The policy we need turns out to be the default for many enterprises already. Typical behavour is to prevent UDP from the outside to get inside. But once a UDP packet from the inside is sent to the outside the firewall will pinhole itself to allow return traffic. After a period of inactivity the firewall will close the pinhole, for example after 45 seconds. BArry -----Original Message----- From: James Ho [mailto:jamesho37@hotmail.com] Sent: 31 October 2001 22:20 To: midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates As I understand it, the Davies proposal requires an open UDP port on the firewall for media traversal. I can't think of many/any enterprises being willing to implement such a firewall policy. Or maybe my understanding is faulty?? james _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom ------_=_NextPart_001_01C162E5.B2715850 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom candidates

The policy we need turns out to be the default for = many
enterprises already.

Typical behavour is to prevent UDP from the = outside
to get inside. But once a UDP packet from the = inside
is sent to the outside the firewall will pinhole = itself
to allow return traffic. After a period of = inactivity
the firewall will close the pinhole, for example = after
45 seconds.

        =         BArry

-----Original Message-----
From: James Ho [mailto:jamesho37@hotmail.com]<= /FONT>
Sent: 31 October 2001 22:20
To: midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates


As I understand it, the Davies proposal requires an = open
UDP port on the firewall for media traversal. I = can't think
of many/any enterprises being willing to implement = such a
firewall policy. Or maybe my understanding is = faulty??

james

_______________________________________________________________= __
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C162E5.B2715850-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 1 11:22:35 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA22982 for ; Thu, 1 Nov 2001 11:22:34 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA07279 for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 11:22:38 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA07238; Thu, 1 Nov 2001 11:18:21 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA07209 for ; Thu, 1 Nov 2001 11:18:20 -0500 (EST) Received: from mail1.microsoft.com (mail1.microsoft.com [131.107.3.125]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA22843 for ; Thu, 1 Nov 2001 11:18:15 -0500 (EST) Received: from inet-vrs-01.redmond.corp.microsoft.com ([157.54.8.27]) by mail1.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Thu, 1 Nov 2001 08:17:48 -0800 Received: from 157.54.8.155 by inet-vrs-01.redmond.corp.microsoft.com (InterScan E-Mail VirusWall NT); Thu, 01 Nov 2001 08:17:42 -0800 Received: from red-imc-04.redmond.corp.microsoft.com ([157.54.2.168]) by inet-hub-04.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Thu, 1 Nov 2001 08:17:05 -0800 Received: from win-imc-01.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.39]) by red-imc-04.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Thu, 1 Nov 2001 08:17:05 -0800 Received: from win-msg-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.134]) by win-imc-01.wingroup.windeploy.ntdev.microsoft.com with Microsoft SMTPSVC(6.0.3541.1); Thu, 1 Nov 2001 08:16:18 -0800 X-MimeOLE: Produced By Microsoft Exchange V6.0.6063.0 Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: [midcom] pre-midcom candidates Date: Thu, 1 Nov 2001 08:16:20 -0800 Message-ID: Thread-Topic: [midcom] pre-midcom candidates thread-index: AcFi5dCtFp0BDxujTx6Am4t+Vlkc3wACm1dg From: "Christian Huitema" To: "Barry Scott" , "James Ho" , X-OriginalArrivalTime: 01 Nov 2001 16:16:18.0673 (UTC) FILETIME=[89CDE610:01C162F0] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by optimus.ietf.org id LAA07210 Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 8bit Barry, This is exactly the same firewall requirement as STUN. -----Original Message----- From: Barry Scott [mailto:bscott@ridgewaysystems.com] Sent: Thursday, November 01, 2001 6:59 AM To: 'James Ho'; midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates > The policy we need turns out to be the default for many > enterprises already. > Typical behavour is to prevent UDP from the outside > to get inside. But once a UDP packet from the inside > is sent to the outside the firewall will pinhole itself > to allow return traffic. After a period of inactivity > the firewall will close the pinhole, for example after > 45 seconds. Barry, This is exactly the same requirement as STUN, with the difference that STUN does not require an infrastructure in the middle of the network. -- Christian Huitema _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 1 11:35:32 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA23210 for ; Thu, 1 Nov 2001 11:35:32 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA07886 for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 11:35:36 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA07802; Thu, 1 Nov 2001 11:32:32 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA07773 for ; Thu, 1 Nov 2001 11:32:31 -0500 (EST) Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA23120 for ; Thu, 1 Nov 2001 11:32:26 -0500 (EST) Received: from BobP [63.67.143.2] by acmepacket.com (SMTPD32-7.04) id A91DAA360118; Thu, 01 Nov 2001 11:32:29 -0500 Message-ID: <016501c162f2$6b37a0e0$2300000a@acmepacket.com> From: "Bob Penfield" To: "Barry Scott" , "'James Ho'" , References: <00533D13955AD411AF3800A0C9B426390EC4AF@ThisAddressDoesNotExist> Subject: Re: [midcom] pre-midcom candidates Date: Thu, 1 Nov 2001 11:29:46 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit What percentage of NAT/FW are symmetric as opposed to full-cone as described in the STUN proposal? There is some debate whether or not the interim solution needs to address the symmetric NAT problem. If the great majority of existing FW/NAT are symmetric, we probably need to include it now. (-:bob Robert F. Penfield Chief Software Architect Acme Packet, Inc. 130 New Boston Street Woburn, MA 01801 bpenfield@acmepacket.com ----- Original Message ----- From: "Barry Scott" To: "'James Ho'" ; Sent: Thursday, November 01, 2001 9:58 AM Subject: RE: [midcom] pre-midcom candidates > The policy we need turns out to be the default for many > enterprises already. > > Typical behavour is to prevent UDP from the outside > to get inside. But once a UDP packet from the inside > is sent to the outside the firewall will pinhole itself > to allow return traffic. After a period of inactivity > the firewall will close the pinhole, for example after > 45 seconds. > > BArry > > -----Original Message----- > From: James Ho [mailto:jamesho37@hotmail.com] > Sent: 31 October 2001 22:20 > To: midcom@ietf.org > Subject: RE: [midcom] pre-midcom candidates > > > As I understand it, the Davies proposal requires an open > UDP port on the firewall for media traversal. I can't think > of many/any enterprises being willing to implement such a > firewall policy. Or maybe my understanding is faulty?? > > james > > _________________________________________________________________ > Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom > _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 1 11:53:27 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA23582 for ; Thu, 1 Nov 2001 11:53:26 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA08284 for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 11:53:31 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA08110; Thu, 1 Nov 2001 11:40:41 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA08079 for ; Thu, 1 Nov 2001 11:40:39 -0500 (EST) Received: from pmesmtp01.wcom.com (pmesmtp01.wcom.com [199.249.20.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA23321 for ; Thu, 1 Nov 2001 11:40:34 -0500 (EST) Received: from pmismtp04.wcomnet.com ([166.38.62.39]) by firewall.wcom.com (PMDF V5.2-33 #47837) with ESMTP id <0GM400DBFRMTKL@firewall.wcom.com> for midcom@ietf.org; Thu, 1 Nov 2001 16:40:06 +0000 (GMT) Received: from pmismtp04.wcomnet.com by pmismtp04.wcomnet.com (PMDF V5.2-33 #42258) with SMTP id <0GM400M01RMMRQ@pmismtp04.wcomnet.com>; Thu, 01 Nov 2001 16:40:05 +0000 (GMT) Received: from rccc6131 ([166.34.120.127]) by pmismtp04.wcomnet.com (PMDF V5.2-33 #42258) with ESMTP id <0GM400KEMRLSL2@pmismtp04.wcomnet.com>; Thu, 01 Nov 2001 16:39:29 +0000 (GMT) Date: Thu, 01 Nov 2001 10:39:22 -0600 From: "Christopher A. Martin" Subject: RE: [midcom] pre-midcom candidates - the Davies Critique In-reply-to: To: "'Christian Huitema'" , "'Steve Davies'" , "'midcom'" Cc: "'Melinda Shore'" , "'Jonathan Rosenberg'" Reply-to: christopher.a.martin@wcom.com Message-id: <003401c162f3$c3817220$7f7822a6@rccc6131.mcit.com> MIME-version: 1.0 X-MIMEOLE: Produced By Microsoft MimeOLE V4.72.3110.3 X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0 Content-type: text/plain; charset=iso-8859-1 Content-transfer-encoding: 7bit Importance: Normal X-Priority: 3 (Normal) X-MSMail-priority: Normal Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Anything intended to keep a "pinhole" open is actually pretty inefficient in behavoir...the Davies proposal is actually on an as needed basis which is more efficient. Also the ablity to maintain "control" by the IT managers is inherent to the Davies design, IMHO, since the enforcement is maintained both at the AP(where policy can be enforced), the firewall(s), and the SIP proxies (in the case of SIP signaling). I need to continue researcing the Davies proposal, but these were my initial opinions on the draft. The other proposals place enforcement at the clients, as they are maintaining the pinholes through the firewall, not a place that many IT managers typically allow enforcement to placed (except for possibly the SOHO). > -----Original Message----- > From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of > Christian Huitema > Sent: Wednesday, October 31, 2001 4:26 PM > To: Steve Davies; midcom > Cc: Melinda Shore; Jonathan Rosenberg > Subject: RE: [midcom] pre-midcom candidates - the Davies Critique > > > Steve, > > Your point regarding "Stun and firewalls" is mistaken. The STUN > requirement is that if there is a firewall, it let a response > come in to > a packet sent from an internal port. This is the default behavior of > most "residential NAT/firewall", and it is also an optional > behavior in > many enterprise firewalls. Whether such a policy is deemed > acceptable by > the local IT manager is debatable -- there are pros and cons. > > -- Christian Huitema > > -----Original Message----- > From: Steve Davies [mailto:sdavies@ridgewaysystems.com] > Sent: Wednesday, October 31, 2001 12:57 PM > To: 'midcom' > Cc: 'Melinda Shore'; 'Jonathan Rosenberg' > Subject: RE: [midcom] pre-midcom candidates - the Davies Critique > > (Apologies if you get this twice. The first attempt was too > long for the > mailing list so I've deleted the history.).... > Naturally, I don't entirely agree with Jonathan's analysis. Here is > mine: > The Sen Proposal: > ----------------- > I don't see the Sen proposal as an adequate near-term/pre-midcom > solution for two main reasons: > (a) it requires changes to the protocol: > ---------------------------------------- > In order to make the Sen proposal work we are told that a new service > tag must be incorporated in the SIP Register request and a > new SIP Ping > (keep-alive) method must be incorporated. Not only will this take time > to implement in SIP but presumably we'll also need corresponding > protocol changes for Megaco, MGCP, H.323, etc. Or is Midcom > SIP-specific? > (b) it requires behavioural changes to the client: > -------------------------------------------------- > It requires symmetric RTP and the continual transmission of > RTP and RTCP > packets to keep the NAT bindings open. While symmetric RTP > may be a good > thing, that doesn't imply all applications have constant > bi-directional > streams - think of 'broadcast' type applications. Also why should > terminals be expected to turn off silence suppression? How > are endpoints > to know when and when not to make this behavioural change? > Other weaknesses of the proposal include a requirement on terminals to > signal to the SIP proxy when they are behind a NAT. It is not > explained > how they are supposed to know whether or not they are. > Additionally, the > use of random ports on the RTP Proxy makes it difficult to > protect such > a device with a regular filtering firewall. Such > configurations would be > required for an enterprise do-it-yourself solution(the > enterprise is its > own provider) and by service providers wanting to protect > their networks > and service from DoS attacks. > Note that correction of all these shortcomings results in the same > architecture and method outlined in the Davies proposal. > The Rosenberg/STUN Proposal: > ---------------------------- > Whilst I acknowledge the STUN proposal provides a method to determine > the type of NAT a terminal may be behind, I view the proposal as > incomplete and potentially impractical candidate as a > near-term/pre-midcom solution. > a) Firewalls are everywhere: > ---------------------------- > Whenever a firewall is deployed in conjunction with a NAT, > irrespective > of the type of NAT, the net result is equivalent to what the > STUN method > describes as a Symmetric NAT. In the case of symmetric NATs, the > Rosenberg proposal acknowledges that a media > intermediary/relay (or RTP > Proxy) is required. However, the STUN proposal doesn't inform us what > the architecture and method are for making calls in this > case, although > Jonathan acknowledges in his email that there are three > solutions - the > Davies proposal, the Sen proposal and an unpublished STUN proposal. > Firewalls are a fact of life in all enterprises connected to the > internet. An ever-increasing number of users are installing > firewalls in > their homes as well. The majority of calls will require a media > intermediary/RTP Proxy. In other words, VoIP providers will have to > install media intermediaries from Day One of any service. Can you > imagine the subscription scenario if they don't: > Customer: 'Please may I subscribe to your service' > Provider: 'Is your terminal behind a firewall?' > Customer: 'Yes' > Provider: 'Sorry our service won't work for you' or 'Yes, but please > place your terminal outside the firewall' or 'Yes, but you > can only call > other people not behind a firewall or symmetric NAT'. > This is not what the VoIP industry needs right now! > b) Too early to optimise: > ------------------------- > The STUN proposal boils down to a port saving technique for VoIP > providers. But in a nascent market its impractical to start > with a port > saving technique particularly when its unquantifiable how many ports a > provider may save. What providers need is a solution that is > deployable > in all cases - that implies a media intermediary solution. Trying to > combine a port saving technique in conjunction with a media > intermediary > solution will add complexity that will delay and stall the > VoIP market. > From a provider's perspective, this delay and additional testing could > far outweigh any savings gained by requiring fewer media intermediary > ports. > c) Unproven: > ------------ > i) TIMEOUTS. When a user is behind a firewall or symmetric > NAT, to avoid > use of a media intermediary the terminal must invoke the STUN protocol > on a call by call basis. The STUN protocol requires potentially > significant timeouts to expire in order to determine whether media may > go direct. What will this do to call setup times? > ii) NETWORK BASED NATS. There may be cases where the terminal > determines > that the media may go direct, but in fact the media passes through > network based NATs and the call will fail. This would typically happen > at the provider boundary, because the provider uses some internal > addressing scheme or when passing from IPv4 to IPv6 networks. The > solution would be to place the STUN server on the remote side of those > network based NATs, but this would have the consequence of tromboning > the media via those network based NATs for 'provider-internal' calls, > defeating the reason for STUN. Alternatively, multiple STUN servers > would need to be deployed - one for each different NAT location, but > that then poses the question of how a terminal would know which STUN > server to use on a call-by-call basis. > Davies proposal: > ---------------- > The Davies proposal is very midcom-like. The Proxy Extension > Agent (PEA) > is like a MIDDLEBOX and the Application Proxy (AP) is like a MIDCOM > AGENT. The AP is responsible for getting publicly reachable transport > addresses on the PEA for external calls and publishing those addresses > in the protocol messages. > The Davies proposal simplifies the security policy problem being > grappled with by MIDCOM to a very simple static policy > administered and > controlled by the IT manager and implemented on existing > firewalls. Just > three static pinholes are required to be configured in the firewall. > Furthermore, these pinholes are outbound pinholes(i.e. out from the > enterprise). > Jonathan writes that in the Davies draft there are issues to do with > consistency with enterprise firewall policy, but this is > unsubstantiated. When details of these issues are provided, we will be > happy to discuss them. The Davies method is entirely consistent with > enterprise firewall policy - it is similar to, but actually far more > restrictive than the firewall policy that allows web browsing for > example. The Davies proposal's policy has been vetted by service > providers and is already in commercial deployments - we can > only assume > enterprises find it acceptable. > As well as being midcom-like, the Davies method has many other > significant advantages: > * It provides a 100% solution. It will work anywhere no > matter how many > and what type and combination of firewalls and NATs there are. > * No change is required to any of the protocols. It is not even > necessary for endpoints to implement symmetric RTP. > * The implementation can be made transparent to the endpoints or be > implemented by them. > * Enterprise or Service Provider deployments are possible. The PEA may > be deployed within a service provider's network or within the > DMZ of an > enterprise's own service centre. > * Passing through a media intermediary is seen as enhancing > security and > saving IP addresses. Hiding an enterprise IP address from the remote > party (only the transport addresses of the PEA are published in > messages) is seen as a benefit and enables the enterprise to use the > same IP address used for other Internet traffic. > * Service Providers see a benefit in handling the media > through PEA for > several reasons. It enables them to hide the transport addresses of > their other service equipment. It provides them with a > suitable point to > implement wire-tapping (e.g.CALEA) - ITSPs in many countries are bound > to provide such capabilities. It also provides them with a media QOS > execution point and it provides suitable IPv4/IPv6 migration boundary > points. > Jonathan seeks to belittle the Davies proposal by likening it to RSIP. > I'm not sure what the point is here. It is true that we have borrowed > and learnt from many of the principles and techniques used within the > Internet. That's why we have well known ports, outbound initiated > connections, and TCP multiplexing, so it's not surprising the > method is > recognisable and architecturally looks similar to other > protocols. What > is unique, is the way in which this method combines the different > Internet techniques together with the transport of real-time > UDP streams > without any tunneling overhead. > In fact, the single disadvantage of the Davies proposal is that it > requires media intermediaries, but no-one has devised a non-media > intermediary solution that solves all of today's firewall and NAT > deployments. In any case, media intermediaries are not of much concern > to service providers because they will co-locate those intermediaries > with their access equipment in their POPs. In due course, those > intermediaries may even be implemented in the access routers or Midcom > will obviate them. > Pre-Midcom Recommendation: > -------------------------- > Jonathan writes that he wants to tackle the harder stuff, > i.e. firewalls > and symmetric NATs, later. The fact of the matter is that the Davies > proposal has solved the harder stuff already. It is the > Davies proposal > that is the low-hanging fruit because it addresses 100% of deployments > and it has working examples. Surely this is where a > pre-midcom solution > must start. A VoIP provider needs it from Day One because it is very > likely some/many customers will have a firewall or symmetric > NAT. If in > time, providers are seeking more efficient deployments or are > seeking to > reduce costs, then the Davies solution is easily extended to > incorporate > a STUN-like method. But before embarking on this effort it > would be wise > to judge the market need and determine when MIDCOM will kick in. > Steve Davies > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom > _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 1 12:06:18 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23834 for ; Thu, 1 Nov 2001 12:06:17 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA09277 for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 12:06:22 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09223; Thu, 1 Nov 2001 12:03:38 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09192 for ; Thu, 1 Nov 2001 12:03:36 -0500 (EST) Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23806 for ; Thu, 1 Nov 2001 12:03:31 -0500 (EST) Received: from BobP [63.67.143.2] by acmepacket.com (SMTPD32-7.04) id A067D1070118; Thu, 01 Nov 2001 12:03:35 -0500 Message-ID: <018701c162f6$c3c307a0$2300000a@acmepacket.com> From: "Bob Penfield" To: "midcom" Date: Thu, 1 Nov 2001 12:00:52 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Content-Transfer-Encoding: 7bit Subject: [midcom] framework-04 comments Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Hi all, I do have some nits on the framework: 1) I think all occurrences of "In-path" should be removed from section 7. 2) Figure 3 is not correct. In order to match the timeline flows it should be: ___________ --->| SIP |<-----\ / | Proxy | \ | |_________| | 1| |^ ^| 4| | || || | |8 2||3 7||6 |5 ______________ | || || | ______________ | |<-/ _v|____|v____ \->| | | External | Na | | Nc | SIP Phone | | SIP phone |>------->| Middlebox |>------>| within | | |<-------<|___________|<------<| Pvt. domain| |____________| Nb Nd |____________| The text in the 2nd paragraph of 7.0 needs to be updated to reflect the above. 3) Just for correctness, the 100Trying message should precede communication with the middlebox in all the timeline flows (sections 7.1, 7.2 & 7.2). 4) Section 7.2 & 7.3: The real reason that the SIP proxy must communicate with the NAT middlebox before sending the INVITE on is that it needs to change the IP address(es) and port(s) in the SDP of the INVITE to those allocated by the middlebox. If it does not, the called party will send its RTP media to the wrong address+port. 5) Section 7.2 & 7.3: The timeline explicitly indicates that the SDP is modified for the 200-OK response to the INVITE, but not for the INVITE itself going from the proxy to the private phone. 6) Section 7.2 & 7.3: The "Modify SDP" for the BYE request and the 200-OK response to the BYE (top of page 24, bottom of page 26 and middle of page 27) should be removed. This message will not contain SDP. cheers, (-:bob Robert F. Penfield Chief Software Architect Acme Packet, Inc. 130 New Boston Street Woburn, MA 01801 bpenfield@acmepacket.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 1 12:28:08 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24387 for ; Thu, 1 Nov 2001 12:28:08 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA09705 for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 12:28:13 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09610; Thu, 1 Nov 2001 12:25:28 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09578 for ; Thu, 1 Nov 2001 12:25:26 -0500 (EST) Received: from hotmail.com (f164.pav1.hotmail.com [64.4.31.164]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24321 for ; Thu, 1 Nov 2001 12:25:21 -0500 (EST) Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Thu, 1 Nov 2001 09:24:55 -0800 Received: from 207.5.1.168 by pv1fd.pav1.hotmail.msn.com with HTTP; Thu, 01 Nov 2001 17:24:55 GMT X-Originating-IP: [207.5.1.168] From: "James Ho" To: bpenfield@acmepacket.com, bscott@ridgewaysystems.com, midcom@ietf.org Subject: Re: [midcom] pre-midcom candidates Date: Thu, 01 Nov 2001 09:24:55 -0800 Mime-Version: 1.0 Content-Type: text/plain; format=flowed Message-ID: X-OriginalArrivalTime: 01 Nov 2001 17:24:55.0419 (UTC) FILETIME=[1F937CB0:01C162FA] Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Why could'nt tunnel-mode IPsec be used beween an IPsec end-point in the enterprise and another in the SP network to tunnel H.323/SIP traffic across firewalls? The auth/integrity checking within ESP with null encryption should allow for a secure tunnel improving enterprise IT confidence. Plus its a standard approach vs. the "proprietary' approaches proposed. To address NAT issues, the internal IPsec end-point could have a public IP address. I don;t performance/latency will be an issue as IP storage folks are considering tunnel-mode IPsec to be a mandatory requirement for all IP storage protocols (i.e. iSCSI, FCIP, etc). Saqib >From: "Bob Penfield" >To: "Barry Scott" , "'James Ho'" >, >Subject: Re: [midcom] pre-midcom candidates >Date: Thu, 1 Nov 2001 11:29:46 -0500 > >What percentage of NAT/FW are symmetric as opposed to full-cone as >described >in the STUN proposal? There is some debate whether or not the interim >solution needs to address the symmetric NAT problem. If the great majority >of existing FW/NAT are symmetric, we probably need to include it now. > >(-:bob > >Robert F. Penfield >Chief Software Architect >Acme Packet, Inc. >130 New Boston Street >Woburn, MA 01801 >bpenfield@acmepacket.com > >----- Original Message ----- >From: "Barry Scott" >To: "'James Ho'" ; >Sent: Thursday, November 01, 2001 9:58 AM >Subject: RE: [midcom] pre-midcom candidates > > > > The policy we need turns out to be the default for many > > enterprises already. > > > > Typical behavour is to prevent UDP from the outside > > to get inside. But once a UDP packet from the inside > > is sent to the outside the firewall will pinhole itself > > to allow return traffic. After a period of inactivity > > the firewall will close the pinhole, for example after > > 45 seconds. > > > > BArry > > > > -----Original Message----- > > From: James Ho [mailto:jamesho37@hotmail.com] > > Sent: 31 October 2001 22:20 > > To: midcom@ietf.org > > Subject: RE: [midcom] pre-midcom candidates > > > > > > As I understand it, the Davies proposal requires an open > > UDP port on the firewall for media traversal. I can't think > > of many/any enterprises being willing to implement such a > > firewall policy. Or maybe my understanding is faulty?? > > > > james > > > > _________________________________________________________________ > > Get your FREE download of MSN Explorer at >http://explorer.msn.com/intl.asp > > > > > > _______________________________________________ > > midcom mailing list > > midcom@ietf.org > > http://www1.ietf.org/mailman/listinfo/midcom > > > _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 1 12:51:36 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA25459 for ; Thu, 1 Nov 2001 12:51:36 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA10625 for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 12:51:41 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA10576; Thu, 1 Nov 2001 12:48:25 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA10545 for ; Thu, 1 Nov 2001 12:48:22 -0500 (EST) Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA25343 for ; Thu, 1 Nov 2001 12:48:16 -0500 (EST) Received: from BobP [63.67.143.2] by acmepacket.com (SMTPD32-7.04) id AADF733300AC; Thu, 01 Nov 2001 12:48:15 -0500 Message-ID: <01a601c162fd$00a8e080$2300000a@acmepacket.com> From: "Bob Penfield" To: , "'Christian Huitema'" , "'Steve Davies'" , "'midcom'" Cc: "'Melinda Shore'" , "'Jonathan Rosenberg'" References: <003401c162f3$c3817220$7f7822a6@rccc6131.mcit.com> Subject: Re: [midcom] pre-midcom candidates - the Davies Critique Date: Thu, 1 Nov 2001 12:45:30 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit ----- Original Message ----- From: "Christopher A. Martin" To: "'Christian Huitema'" ; "'Steve Davies'" ; "'midcom'" Cc: "'Melinda Shore'" ; "'Jonathan Rosenberg'" Sent: Thursday, November 01, 2001 11:39 AM Subject: RE: [midcom] pre-midcom candidates - the Davies Critique > Anything intended to keep a "pinhole" open is actually pretty inefficient in > behavoir...the Davies proposal is actually on an as needed basis which is > more efficient. Also the ablity to maintain "control" by the IT managers is > inherent to the Davies design, IMHO, since the enforcement is maintained > both at the AP(where policy can be enforced), the firewall(s), and the SIP > proxies (in the case of SIP signaling). I need to continue researcing the > Davies proposal, but these were my initial opinions on the draft. > > The other proposals place enforcement at the clients, as they are > maintaining the pinholes through the firewall, not a place that many IT > managers typically allow enforcement to placed (except for possibly the > SOHO). > You are assuming that IT manager have "control" over the Application Proxy. I don't think that will be the case. If the APs are built into end-points, the enforcement is still at the client. Both the Davies and the STUN proposals involve poking UDP holes thru the NAT/FW for RTP by devices that are "clients" as far as an IT manager is concerned. Davies just adds the tunnel for the signalling. > > > -----Original Message----- > > From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of > > Christian Huitema > > Sent: Wednesday, October 31, 2001 4:26 PM > > To: Steve Davies; midcom > > Cc: Melinda Shore; Jonathan Rosenberg > > Subject: RE: [midcom] pre-midcom candidates - the Davies Critique > > > > > > Steve, > > > > Your point regarding "Stun and firewalls" is mistaken. The STUN > > requirement is that if there is a firewall, it let a response > > come in to > > a packet sent from an internal port. This is the default behavior of > > most "residential NAT/firewall", and it is also an optional > > behavior in > > many enterprise firewalls. Whether such a policy is deemed > > acceptable by > > the local IT manager is debatable -- there are pros and cons. > > > > -- Christian Huitema > > > > -----Original Message----- > > From: Steve Davies [mailto:sdavies@ridgewaysystems.com] > > Sent: Wednesday, October 31, 2001 12:57 PM > > To: 'midcom' > > Cc: 'Melinda Shore'; 'Jonathan Rosenberg' > > Subject: RE: [midcom] pre-midcom candidates - the Davies Critique > > > > (Apologies if you get this twice. The first attempt was too > > long for the > > mailing list so I've deleted the history.).... > > Naturally, I don't entirely agree with Jonathan's analysis. Here is > > mine: > > The Sen Proposal: > > ----------------- > > I don't see the Sen proposal as an adequate near-term/pre-midcom > > solution for two main reasons: > > (a) it requires changes to the protocol: > > ---------------------------------------- > > In order to make the Sen proposal work we are told that a new service > > tag must be incorporated in the SIP Register request and a > > new SIP Ping > > (keep-alive) method must be incorporated. Not only will this take time > > to implement in SIP but presumably we'll also need corresponding > > protocol changes for Megaco, MGCP, H.323, etc. Or is Midcom > > SIP-specific? > > (b) it requires behavioural changes to the client: > > -------------------------------------------------- > > It requires symmetric RTP and the continual transmission of > > RTP and RTCP > > packets to keep the NAT bindings open. While symmetric RTP > > may be a good > > thing, that doesn't imply all applications have constant > > bi-directional > > streams - think of 'broadcast' type applications. Also why should > > terminals be expected to turn off silence suppression? How > > are endpoints > > to know when and when not to make this behavioural change? > > Other weaknesses of the proposal include a requirement on terminals to > > signal to the SIP proxy when they are behind a NAT. It is not > > explained > > how they are supposed to know whether or not they are. > > Additionally, the > > use of random ports on the RTP Proxy makes it difficult to > > protect such > > a device with a regular filtering firewall. Such > > configurations would be > > required for an enterprise do-it-yourself solution(the > > enterprise is its > > own provider) and by service providers wanting to protect > > their networks > > and service from DoS attacks. > > Note that correction of all these shortcomings results in the same > > architecture and method outlined in the Davies proposal. > > The Rosenberg/STUN Proposal: > > ---------------------------- > > Whilst I acknowledge the STUN proposal provides a method to determine > > the type of NAT a terminal may be behind, I view the proposal as > > incomplete and potentially impractical candidate as a > > near-term/pre-midcom solution. > > a) Firewalls are everywhere: > > ---------------------------- > > Whenever a firewall is deployed in conjunction with a NAT, > > irrespective > > of the type of NAT, the net result is equivalent to what the > > STUN method > > describes as a Symmetric NAT. In the case of symmetric NATs, the > > Rosenberg proposal acknowledges that a media > > intermediary/relay (or RTP > > Proxy) is required. However, the STUN proposal doesn't inform us what > > the architecture and method are for making calls in this > > case, although > > Jonathan acknowledges in his email that there are three > > solutions - the > > Davies proposal, the Sen proposal and an unpublished STUN proposal. > > Firewalls are a fact of life in all enterprises connected to the > > internet. An ever-increasing number of users are installing > > firewalls in > > their homes as well. The majority of calls will require a media > > intermediary/RTP Proxy. In other words, VoIP providers will have to > > install media intermediaries from Day One of any service. Can you > > imagine the subscription scenario if they don't: > > Customer: 'Please may I subscribe to your service' > > Provider: 'Is your terminal behind a firewall?' > > Customer: 'Yes' > > Provider: 'Sorry our service won't work for you' or 'Yes, but please > > place your terminal outside the firewall' or 'Yes, but you > > can only call > > other people not behind a firewall or symmetric NAT'. > > This is not what the VoIP industry needs right now! > > b) Too early to optimise: > > ------------------------- > > The STUN proposal boils down to a port saving technique for VoIP > > providers. But in a nascent market its impractical to start > > with a port > > saving technique particularly when its unquantifiable how many ports a > > provider may save. What providers need is a solution that is > > deployable > > in all cases - that implies a media intermediary solution. Trying to > > combine a port saving technique in conjunction with a media > > intermediary > > solution will add complexity that will delay and stall the > > VoIP market. > > From a provider's perspective, this delay and additional testing could > > far outweigh any savings gained by requiring fewer media intermediary > > ports. > > c) Unproven: > > ------------ > > i) TIMEOUTS. When a user is behind a firewall or symmetric > > NAT, to avoid > > use of a media intermediary the terminal must invoke the STUN protocol > > on a call by call basis. The STUN protocol requires potentially > > significant timeouts to expire in order to determine whether media may > > go direct. What will this do to call setup times? > > ii) NETWORK BASED NATS. There may be cases where the terminal > > determines > > that the media may go direct, but in fact the media passes through > > network based NATs and the call will fail. This would typically happen > > at the provider boundary, because the provider uses some internal > > addressing scheme or when passing from IPv4 to IPv6 networks. The > > solution would be to place the STUN server on the remote side of those > > network based NATs, but this would have the consequence of tromboning > > the media via those network based NATs for 'provider-internal' calls, > > defeating the reason for STUN. Alternatively, multiple STUN servers > > would need to be deployed - one for each different NAT location, but > > that then poses the question of how a terminal would know which STUN > > server to use on a call-by-call basis. > > Davies proposal: > > ---------------- > > The Davies proposal is very midcom-like. The Proxy Extension > > Agent (PEA) > > is like a MIDDLEBOX and the Application Proxy (AP) is like a MIDCOM > > AGENT. The AP is responsible for getting publicly reachable transport > > addresses on the PEA for external calls and publishing those addresses > > in the protocol messages. > > The Davies proposal simplifies the security policy problem being > > grappled with by MIDCOM to a very simple static policy > > administered and > > controlled by the IT manager and implemented on existing > > firewalls. Just > > three static pinholes are required to be configured in the firewall. > > Furthermore, these pinholes are outbound pinholes(i.e. out from the > > enterprise). > > Jonathan writes that in the Davies draft there are issues to do with > > consistency with enterprise firewall policy, but this is > > unsubstantiated. When details of these issues are provided, we will be > > happy to discuss them. The Davies method is entirely consistent with > > enterprise firewall policy - it is similar to, but actually far more > > restrictive than the firewall policy that allows web browsing for > > example. The Davies proposal's policy has been vetted by service > > providers and is already in commercial deployments - we can > > only assume > > enterprises find it acceptable. > > As well as being midcom-like, the Davies method has many other > > significant advantages: > > * It provides a 100% solution. It will work anywhere no > > matter how many > > and what type and combination of firewalls and NATs there are. > > * No change is required to any of the protocols. It is not even > > necessary for endpoints to implement symmetric RTP. > > * The implementation can be made transparent to the endpoints or be > > implemented by them. > > * Enterprise or Service Provider deployments are possible. The PEA may > > be deployed within a service provider's network or within the > > DMZ of an > > enterprise's own service centre. > > * Passing through a media intermediary is seen as enhancing > > security and > > saving IP addresses. Hiding an enterprise IP address from the remote > > party (only the transport addresses of the PEA are published in > > messages) is seen as a benefit and enables the enterprise to use the > > same IP address used for other Internet traffic. > > * Service Providers see a benefit in handling the media > > through PEA for > > several reasons. It enables them to hide the transport addresses of > > their other service equipment. It provides them with a > > suitable point to > > implement wire-tapping (e.g.CALEA) - ITSPs in many countries are bound > > to provide such capabilities. It also provides them with a media QOS > > execution point and it provides suitable IPv4/IPv6 migration boundary > > points. > > Jonathan seeks to belittle the Davies proposal by likening it to RSIP. > > I'm not sure what the point is here. It is true that we have borrowed > > and learnt from many of the principles and techniques used within the > > Internet. That's why we have well known ports, outbound initiated > > connections, and TCP multiplexing, so it's not surprising the > > method is > > recognisable and architecturally looks similar to other > > protocols. What > > is unique, is the way in which this method combines the different > > Internet techniques together with the transport of real-time > > UDP streams > > without any tunneling overhead. > > In fact, the single disadvantage of the Davies proposal is that it > > requires media intermediaries, but no-one has devised a non-media > > intermediary solution that solves all of today's firewall and NAT > > deployments. In any case, media intermediaries are not of much concern > > to service providers because they will co-locate those intermediaries > > with their access equipment in their POPs. In due course, those > > intermediaries may even be implemented in the access routers or Midcom > > will obviate them. > > Pre-Midcom Recommendation: > > -------------------------- > > Jonathan writes that he wants to tackle the harder stuff, > > i.e. firewalls > > and symmetric NATs, later. The fact of the matter is that the Davies > > proposal has solved the harder stuff already. It is the > > Davies proposal > > that is the low-hanging fruit because it addresses 100% of deployments > > and it has working examples. Surely this is where a > > pre-midcom solution > > must start. A VoIP provider needs it from Day One because it is very > > likely some/many customers will have a firewall or symmetric > > NAT. If in > > time, providers are seeking more efficient deployments or are > > seeking to > > reduce costs, then the Davies solution is easily extended to > > incorporate > > a STUN-like method. But before embarking on this effort it > > would be wise > > to judge the market need and determine when MIDCOM will kick in. > > Steve Davies > > > > _______________________________________________ > > midcom mailing list > > midcom@ietf.org > > http://www1.ietf.org/mailman/listinfo/midcom > > > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom > _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 1 13:51:47 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27487 for ; Thu, 1 Nov 2001 13:51:47 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id NAA12848 for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 13:51:53 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA12806; Thu, 1 Nov 2001 13:49:35 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA12777 for ; Thu, 1 Nov 2001 13:49:34 -0500 (EST) Received: from dgesmtp02.wcom.com (dgesmtp02.wcom.com [199.249.16.17]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27409 for ; Thu, 1 Nov 2001 13:49:27 -0500 (EST) Received: from pmismtp02.wcomnet.com ([166.38.62.37]) by firewall.wcom.com (PMDF V5.2-33 #42261) with ESMTP id <0GM400EJXXGNOY@firewall.wcom.com> for midcom@ietf.org; Thu, 1 Nov 2001 18:46:00 +0000 (GMT) Received: from pmismtp02.wcomnet.com by pmismtp02.wcomnet.com (PMDF V5.2-33 #42259) with SMTP id <0GM400701XGG70@pmismtp02.wcomnet.com>; Thu, 01 Nov 2001 18:45:59 +0000 (GMT) Received: from rccc6131 ([166.35.225.46]) by pmismtp02.wcomnet.com (PMDF V5.2-33 #42259) with ESMTP id <0GM4004GRXG70R@pmismtp02.wcomnet.com>; Thu, 01 Nov 2001 18:45:43 +0000 (GMT) Date: Thu, 01 Nov 2001 12:45:39 -0600 From: "Christopher A. Martin" Subject: RE: [midcom] pre-midcom candidates In-reply-to: To: "'James Ho'" , bpenfield@acmepacket.com, bscott@ridgewaysystems.com, midcom@ietf.org Reply-to: christopher.a.martin@wcom.com Message-id: <000f01c16305$67aa87e0$2ee123a6@rccc6131.mcit.com> MIME-version: 1.0 X-MIMEOLE: Produced By Microsoft MimeOLE V4.72.3110.3 X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0 Content-type: text/plain; charset=iso-8859-1 Content-transfer-encoding: 7bit Importance: Normal X-Priority: 3 (Normal) X-MSMail-priority: Normal Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit This would work well for an isolated network (intranet or extranet) but when it is desired to allow anyone (Internet) access it would be infeasible to provide security associations to the world and probably impossible for many endpoints (From an interoperability standpoint between vendors)...It really depends on the scale of the solution (I like IPSec solutions myself). Also, IPSec doesnt provide security policy enforcement, as a firewall typically would on non-IPSec encapsulated packets, merely privacy. When you tunnel IPSec through a firewall from endpoints, unless the security associations are setup to be granular, the firewall cannot act on the packets inside the tunnel. Also not all firewalls allow IPSec (IP 50 and 51) the ability to pass through them. > -----Original Message----- > From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of > James Ho > Sent: Thursday, November 01, 2001 11:25 AM > To: bpenfield@acmepacket.com; bscott@ridgewaysystems.com; > midcom@ietf.org > Subject: Re: [midcom] pre-midcom candidates > > > Why could'nt tunnel-mode IPsec be used beween an IPsec end-point in > the enterprise and another in the SP network to tunnel H.323/SIP > traffic across firewalls? The auth/integrity checking within ESP > with null encryption should allow for a secure tunnel improving > enterprise IT confidence. Plus its a standard approach vs. the > "proprietary' approaches proposed. To address NAT issues, the > internal IPsec end-point could have a public IP address. > > I don;t performance/latency will be an issue as IP storage folks > are considering tunnel-mode IPsec to be a mandatory requirement > for all IP storage protocols (i.e. iSCSI, FCIP, etc). > > Saqib > > >From: "Bob Penfield" > >To: "Barry Scott" , "'James Ho'" > >, > >Subject: Re: [midcom] pre-midcom candidates > >Date: Thu, 1 Nov 2001 11:29:46 -0500 > > > >What percentage of NAT/FW are symmetric as opposed to full-cone as > >described > >in the STUN proposal? There is some debate whether or not the interim > >solution needs to address the symmetric NAT problem. If the > great majority > >of existing FW/NAT are symmetric, we probably need to include it now. > > > >(-:bob > > > >Robert F. Penfield > >Chief Software Architect > >Acme Packet, Inc. > >130 New Boston Street > >Woburn, MA 01801 > >bpenfield@acmepacket.com > > > >----- Original Message ----- > >From: "Barry Scott" > >To: "'James Ho'" ; > >Sent: Thursday, November 01, 2001 9:58 AM > >Subject: RE: [midcom] pre-midcom candidates > > > > > > > The policy we need turns out to be the default for many > > > enterprises already. > > > > > > Typical behavour is to prevent UDP from the outside > > > to get inside. But once a UDP packet from the inside > > > is sent to the outside the firewall will pinhole itself > > > to allow return traffic. After a period of inactivity > > > the firewall will close the pinhole, for example after > > > 45 seconds. > > > > > > BArry > > > > > > -----Original Message----- > > > From: James Ho [mailto:jamesho37@hotmail.com] > > > Sent: 31 October 2001 22:20 > > > To: midcom@ietf.org > > > Subject: RE: [midcom] pre-midcom candidates > > > > > > > > > As I understand it, the Davies proposal requires an open > > > UDP port on the firewall for media traversal. I can't think > > > of many/any enterprises being willing to implement such a > > > firewall policy. Or maybe my understanding is faulty?? > > > > > > james > > > > > > _________________________________________________________________ > > > Get your FREE download of MSN Explorer at > >http://explorer.msn.com/intl.asp > > > > > > > > > _______________________________________________ > > > midcom mailing list > > > midcom@ietf.org > > > http://www1.ietf.org/mailman/listinfo/midcom > > > > > > > > _________________________________________________________________ > Get your FREE download of MSN Explorer at > http://explorer.msn.com/intl.asp > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom > _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 1 15:59:03 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA00366 for ; Thu, 1 Nov 2001 15:59:03 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA16980 for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 15:59:08 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA16912; Thu, 1 Nov 2001 15:54:39 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA16881 for ; Thu, 1 Nov 2001 15:54:37 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA00206 for ; Thu, 1 Nov 2001 15:54:31 -0500 (EST) Received: from asimu-u5.cisco.com (asimu-u5.cisco.com [128.107.162.97]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fA1Ks9X27072; Thu, 1 Nov 2001 12:54:09 -0800 (PST) Received: from cisco.com (localhost [127.0.0.1]) by asimu-u5.cisco.com (8.8.8-Cisco List Logging/CISCO.WS.1.2) with ESMTP id MAA26170; Thu, 1 Nov 2001 12:54:04 -0800 (PST) Message-ID: <3BE1B66C.1635A2E3@cisco.com> Date: Thu, 01 Nov 2001 12:54:04 -0800 From: Adina Simu Organization: Cisco Systems X-Mailer: Mozilla 4.51C-CISCOENG [en] (X11; U; SunOS 5.6 sun4u) X-Accept-Language: en MIME-Version: 1.0 To: christopher.a.martin@wcom.com CC: "'James Ho'" , bpenfield@acmepacket.com, bscott@ridgewaysystems.com, midcom@ietf.org Subject: Re: [midcom] pre-midcom candidates References: <000f01c16305$67aa87e0$2ee123a6@rccc6131.mcit.com> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit IPsec itself has big problems with NATs - NAPTs in particular (as probably all of you know already :)). -Adina "Christopher A. Martin" wrote: > > This would work well for an isolated network (intranet or extranet) but when > it is desired to allow anyone (Internet) access it would be infeasible to > provide security associations to the world and probably impossible for many > endpoints (From an interoperability standpoint between vendors)...It really > depends on the scale of the solution (I like IPSec solutions myself). > > Also, IPSec doesnt provide security policy enforcement, as a firewall > typically would on non-IPSec encapsulated packets, merely privacy. When you > tunnel IPSec through a firewall from endpoints, unless the security > associations are setup to be granular, the firewall cannot act on the > packets inside the tunnel. > > Also not all firewalls allow IPSec (IP 50 and 51) the ability to pass > through them. > > > -----Original Message----- > > From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of > > James Ho > > Sent: Thursday, November 01, 2001 11:25 AM > > To: bpenfield@acmepacket.com; bscott@ridgewaysystems.com; > > midcom@ietf.org > > Subject: Re: [midcom] pre-midcom candidates > > > > > > Why could'nt tunnel-mode IPsec be used beween an IPsec end-point in > > the enterprise and another in the SP network to tunnel H.323/SIP > > traffic across firewalls? The auth/integrity checking within ESP > > with null encryption should allow for a secure tunnel improving > > enterprise IT confidence. Plus its a standard approach vs. the > > "proprietary' approaches proposed. To address NAT issues, the > > internal IPsec end-point could have a public IP address. > > > > I don;t performance/latency will be an issue as IP storage folks > > are considering tunnel-mode IPsec to be a mandatory requirement > > for all IP storage protocols (i.e. iSCSI, FCIP, etc). > > > > Saqib > > > > >From: "Bob Penfield" > > >To: "Barry Scott" , "'James Ho'" > > >, > > >Subject: Re: [midcom] pre-midcom candidates > > >Date: Thu, 1 Nov 2001 11:29:46 -0500 > > > > > >What percentage of NAT/FW are symmetric as opposed to full-cone as > > >described > > >in the STUN proposal? There is some debate whether or not the interim > > >solution needs to address the symmetric NAT problem. If the > > great majority > > >of existing FW/NAT are symmetric, we probably need to include it now. > > > > > >(-:bob > > > > > >Robert F. Penfield > > >Chief Software Architect > > >Acme Packet, Inc. > > >130 New Boston Street > > >Woburn, MA 01801 > > >bpenfield@acmepacket.com > > > > > >----- Original Message ----- > > >From: "Barry Scott" > > >To: "'James Ho'" ; > > >Sent: Thursday, November 01, 2001 9:58 AM > > >Subject: RE: [midcom] pre-midcom candidates > > > > > > > > > > The policy we need turns out to be the default for many > > > > enterprises already. > > > > > > > > Typical behavour is to prevent UDP from the outside > > > > to get inside. But once a UDP packet from the inside > > > > is sent to the outside the firewall will pinhole itself > > > > to allow return traffic. After a period of inactivity > > > > the firewall will close the pinhole, for example after > > > > 45 seconds. > > > > > > > > BArry > > > > > > > > -----Original Message----- > > > > From: James Ho [mailto:jamesho37@hotmail.com] > > > > Sent: 31 October 2001 22:20 > > > > To: midcom@ietf.org > > > > Subject: RE: [midcom] pre-midcom candidates > > > > > > > > > > > > As I understand it, the Davies proposal requires an open > > > > UDP port on the firewall for media traversal. I can't think > > > > of many/any enterprises being willing to implement such a > > > > firewall policy. Or maybe my understanding is faulty?? > > > > > > > > james > > > > > > > > _________________________________________________________________ > > > > Get your FREE download of MSN Explorer at > > >http://explorer.msn.com/intl.asp > > > > > > > > > > > > _______________________________________________ > > > > midcom mailing list > > > > midcom@ietf.org > > > > http://www1.ietf.org/mailman/listinfo/midcom > > > > > > > > > > > > > _________________________________________________________________ > > Get your FREE download of MSN Explorer at > > http://explorer.msn.com/intl.asp > > > > > > _______________________________________________ > > midcom mailing list > > midcom@ietf.org > > http://www1.ietf.org/mailman/listinfo/midcom > > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 1 16:29:20 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA01073 for ; Thu, 1 Nov 2001 16:29:20 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id QAA18207 for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 16:29:25 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA18058; Thu, 1 Nov 2001 16:25:54 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA17978 for ; Thu, 1 Nov 2001 16:25:49 -0500 (EST) Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA00940 for ; Thu, 1 Nov 2001 16:25:43 -0500 (EST) Received: from smtprch2.nortel.com (erchg0k.us.nortel.com [47.113.64.104]) by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id PAA01549 for ; Thu, 1 Nov 2001 15:25:16 -0600 (CST) Received: from zrchb200.us.nortel.com by smtprch2.nortel.com; Thu, 1 Nov 2001 15:18:19 -0600 Received: by zrchb200.us.nortel.com with Internet Mail Service (5.5.2653.19) id ; Thu, 1 Nov 2001 15:24:24 -0600 Message-ID: <933FADF5E673D411B8A30002A5608A0E06F29D@zrc2c012.us.nortel.com> From: "Sanjoy Sen" To: "'Steve Davies'" , "'midcom'" Cc: "'Melinda Shore'" , "'Jonathan Rosenberg'" Subject: RE: [midcom] pre-midcom candidates - the Davies Critique Date: Thu, 1 Nov 2001 15:24:27 -0600 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C1631B.96490840" X-Orig: Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C1631B.96490840 Content-Type: text/plain; charset="iso-8859-1" Comments inline. -----Original Message----- From: Steve Davies [mailto:sdavies@ridgewaysystems.com] Sent: Wednesday, October 31, 2001 2:57 PM To: 'midcom' Cc: 'Melinda Shore'; 'Jonathan Rosenberg' Subject: RE: [midcom] pre-midcom candidates - the Davies Critique (Apologies if you get this twice. The first attempt was too long for the mailing list so I've deleted the history.).... Naturally, I don't entirely agree with Jonathan's analysis. Here is mine: The Sen Proposal: ----------------- I don't see the Sen proposal as an adequate near-term/pre-midcom solution for two main reasons: [SS] The solution is already in live deployment in some service provider networks! (a) it requires changes to the protocol: ---------------------------------------- In order to make the Sen proposal work we are told that a new service tag must be incorporated in the SIP Register request and a new SIP Ping (keep-alive) method must be incorporated. Not only will this take time to implement in SIP but presumably we'll also need corresponding protocol changes for Megaco, MGCP, H.323, etc. Or is Midcom SIP-specific? [SS] The Proxy-Require option tag is only what is required. You need to enable the Proxy distinguish between the cases when it should and should not send messages to the source address/port of the received packet. The Ping method is optional, Register refreshes can be used instead. The drawback of the latter is that it hits the Registrar (at least once every minute) unnecesarily. We tried that & ran into performance problems which made us switch to a more lightweight mechanism. Yes, the signaling solution depicted in the draft is SIP-specific. (b) it requires behavioural changes to the client: -------------------------------------------------- It requires symmetric RTP and the continual transmission of RTP and RTCP packets to keep the NAT bindings open. While symmetric RTP may be a good thing, that doesn't imply all applications have constant bi-directional streams - think of 'broadcast' type applications. Also why should terminals be expected to turn off silence suppression? How are endpoints to know when and when not to make this behavioural change? [SS] The "Symmetric RTP" that we use is simply receive packets in the same port that you send packets from. This is easily configurable in amost all existing clients. To keep the media path through the FW/NAT open, the client is required to send out RTP/UDP packets voluntarily only when the media stream is muted. These packets can be silence packets (which are generated by many codecs for comfort noise) or empty UDP packets. Additionally, the use of random ports on the RTP Proxy makes it difficult to protect such a device with a regular filtering firewall. Such configurations would be required for an enterprise do-it-yourself solution(the enterprise is its own provider) and by service providers wanting to protect their networks and service from DoS attacks. [SS] This should not be a problem for the Enterprise-do-it-yourself , because they would typically have to trust packets coming from behind their own firewall/NAT! In either case, the FW would only have to allow known addresses/ports from the Enterprise side. Sanjoy ------_=_NextPart_001_01C1631B.96490840 Content-Type: text/html; charset="iso-8859-1" RE: [midcom] pre-midcom candidates - the Davies Critique
Comments inline.
-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: Wednesday, October 31, 2001 2:57 PM
To: 'midcom'
Cc: 'Melinda Shore'; 'Jonathan Rosenberg'
Subject: RE: [midcom] pre-midcom candidates - the Davies Critique

(Apologies if you get this twice. The first attempt was too long for the mailing list so I've deleted the history.)....

Naturally, I don't entirely agree with Jonathan's analysis. Here is mine:

The Sen Proposal:
-----------------
I don't see the Sen proposal as an adequate near-term/pre-midcom solution for two main reasons:  

[SS] The solution is already in live deployment in some service provider networks!

(a) it requires changes to the protocol:
----------------------------------------
In order to make the Sen proposal work we are told that a new service tag must be incorporated in the SIP Register request and a new SIP Ping (keep-alive) method must be incorporated. Not only will this take time to implement in SIP but presumably we'll also need corresponding protocol changes for Megaco, MGCP, H.323, etc. Or is Midcom SIP-specific? 

[SS] The Proxy-Require option tag is only what is required. You need to enable the Proxy distinguish between the cases when it should and should not send messages to the source address/port of the received packet. The Ping method is optional, Register refreshes can be used instead. The drawback of the latter is that it hits the Registrar (at least once every minute) unnecesarily. We tried that & ran into performance problems which made us switch to a more lightweight mechanism.

Yes, the signaling solution depicted in the draft is SIP-specific. 

(b) it requires behavioural changes to the client:
--------------------------------------------------
It requires symmetric RTP and the continual transmission of RTP and RTCP packets to keep the NAT bindings open. While symmetric RTP may be a good thing, that doesn't imply all applications have constant bi-directional streams - think of 'broadcast' type applications. Also why should terminals be expected to turn off silence suppression? How are endpoints to know when and when not to make this behavioural change?  

[SS] The "Symmetric RTP" that we use is simply receive packets in the same port that you send packets from. This is easily configurable in amost all existing clients.  To keep the media path through the FW/NAT open, the client is required to send out RTP/UDP packets voluntarily only when the media stream is muted. These packets can be silence packets (which are generated by many codecs for comfort noise) or empty UDP packets.

  Additionally, the use of random ports on the RTP Proxy makes it difficult to protect such a device with a regular filtering firewall. Such configurations would be required for an enterprise do-it-yourself solution(the enterprise is its own provider) and by service providers wanting to protect their networks and service from DoS attacks. 

[SS] This should not be a problem for the Enterprise-do-it-yourself , because they would typically have to trust packets coming from behind their own firewall/NAT! In either case, the FW would only have to allow known addresses/ports from the Enterprise side.

Sanjoy

 

------_=_NextPart_001_01C1631B.96490840-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 00:33:49 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA10939 for ; Fri, 2 Nov 2001 00:33:49 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id AAA29316 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 00:33:50 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA29272; Fri, 2 Nov 2001 00:30:51 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA29235 for ; Fri, 2 Nov 2001 00:30:49 -0500 (EST) Received: from qtech1.quarrytech.com (email.quarrytech.com [4.17.144.4]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA10870 for ; Fri, 2 Nov 2001 00:30:47 -0500 (EST) Received: from mduffy (10.1.1.254 [10.1.1.254]) by qtech1.quarrytech.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13) id 49ZFCT1J; Fri, 2 Nov 2001 00:30:18 -0500 Message-Id: <3.0.5.32.20011102002139.00820510@email.quarrytech.com> X-Sender: mduffy@email.quarrytech.com X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32) Date: Fri, 02 Nov 2001 00:21:39 -0500 To: Melinda Shore , midcom@ietf.org From: Mark Duffy Subject: Re: [midcom] Current status In-Reply-To: <5.1.0.14.0.20011031174517.00a5b0c0@mira-sjc5-4.cisco.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org >Framework: There have been *no* comments on the recent revision >of the framework draft. I'm not sure I want to start WG last call >on it until I have some sense of whether or not more than a few >people have given it a good going-over already. Have you? I have some minor documentation comments I'll send separately. More substantively, what if any resolution to the topology question can we reach? This is both a technical and political question. Whatever the resolution surely the framework should reflect it. The framework draft basically decides not to address this (section 5.0 first paragraph, and section 9 first paragraph). We have the Aoun/Sen, Penfield, and Molitor drafts from August that seem to support about that same conclusion: the ability to support complex topologies is basically limited by the topology knowledge the agent has available. We have the in-and-out proposal from Scott which allows some use of topology knowledge the middlebox might have, but does not address middlebox discovery by agents. And then there is the "friendly" RSVP-like proposal from Melinda which seems to address the topology and discovery questions although it lies somewhat "outside the box" of the framework and requirements work to date in the wg. - Mark P.S. apologies in advance for any mangling I have done in attempting to summarize the drafts in one sentence each. _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 00:33:52 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA10934 for ; Fri, 2 Nov 2001 00:33:48 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id AAA29302 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 00:33:49 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA29233; Fri, 2 Nov 2001 00:30:48 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA29202 for ; Fri, 2 Nov 2001 00:30:47 -0500 (EST) Received: from qtech1.quarrytech.com (email.quarrytech.com [4.17.144.4]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA10863 for ; Fri, 2 Nov 2001 00:30:45 -0500 (EST) Received: from mduffy (10.1.1.254 [10.1.1.254]) by qtech1.quarrytech.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13) id 49ZFCT1G; Fri, 2 Nov 2001 00:30:15 -0500 Message-Id: <3.0.5.32.20011102002146.008f6a90@email.quarrytech.com> X-Sender: mduffy@email.quarrytech.com X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32) Date: Fri, 02 Nov 2001 00:21:46 -0500 To: Pyda Srisuresh , midcom@ietf.org From: Mark Duffy Subject: Re: [midcom] Rev4 of MIDCOM Architecture & framework document In-Reply-To: <20011017121426.70434.qmail@web13802.mail.yahoo.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Thank you Suresh, here are my comments. These are just suggestions on the document, not I think on the fundamental concepts. -- Mark. Section 2.15 -- definition of "Ruleset". I recommend we remove the second paragraph: Ruleset specifies the dynamic resources (i.e., Filter Specs, Action Specs, Ruleset type, Timeout values etc.) that maybe communicated through the MIDCOM protocol. I don't think it adds much to the definition, and it introduces another new undefined term ("resources"). There was some discussion of removing this on the list 4 Oct. Section 6.0 -- policy server. In the third paragraph it states The policy server acts in an advisory capacity to a middlebox to authorize or terminate authorization for an agent to gain connectivity to the middlebox. The primary objective of a policy I think "gain connectivity to the middlebox" is a fairly imprecise wording. Section 2.9 (policy server definition) has more/better description than this section 6.0. Perhaps some of that can be moved here and replace some of 6.0. BTW my understanding, and I can read this into the section 2.9 description but it is not unambiguously stated there, that the policy server may govern which agents may establish midcom sessions with the middlebox *and also* restrict what Rulesets a given agent may manipulate. No? Perhaps we can clarify that. Section 6.2 -- registration. The first paragraph explains that registration is different than establishing a session. The phrase "transport session" is used several times in this paragraph. I suggest that the first two uses should be replaced with the recently defined term "Midcom session". Section 6.2. The third paragraph seems confusing. Also, it discusses either the agent or the middlebox initiating the midcom session. My understanding from the requirements discussion etc. is that we have come around to only the agent initiating the session. I suggest modifying the paragraph as follows: The MIDCOM agent profile may be pre-configured on the middlebox while provisioning the middlebox function. Thereafter, the agent may choose to initiate a Midcom session prior to any data traffic. Alternatively, it may choose to initiate a Midcom session only upon noticing the application specific traffic. Section 6.2. The 4th paragraph discusses "Coupling MIDCOM agents with the middlebox ruleset". I'm not sure what that coupling refers to. Can we clarify this? Section 6.2. The seventh paragraph is confusing, and again contains the concept of the middlebox initiating the midcom session. Since the main purpose of this paragraph (I think) is to point out that the agent information may be provisioned into a policy server rather than the middlebox, and we've said that above, I suggest just omitting this paragraph. Section 6.2, 8th paragraph. The first seven lines here are about midcom session disconnection and have nothing to do with registration/deregistration. Since they cover material already presented in section 4, I suggest deleting them. Section 11-security considerations. The first paragraph points out some deleterious effects of middleboxes on security protocols. The second paragraph seems to state that midcom can fix all this because the middlebox will no longer need to inspect or modify data. The text should acknowledge that the midcom model does not help with the problem of NAT breaking IPsec since in this case the middlebox still modifies data that matters. _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 02:33:37 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA27335 for ; Fri, 2 Nov 2001 02:33:36 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id CAA09087 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 02:33:39 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id CAA09069; Fri, 2 Nov 2001 02:31:17 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id CAA09039 for ; Fri, 2 Nov 2001 02:31:15 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA27328 for ; Fri, 2 Nov 2001 02:31:13 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fA27TQb7002675; Fri, 2 Nov 2001 02:29:26 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Fri, 2 Nov 2001 02:30:42 -0500 Message-ID: From: Jonathan Rosenberg To: "'James Ho'" , bpenfield@acmepacket.com, bscott@ridgewaysystems.com, midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates Date: Fri, 2 Nov 2001 02:30:35 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org > -----Original Message----- > From: James Ho [mailto:jamesho37@hotmail.com] > Sent: Thursday, November 01, 2001 12:25 PM > To: bpenfield@acmepacket.com; bscott@ridgewaysystems.com; > midcom@ietf.org > Subject: Re: [midcom] pre-midcom candidates > > > Why could'nt tunnel-mode IPsec be used beween an IPsec end-point in > the enterprise and another in the SP network to tunnel H.323/SIP > traffic across firewalls? The auth/integrity checking within ESP > with null encryption should allow for a secure tunnel improving > enterprise IT confidence. Plus its a standard approach vs. the > "proprietary' approaches proposed. To address NAT issues, the > internal IPsec end-point could have a public IP address. Indeed, it could. In fact, any number of alternate VPN solutions could be used. I actually get through my nat at home by using a Microsoft VPN to my corporate network where our proxies and stuff run. The Davies approach is another form of vpn, if you think about it. All of these suffer from the problems of triangle routed media through the service provider, resulting in the expense of double-erlang bandwidth provisioning, and high latencies, that I have documented. The point I have been making, and the point I made continuously during the informal get together at IETF 51, was that if you are willing to accept these penalties, there are many VPN solutions today. They have their own issues in terms of compliance with enterprise firewall policy, but thats another issue I will comment on separately. What we need is a solution that does not suffer these problems, and that is what stun is offering. - Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com > > Saqib > > >From: "Bob Penfield" > >To: "Barry Scott" , "'James Ho'" > >, > >Subject: Re: [midcom] pre-midcom candidates > >Date: Thu, 1 Nov 2001 11:29:46 -0500 > > > >What percentage of NAT/FW are symmetric as opposed to full-cone as > >described > >in the STUN proposal? There is some debate whether or not the interim > >solution needs to address the symmetric NAT problem. If the > great majority > >of existing FW/NAT are symmetric, we probably need to include it now. > > > >(-:bob > > > >Robert F. Penfield > >Chief Software Architect > >Acme Packet, Inc. > >130 New Boston Street > >Woburn, MA 01801 > >bpenfield@acmepacket.com > > > >----- Original Message ----- > >From: "Barry Scott" > >To: "'James Ho'" ; > >Sent: Thursday, November 01, 2001 9:58 AM > >Subject: RE: [midcom] pre-midcom candidates > > > > > > > The policy we need turns out to be the default for many > > > enterprises already. > > > > > > Typical behavour is to prevent UDP from the outside > > > to get inside. But once a UDP packet from the inside > > > is sent to the outside the firewall will pinhole itself > > > to allow return traffic. After a period of inactivity > > > the firewall will close the pinhole, for example after > > > 45 seconds. > > > > > > BArry > > > > > > -----Original Message----- > > > From: James Ho [mailto:jamesho37@hotmail.com] > > > Sent: 31 October 2001 22:20 > > > To: midcom@ietf.org > > > Subject: RE: [midcom] pre-midcom candidates > > > > > > > > > As I understand it, the Davies proposal requires an open > > > UDP port on the firewall for media traversal. I can't think > > > of many/any enterprises being willing to implement such a > > > firewall policy. Or maybe my understanding is faulty?? > > > > > > james > > > > > > _________________________________________________________________ > > > Get your FREE download of MSN Explorer at > >http://explorer.msn.com/intl.asp > > > > > > > > > _______________________________________________ > > > midcom mailing list > > > midcom@ietf.org > > > http://www1.ietf.org/mailman/listinfo/midcom > > > > > > > > _________________________________________________________________ > Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 02:39:24 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA27360 for ; Fri, 2 Nov 2001 02:39:18 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id CAA09166 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 02:39:19 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id CAA09142; Fri, 2 Nov 2001 02:35:57 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id CAA09111 for ; Fri, 2 Nov 2001 02:35:56 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA27351 for ; Fri, 2 Nov 2001 02:35:52 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fA27Y6b7002695; Fri, 2 Nov 2001 02:34:06 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Fri, 2 Nov 2001 02:35:22 -0500 Message-ID: From: Jonathan Rosenberg To: "'christopher.a.martin@wcom.com'" , "'James Ho'" , bpenfield@acmepacket.com, bscott@ridgewaysystems.com, midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates Date: Fri, 2 Nov 2001 02:35:21 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain; charset="iso-8859-1" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org > -----Original Message----- > From: Christopher A. Martin [mailto:christopher.a.martin@wcom.com] > Sent: Thursday, November 01, 2001 1:46 PM > To: 'James Ho'; bpenfield@acmepacket.com; bscott@ridgewaysystems.com; > midcom@ietf.org > Subject: RE: [midcom] pre-midcom candidates > > > This would work well for an isolated network (intranet or > extranet) but when > it is desired to allow anyone (Internet) access it would be > infeasible to > provide security associations to the world Well, one need not do it to the world. Presumably, the VoIP provider would offer this service to its customers. Then, it only need worry about offering ip addresses to the customers it has actively online. > Also, IPSec doesnt provide security policy enforcement, as a firewall > typically would on non-IPSec encapsulated packets, merely > privacy. When you > tunnel IPSec through a firewall from endpoints, unless the security > associations are setup to be granular, the firewall cannot act on the > packets inside the tunnel. No, they can't. Thats why it works. But thats also the problem shared by all the vpn and tunneling solutions; they ultimately work since they help bypass enterprise firewall policies that might exist. Stun doesn't do tunneling; if the firewall disallows outbound UDP then you can't send outbound UDP. It therefore insures that enterprise firewall policy continues to be obeyed. > Also not all firewalls allow IPSec (IP 50 and 51) the ability to pass > through them. Pick your favorite vpn. Others get through and work. My favorite remains RFC3093, which will traverse almost all firewalls and nats. -Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 05:48:31 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA29037 for ; Fri, 2 Nov 2001 05:48:31 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id FAA14063 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 05:48:34 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id FAA14006; Fri, 2 Nov 2001 05:45:43 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id FAA13977 for ; Fri, 2 Nov 2001 05:45:41 -0500 (EST) Received: from rhenium (rhenium.btinternet.com [194.73.73.93]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA29002 for ; Fri, 2 Nov 2001 05:45:32 -0500 (EST) Received: from [213.122.14.30] (helo=tkw) by rhenium with smtp (Exim 3.22 #6) id 15zbpE-0003dn-00; Fri, 02 Nov 2001 10:45:25 +0000 Message-ID: <004101c16387$c6786bc0$0200000a@tkw> From: "Pete Cordell" To: "Jonathan Rosenberg" , , "'James Ho'" , , , References: Subject: Re: [midcom] pre-midcom candidates Date: Fri, 2 Nov 2001 10:18:50 -0000 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Jonathan, By quoting RFC 3093 as your favourite VPN solution you are really saying that a standard VPN solution is not appropriate for the job! Pete. ============================================= Pete Cordell Tech-Know-Ware pete@tech-know-ware.com +44 1473 635863 ============================================= ----- Original Message ----- From: Jonathan Rosenberg To: ; 'James Ho' ; ; ; Sent: 02 November 2001 07:35 Subject: RE: [midcom] pre-midcom candidates > > > > > > -----Original Message----- > > From: Christopher A. Martin [mailto:christopher.a.martin@wcom.com] > > Sent: Thursday, November 01, 2001 1:46 PM > > To: 'James Ho'; bpenfield@acmepacket.com; bscott@ridgewaysystems.com; > > midcom@ietf.org > > Subject: RE: [midcom] pre-midcom candidates > > > > > > This would work well for an isolated network (intranet or > > extranet) but when > > it is desired to allow anyone (Internet) access it would be > > infeasible to > > provide security associations to the world > > Well, one need not do it to the world. Presumably, the VoIP provider would > offer this service to its customers. Then, it only need worry about offering > ip addresses to the customers it has actively online. > > > > Also, IPSec doesnt provide security policy enforcement, as a firewall > > typically would on non-IPSec encapsulated packets, merely > > privacy. When you > > tunnel IPSec through a firewall from endpoints, unless the security > > associations are setup to be granular, the firewall cannot act on the > > packets inside the tunnel. > > No, they can't. Thats why it works. But thats also the problem shared by all > the vpn and tunneling solutions; they ultimately work since they help bypass > enterprise firewall policies that might exist. > > Stun doesn't do tunneling; if the firewall disallows outbound UDP then you > can't send outbound UDP. It therefore insures that enterprise firewall > policy continues to be obeyed. > > > Also not all firewalls allow IPSec (IP 50 and 51) the ability to pass > > through them. > > Pick your favorite vpn. Others get through and work. My favorite remains > RFC3093, which will traverse almost all firewalls and nats. > > -Jonathan R. > > --- > Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. > Chief Scientist First Floor > dynamicsoft East Hanover, NJ 07936 > jdrosen@dynamicsoft.com FAX: (973) 952-5050 > http://www.jdrosen.net PHONE: (973) 952-5000 > http://www.dynamicsoft.com > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 10:21:45 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA07572 for ; Fri, 2 Nov 2001 10:21:44 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id KAA19789 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 10:21:46 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA19732; Fri, 2 Nov 2001 10:17:32 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA19703 for ; Fri, 2 Nov 2001 10:17:30 -0500 (EST) Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA07347 for ; Fri, 2 Nov 2001 10:17:27 -0500 (EST) Received: from BobP [63.67.143.2] by acmepacket.com (SMTPD32-7.04) id A90AFE90146; Fri, 02 Nov 2001 10:17:30 -0500 Message-ID: <00d601c163b1$08578840$2300000a@acmepacket.com> From: "Bob Penfield" To: "midcom" References: Subject: Re: [midcom] pre-midcom candidates Date: Fri, 2 Nov 2001 10:14:12 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Hi all, I just want to throw my hat into the ring as a supporter of the STUN proposal. It is very simple and will be relatively easy to implement directly in endpoints. It requires no state in the server side. It adheres to the security policy of the firewall/NAT owner. With STUN as a basic tool, more complex solutions can be developed. It could even be used to implement much of the Davies proposal. I do think we need to address the symmetric NAT problem soon. The Sen proposal seems too narrow in its focus on SIP and RTP. It also includes a midcom-like component in the protocol between the SIP element and the RTP proxy. To standardize this approach we would need to standardize the RTP proxy control protocol and we would virtually have midcom. The RTP proxy is just a specialized NAT middlebox. There are number of things I find troubling about the Davies proposal: - The tunneling of the signaling through the firewall verges on subverting the security policy of the firewall owner. As others have stated, existing VPN methods can do this today. I also think that outbound TCP connections for signaling can work in most cases. - The protocol that would be required to implement this solution seems to be too complex. I counted 12 methods. It seems to be as complex, if not more so, than midcom will need to be. How long will it take to devise and standardize it? Based on the claims of the draft, Ridgeway has devised this protocol, but have they published the details? Given the complexity, it will be more difficult and costly to develop endpoints that support it. Given that, intermediate devices will be needed until all the endpoints support it, which again increases the cost of deploying VOIP and other applications. I think STUN is the best alternative for an easy, quick, and cost effective solution for NAT/FW that will allow for wider deployment of VOIP and other applications. It provides an interim solution until midcom is completed and also is useful in the long term for scenarios where midcom is not appropriate. cheers, (-:bob Robert F. Penfield Chief Software Architect Acme Packet, Inc. 130 New Boston Street Woburn, MA 01801 bpenfield@acmepacket.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 10:37:35 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA08112 for ; Fri, 2 Nov 2001 10:37:35 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id KAA20399 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 10:37:37 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA20113; Fri, 2 Nov 2001 10:30:24 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA20084 for ; Fri, 2 Nov 2001 10:30:22 -0500 (EST) Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA07918 for ; Fri, 2 Nov 2001 10:30:19 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fA2FTqT23192; Fri, 2 Nov 2001 07:29:52 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABV23867; Fri, 2 Nov 2001 07:29:22 -0800 (PST) Message-Id: <5.1.0.14.0.20011102102741.00a5dec0@mira-sjc5-4.cisco.com> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Fri, 02 Nov 2001 10:30:50 -0500 To: Mark Duffy , midcom@ietf.org From: Melinda Shore Subject: Re: [midcom] Current status In-Reply-To: <3.0.5.32.20011102002139.00820510@email.quarrytech.com> References: <5.1.0.14.0.20011031174517.00a5b0c0@mira-sjc5-4.cisco.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 12:21 AM 11/2/01 -0500, Mark Duffy wrote: >The framework draft basically decides not to address this (section 5.0 >first paragraph, and section 9 first paragraph). We have the Aoun/Sen, >Penfield, and Molitor drafts from August that seem to support about that >same conclusion: the ability to support complex topologies is basically >limited by the topology knowledge the agent has available. The guidance from above right now seems to be "punt." This is likely to come up during the rechartering discussions; more on that later. In the meantime, many many many thanks to those who have gone through the framework document and provided feedback. We need to get this thing closed. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 11:03:25 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA08797 for ; Fri, 2 Nov 2001 11:03:25 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA21258 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 11:03:27 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA21031; Fri, 2 Nov 2001 11:00:42 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA20997 for ; Fri, 2 Nov 2001 11:00:40 -0500 (EST) Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA08673 for ; Fri, 2 Nov 2001 11:00:37 -0500 (EST) Received: from BobP [63.67.143.2] by acmepacket.com (SMTPD32-7.04) id A3243E690146; Fri, 02 Nov 2001 11:00:36 -0500 Message-ID: <017501c163b7$0b325ee0$2300000a@acmepacket.com> From: "Bob Penfield" To: "Mark Duffy" , , "Melinda Shore" References: <5.1.0.14.0.20011031174517.00a5b0c0@mira-sjc5-4.cisco.com> <5.1.0.14.0.20011102102741.00a5dec0@mira-sjc5-4.cisco.com> Subject: Re: [midcom] Current status Date: Fri, 2 Nov 2001 10:57:15 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Mark & Melinda, I am satisfied with our current requirement (R82) which does not preclude additional information/criteria in the filtering rules. cheers, (-:bob Robert F. Penfield Chief Software Architect Acme Packet, Inc. 130 New Boston Street Woburn, MA 01801 bpenfield@acmepacket.com ----- Original Message ----- From: "Melinda Shore" To: "Mark Duffy" ; Sent: Friday, November 02, 2001 10:30 AM Subject: Re: [midcom] Current status > At 12:21 AM 11/2/01 -0500, Mark Duffy wrote: > >The framework draft basically decides not to address this (section 5.0 > >first paragraph, and section 9 first paragraph). We have the Aoun/Sen, > >Penfield, and Molitor drafts from August that seem to support about that > >same conclusion: the ability to support complex topologies is basically > >limited by the topology knowledge the agent has available. > > The guidance from above right now seems to be "punt." This is > likely to come up during the rechartering discussions; more on > that later. > > In the meantime, many many many thanks to those who have gone > through the framework document and provided feedback. We need > to get this thing closed. > > Melinda > > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom > _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 11:35:42 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA10650 for ; Fri, 2 Nov 2001 11:35:41 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA22510 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 11:35:41 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA22396; Fri, 2 Nov 2001 11:32:36 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA22370 for ; Fri, 2 Nov 2001 11:32:35 -0500 (EST) Received: from qtech1.quarrytech.com (email.quarrytech.com [4.17.144.4]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA10418 for ; Fri, 2 Nov 2001 11:32:32 -0500 (EST) Received: from MDUFFY ([10.1.3.114]) by qtech1.quarrytech.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13) id 49ZFC4QK; Fri, 2 Nov 2001 11:32:04 -0500 Message-Id: <3.0.5.32.20011102113046.007bee20@email.quarrytech.com> X-Sender: mduffy@email.quarrytech.com X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32) Date: Fri, 02 Nov 2001 11:30:46 -0500 To: "Bob Penfield" , , "Melinda Shore" From: Mark Duffy Subject: Re: [midcom] Current status In-Reply-To: <017501c163b7$0b325ee0$2300000a@acmepacket.com> References: <5.1.0.14.0.20011031174517.00a5b0c0@mira-sjc5-4.cisco.com> <5.1.0.14.0.20011102102741.00a5dec0@mira-sjc5-4.cisco.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Hi Bob, R82 makes the ruleset extensible. I think your point is that this allows extension to specify interfaces/realms/in/out/etc. Of course that does not help the agent with knowing what middleboxes are there and which to talk to. AFAIK discovery has never been in the charter and Melinda's message below seems to confirm this now. Ok with me for the time being, I just wanted to verify that this was still the case, as it was not abundantly obvious to me after we had the whole "topology issue" going on. :-) -Mark At 10:57 AM 11/2/01 -0500, Bob Penfield wrote: >Mark & Melinda, > >I am satisfied with our current requirement (R82) which does not preclude >additional information/criteria in the filtering rules. > >cheers, >(-:bob ... >----- Original Message ----- >From: "Melinda Shore" >To: "Mark Duffy" ; >Sent: Friday, November 02, 2001 10:30 AM >Subject: Re: [midcom] Current status > > >> At 12:21 AM 11/2/01 -0500, Mark Duffy wrote: >> >The framework draft basically decides not to address this (section 5.0 >> >first paragraph, and section 9 first paragraph). We have the Aoun/Sen, >> >Penfield, and Molitor drafts from August that seem to support about that >> >same conclusion: the ability to support complex topologies is basically >> >limited by the topology knowledge the agent has available. >> >> The guidance from above right now seems to be "punt." This is >> likely to come up during the rechartering discussions; more on >> that later. >> >> In the meantime, many many many thanks to those who have gone >> through the framework document and provided feedback. We need >> to get this thing closed. >> >> Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 12:34:00 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12587 for ; Fri, 2 Nov 2001 12:34:00 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA24970 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 12:34:03 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA24589; Fri, 2 Nov 2001 12:28:17 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA24538 for ; Fri, 2 Nov 2001 12:28:15 -0500 (EST) Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12410 for ; Fri, 2 Nov 2001 12:28:11 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fA2HRgT20578; Fri, 2 Nov 2001 09:27:43 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABV26918; Fri, 2 Nov 2001 09:27:13 -0800 (PST) Message-Id: <5.1.0.14.0.20011102122448.00a65910@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Fri, 02 Nov 2001 12:29:58 -0500 To: Mark Duffy , "Bob Penfield" , From: Melinda Shore Subject: Re: [midcom] Current status In-Reply-To: <3.0.5.32.20011102113046.007bee20@email.quarrytech.com> References: <017501c163b7$0b325ee0$2300000a@acmepacket.com> <5.1.0.14.0.20011031174517.00a5b0c0@mira-sjc5-4.cisco.com> <5.1.0.14.0.20011102102741.00a5dec0@mira-sjc5-4.cisco.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 11:30 AM 11/2/01 -0500, Mark Duffy wrote: >R82 makes the ruleset extensible. I think your point is that this allows >extension to specify interfaces/realms/in/out/etc. Of course that does not >help the agent with knowing what middleboxes are there and which to talk to. Exactly. The whole topology thing is fundamentally out-of- scope. It came up because of what were probably unnecessarily detailed discussions about precisely what information is known by which element, etc. That's not to say that those discussions were unimportant or irrelevant - they weren't, and whether the topology discussions are reflected in the deliverables for this iteration of the working group or not they'll bear on the deliverables for the rechartered working group. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 15:13:14 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA17029 for ; Fri, 2 Nov 2001 15:13:12 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA28824 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 15:13:13 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA28765; Fri, 2 Nov 2001 15:09:12 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA28737 for ; Fri, 2 Nov 2001 15:09:10 -0500 (EST) Received: from hotmail.com (f110.pav1.hotmail.com [64.4.31.110]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA16919 for ; Fri, 2 Nov 2001 15:09:08 -0500 (EST) Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Fri, 2 Nov 2001 12:08:41 -0800 Received: from 207.5.1.168 by pv1fd.pav1.hotmail.msn.com with HTTP; Fri, 02 Nov 2001 20:08:40 GMT X-Originating-IP: [207.5.1.168] From: "James Ho" To: jdrosen@dynamicsoft.com, christopher.a.martin@wcom.com, bpenfield@acmepacket.com, bscott@ridgewaysystems.com, midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates Date: Fri, 02 Nov 2001 12:08:40 -0800 Mime-Version: 1.0 Content-Type: text/plain; format=flowed Message-ID: X-OriginalArrivalTime: 02 Nov 2001 20:08:41.0240 (UTC) FILETIME=[2AA28980:01C163DA] Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Two points. First, other then performance/latency issues (which I'd like to learn more about), I can't understand what is different about protocols targeted by midcom vs. protocols that have been and are securely supported by IPsec for firewall traversal. The whole pt of having standards such as Ipsec is that ITs confidence in allowing such protocols to be securely used is enhanced due to their standard status. I'm not sure defining new standards and/or proliferation of new protocols (especially for the focused purpose of firewall traversal of a specific set of media protocols) is going to enhance IT confidence or making security policy-setting easier. Finally, regarding performance, as I said earlier, the IP storage folks have standardized on IPsec as a mandatory component for authentication and integrity checking for iSCSI, FCIP, and iFCP protocols. These protocols have very stringent *round-trip* latency requirements, so it would behoove this group to carefully look at if the performance requirements of H.323/SIP are significantly different so as to justify standardizing on a new protocol. james >From: Jonathan Rosenberg >To: "'christopher.a.martin@wcom.com'" , >"'James Ho'" , bpenfield@acmepacket.com, >bscott@ridgewaysystems.com, midcom@ietf.org >Subject: RE: [midcom] pre-midcom candidates >Date: Fri, 2 Nov 2001 02:35:21 -0500 > > > > > > > -----Original Message----- > > From: Christopher A. Martin [mailto:christopher.a.martin@wcom.com] > > Sent: Thursday, November 01, 2001 1:46 PM > > To: 'James Ho'; bpenfield@acmepacket.com; bscott@ridgewaysystems.com; > > midcom@ietf.org > > Subject: RE: [midcom] pre-midcom candidates > > > > > > This would work well for an isolated network (intranet or > > extranet) but when > > it is desired to allow anyone (Internet) access it would be > > infeasible to > > provide security associations to the world > >Well, one need not do it to the world. Presumably, the VoIP provider would >offer this service to its customers. Then, it only need worry about >offering >ip addresses to the customers it has actively online. > > > > Also, IPSec doesnt provide security policy enforcement, as a firewall > > typically would on non-IPSec encapsulated packets, merely > > privacy. When you > > tunnel IPSec through a firewall from endpoints, unless the security > > associations are setup to be granular, the firewall cannot act on the > > packets inside the tunnel. > >No, they can't. Thats why it works. But thats also the problem shared by >all >the vpn and tunneling solutions; they ultimately work since they help >bypass >enterprise firewall policies that might exist. > >Stun doesn't do tunneling; if the firewall disallows outbound UDP then you >can't send outbound UDP. It therefore insures that enterprise firewall >policy continues to be obeyed. > > > Also not all firewalls allow IPSec (IP 50 and 51) the ability to pass > > through them. > >Pick your favorite vpn. Others get through and work. My favorite remains >RFC3093, which will traverse almost all firewalls and nats. > >-Jonathan R. > >--- >Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. >Chief Scientist First Floor >dynamicsoft East Hanover, NJ 07936 >jdrosen@dynamicsoft.com FAX: (973) 952-5050 >http://www.jdrosen.net PHONE: (973) 952-5000 >http://www.dynamicsoft.com > _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 15:56:01 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA17887 for ; Fri, 2 Nov 2001 15:56:01 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA29586 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 15:56:02 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA29392; Fri, 2 Nov 2001 15:43:02 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA29363 for ; Fri, 2 Nov 2001 15:43:00 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA17572 for ; Fri, 2 Nov 2001 15:42:53 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fA2KgVX21737; Fri, 2 Nov 2001 12:42:31 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABV35023; Fri, 2 Nov 2001 12:35:53 -0800 (PST) Message-Id: <5.1.0.14.0.20011102151726.00a67990@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Fri, 02 Nov 2001 15:38:25 -0500 To: "James Ho" , midcom@ietf.org From: Melinda Shore Subject: RE: [midcom] pre-midcom candidates In-Reply-To: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 12:08 PM 11/2/01 -0800, James Ho wrote: >The whole pt of having standards >such as Ipsec is that ITs confidence in allowing such protocols >to be securely used is enhanced due to their standard status. I'm not >sure defining new standards and/or proliferation of new >protocols (especially for the focused purpose of firewall traversal >of a specific set of media protocols) is going to enhance IT confidence >or making security policy-setting easier. If we must have this discussion (and I'd really rather we didn't - the working group was chartered some time ago under considerable scrutiny and we've nearly finished our work), we should start with the understanding that nobody is saying "never tunnel" and that we're not trying to supplant mechanisms that work. Midcom is a response to well-understood situations in which tunneling will *not* work or will work badly. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 18:53:31 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA22008 for ; Fri, 2 Nov 2001 18:53:31 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id SAA04753 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 18:53:34 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA04734; Fri, 2 Nov 2001 18:51:15 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA04706 for ; Fri, 2 Nov 2001 18:51:13 -0500 (EST) Received: from hotmail.com (f73.pav1.hotmail.com [64.4.31.73]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA21997 for ; Fri, 2 Nov 2001 18:51:10 -0500 (EST) Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Fri, 2 Nov 2001 15:50:43 -0800 Received: from 207.5.1.168 by pv1fd.pav1.hotmail.msn.com with HTTP; Fri, 02 Nov 2001 23:50:43 GMT X-Originating-IP: [207.5.1.168] From: "James Ho" To: mshore@cisco.com, midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates Date: Fri, 02 Nov 2001 15:50:43 -0800 Mime-Version: 1.0 Content-Type: text/plain; format=flowed Message-ID: X-OriginalArrivalTime: 02 Nov 2001 23:50:43.0478 (UTC) FILETIME=[2F4EBB60:01C163F9] Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org My earlier e-mail was only regarding the pre-midcom drafts (i.e. the requirements for the new midcom framework are clear while I'm not clear on the need to come up with a new protocol standard vs. use of an existing protocol standard for the pre-midcom work). Sorry if I'm bringing up issues that may have been hashedout before. Saqib >From: Melinda Shore >To: "James Ho" , midcom@ietf.org >Subject: RE: [midcom] pre-midcom candidates >Date: Fri, 02 Nov 2001 15:38:25 -0500 > >At 12:08 PM 11/2/01 -0800, James Ho wrote: > >The whole pt of having standards > >such as Ipsec is that ITs confidence in allowing such protocols > >to be securely used is enhanced due to their standard status. I'm not > >sure defining new standards and/or proliferation of new > >protocols (especially for the focused purpose of firewall traversal > >of a specific set of media protocols) is going to enhance IT confidence > >or making security policy-setting easier. > >If we must have this discussion (and I'd really rather we >didn't - the working group was chartered some time ago under >considerable scrutiny and we've nearly finished our work), we >should start with the understanding that nobody is saying "never >tunnel" and that we're not trying to supplant mechanisms that >work. Midcom is a response to well-understood situations in which >tunneling will *not* work or will work badly. > >Melinda > _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 2 19:03:32 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA22121 for ; Fri, 2 Nov 2001 19:03:32 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id TAA05206 for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 19:03:33 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA05163; Fri, 2 Nov 2001 19:01:24 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA05131 for ; Fri, 2 Nov 2001 19:01:23 -0500 (EST) Received: from yamato.ccrle.nec.de (yamato.ccrle.nec.de [195.37.70.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA22093 for ; Fri, 2 Nov 2001 19:01:20 -0500 (EST) Received: from wallace.heidelberg.ccrle.nec.de (root@wallace.heidelberg.ccrle.nec.de [192.168.102.1]) by yamato.ccrle.nec.de (8.11.3/8.10.1) with ESMTP id fA303Xf48286; Sat, 3 Nov 2001 01:03:33 +0100 (CET) Received: from [192.168.102.22] ([192.168.102.22]) by wallace.heidelberg.ccrle.nec.de (8.9.3/8.9.3/SuSE Linux 8.9.3-0.1) with ESMTP id BAA20785; Sat, 3 Nov 2001 01:01:23 +0100 Date: Sat, 03 Nov 2001 01:02:46 +0100 From: Juergen Quittek To: midcom@ietf.org cc: stiemerling@ccrle.nec.de Message-ID: <4021986412.1004749366@[192.168.102.22]> X-Mailer: Mulberry/2.0.8 (Win32) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Content-Disposition: inline Content-Transfer-Encoding: 7bit Subject: [midcom] very simple midcom-type protocol Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit We have submitted an Internet draft on the Simple NAT and Firewall Control (SNFC) protocol. Until it is available at the I-D repository, you can find it at http://www.ibr.cs.tu-bs.de/~quittek/draft-stiemerling-nat-fw-config-00.txt We will implement the SNFC protocol for the SOCKS firewall software. Our intention is to contribute to the current discussion on midcom requirements by emphasizing the principle of KISS. We are aware of the fact that SNFC does not meet all requirements currently under discussion. However, we believe that also a simple approach like ours can be very useful in many situations where middlebox control is desired. Juergen -- Juergen Quittek quittek@ccrle.nec.de Tel: +49 6221 90511-15 NEC Europe Ltd., Network Laboratories Fax: +49 6221 90511-55 Adenauerplatz 6, 69115 Heidelberg, Germany http://www.ccrle.nec.de _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 5 02:31:32 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA08831 for ; Mon, 5 Nov 2001 02:31:31 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id CAA26879 for midcom-archive@odin.ietf.org; Mon, 5 Nov 2001 02:31:33 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id CAA26468; Mon, 5 Nov 2001 02:17:22 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id CAA26439 for ; Mon, 5 Nov 2001 02:17:20 -0500 (EST) Received: from web13802.mail.yahoo.com (web13802.mail.yahoo.com [216.136.175.12]) by ietf.org (8.9.1a/8.9.1a) with SMTP id CAA08731 for ; Mon, 5 Nov 2001 02:17:18 -0500 (EST) Message-ID: <20011105071721.34555.qmail@web13802.mail.yahoo.com> Received: from [65.12.33.187] by web13802.mail.yahoo.com via HTTP; Sun, 04 Nov 2001 23:17:21 PST Date: Sun, 4 Nov 2001 23:17:21 -0800 (PST) From: Pyda Srisuresh Subject: Re: [midcom] Rev4 of MIDCOM Architecture & framework document To: Mark Duffy , midcom@ietf.org In-Reply-To: <3.0.5.32.20011102002146.008f6a90@email.quarrytech.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org --- Mark Duffy wrote: > Thank you Suresh, here are my comments. > These are just suggestions on the document, not I think on the fundamental > concepts. -- Mark. > OK. > > Section 2.15 -- definition of "Ruleset". I recommend we remove the second > paragraph: > Ruleset specifies the dynamic resources (i.e., Filter Specs, > Action Specs, Ruleset type, Timeout values etc.) that maybe > communicated through the MIDCOM protocol. > I don't think it adds much to the definition, and it introduces another new > undefined term ("resources"). There was some discussion of removing this > on the list 4 Oct. > The above sentence is meant to provide the context in which the term is applicable. SO, I will simply replace the above sentence as follows to avoid adding new terms. Rulesets are communicated through the Midcom protocol. > Section 6.0 -- policy server. In the third paragraph it states > The policy server acts in an advisory capacity to a middlebox to > authorize or terminate authorization for an agent to gain > connectivity to the middlebox. The primary objective of a policy > I think "gain connectivity to the middlebox" is a fairly imprecise wording. > Section 2.9 (policy server definition) has more/better description than > this section 6.0. Perhaps some of that can be moved here and replace some > of 6.0. Hope the following rewording will work for you. The policy server acts in an advisory capacity to a middlebox to authorize or terminate authorization for an agent attempting connectivity to the middlebox. > BTW my understanding, and I can read this into the section 2.9 > description but it is not unambiguously stated there, that the policy > server may govern which agents may establish midcom sessions with the > middlebox *and also* restrict what Rulesets a given agent may manipulate. > No? Perhaps we can clarify that. Mark -Please refer paragraph 2 of section 6.2. The docoument cannot be an exhaustive list of all the items people want to include in a policy server. The paragraph lists items that may be included, but not limited to these. > > Section 6.2 -- registration. The first paragraph explains that > registration is different than establishing a session. The phrase > "transport session" is used several times in this paragraph. I suggest > that the first two uses should be replaced with the recently defined term > "Midcom session". > OK. > Section 6.2. The third paragraph seems confusing. Also, it discusses > either the agent or the middlebox initiating the midcom session. My > understanding from the requirements discussion etc. is that we have come > around to only the agent initiating the session. I suggest modifying the > paragraph as follows: > The MIDCOM agent profile may be pre-configured on the middlebox while > provisioning the middlebox function. Thereafter, the agent may choose > to initiate a Midcom session prior to any data traffic. Alternatively, > it may choose to initiate a Midcom session only upon noticing the > application specific traffic. > You are right about the client-server conclusion. Only an agent is assumed initiate the session. So, the first 2 sentences make sense. But, the last sentence is perhaps meaningless in the context of client-server communication. How does a MIDCOM agent notice application specific traffic, without the middlebox informing it? A middlebox will not know to notify an agent it is not in session with. So, I will remove the last sentence. > Section 6.2. The 4th paragraph discusses "Coupling MIDCOM agents with the > middlebox ruleset". I'm not sure what that coupling refers to. Can we > clarify this? > The coupling (or preconfiguring) of Midcom agents with Filter Spec was described when a middlebox is permitted to initiate a session with an agent. When an Agent is preconfigured to be associated with a Filter Spec, the middlebox knows to invoke the agent for the first packet matching the Filter Spec. Now, I understand, a decision has been made by the WG that the MIDCOM protocol should be client-server type and not peer-to-peer. Sorry, I wasnt able to participate in the discussion at the time. So, I will go along with the WG decision. In the revised light of client-server type communication, I believe, the coupling of an Agent with Filter Spec is still relevant in that it refers to agent authorization policy (i.e., session tuples for which the agent is authorized to act as ALG) on the middlebox. I could reword the paragraph as follows. MIDCOM agent authorization policy may be preconfigured on a middlebox, by specifying the agent in conjunction with Filter Spec for a middlebox service. In the case of a firewall, for example, the ACL tuple may be altered to reflect the optional Agent presence. The revised ACL may look something like the following. (, , , , , , ) > Section 6.2. The seventh paragraph is confusing, and again contains the > concept of the middlebox initiating the midcom session. Since the main > purpose of this paragraph (I think) is to point out that the agent > information may be provisioned into a policy server rather than the > middlebox, and we've said that above, I suggest just omitting this paragraph. > This is about session termination (not initiation). SO, I dont believe there should be any confusion about middlebox initiating the MIDCOM session. Anyways, I am OK with dropping the paragraph. > Section 6.2, 8th paragraph. The first seven lines here are about midcom > session disconnection and have nothing to do with > registration/deregistration. Since they cover material already presented > in section 4, I suggest deleting them. > OK. > Section 11-security considerations. The first paragraph points out some > deleterious effects of middleboxes on security protocols. The second > paragraph seems to state that midcom can fix all this because the middlebox > will no longer need to inspect or modify data. The text should acknowledge > that the midcom model does not help with the problem of NAT breaking IPsec > since in this case the middlebox still modifies data that matters. > OK. I will add the following sentence at the end of second paragraph. Note, however, the MIDCOM framework does not help with the problem of NAT breaking IPsec since in this case the middlebox still modifies IP and transport headers. regards, suresh ===== __________________________________________________ Do You Yahoo!? Find a job, post your resume. http://careers.yahoo.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 5 10:15:36 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA22421 for ; Mon, 5 Nov 2001 10:15:36 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id KAA12919 for midcom-archive@odin.ietf.org; Mon, 5 Nov 2001 10:15:37 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA12417; Mon, 5 Nov 2001 10:01:19 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA12389 for ; Mon, 5 Nov 2001 10:01:17 -0500 (EST) Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA21866 for ; Mon, 5 Nov 2001 10:01:15 -0500 (EST) Received: from smtprch2.nortel.com (erchg0k.us.nortel.com [47.113.64.104]) by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id JAA07210 for ; Mon, 5 Nov 2001 09:00:40 -0600 (CST) Received: from zrchb200.us.nortel.com by smtprch2.nortel.com; Mon, 5 Nov 2001 08:52:58 -0600 Received: by zrchb200.us.nortel.com with Internet Mail Service (5.5.2653.19) id ; Mon, 5 Nov 2001 08:58:57 -0600 Message-ID: <933FADF5E673D411B8A30002A5608A0E06F2AC@zrc2c012.us.nortel.com> From: "Sanjoy Sen" To: "'Bob Penfield'" , midcom Cc: "Sanjoy Sen" Subject: RE: [midcom] pre-midcom candidates Date: Mon, 5 Nov 2001 08:58:49 -0600 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C1660A.6061C1D0" X-Orig: Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C1660A.6061C1D0 Content-Type: text/plain; charset="windows-1252" > -----Original Message----- > From: Bob Penfield [mailto:bpenfield@acmepacket.com] > Sent: Friday, November 02, 2001 9:14 AM > To: midcom > Subject: Re: [midcom] pre-midcom candidates > > > ... > > I do think we need to address the symmetric NAT problem soon. > > The Sen proposal seems too narrow in its focus on SIP and RTP. It also > includes a midcom-like component in the protocol between the > SIP element and > the RTP proxy. To standardize this approach we would need to > standardize the > RTP proxy control protocol and we would virtually have > midcom. The RTP proxy > is just a specialized NAT middlebox. As far as standardization, the only requirement in the Sen proposal is the option tag (indicating to the Proxy that the client is behind the NAT) for the signaling path. For the RTP Proxy control, a device control protocol such as Megaco or MGCP can be used as is, i.e. there's no standardization effort required. For traditional Firewall/NAT control (Midcom), Megaco needs to be extended as has been described in: http://search.ietf.org/internet-drafts/draft-sct-midcom-megaco-00.txt http://search.ietf.org/internet-drafts/draft-sct-midcom-megaco-pkg-00.txt The Sen proposal is as close to Midcom as it gets & is the simplest of the three proposals. The proposal primarily addresses the needs of different (albeit, overlapping) market segments than STUN. STUN is useful for residential and perhaps some small/medium Enterprise scenarios, where Cone type of NAT's predominate. The Media Proxy is the ideal candidate for medium/large Enterprise and Carrier service providers. Not only the predominant FW/NAT configuration for medium/large Enterprises mimick the symmetric NAT behavior, but the signaling/media Proxy combination provides some key advantages in terms of route-pinning and service management (e.g., billing, legal intercept) for service providers, carriers. Thanks, Sanjoy ================================ Interactive Multimedia Server Carrier VoIP Nortel Networks Ph: 972-685-8274, Fax: 972-685-3813 Mobile: 972-571-2062 ------_=_NextPart_001_01C1660A.6061C1D0 Content-Type: text/html; charset="windows-1252" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom candidates

> -----Original Message-----
> From: Bob Penfield [mailto:bpenfield@acmepacket.com= ]
> Sent: Friday, November 02, 2001 9:14 AM
> To: midcom
> Subject: Re: [midcom] pre-midcom = candidates
>
>
>
...
>
> I do think we need to address the symmetric NAT = problem soon.
>
> The Sen proposal seems too narrow in its focus = on SIP and RTP. It also
> includes a midcom-like component in the = protocol between the
> SIP element and
> the RTP proxy. To standardize this approach we = would need to
> standardize the
> RTP proxy control protocol and we would = virtually have
> midcom. The RTP proxy
> is just a specialized NAT middlebox.

As far as standardization, the only requirement in = the Sen proposal is the option tag (indicating to the Proxy that the = client is behind the NAT) for the signaling path. For the RTP Proxy = control, a device control protocol such as Megaco or MGCP can be used = as is, i.e. there's no standardization effort required. For traditional = Firewall/NAT control (Midcom), Megaco needs to be extended as has been = described in:

http://search.ietf.org/internet-drafts/draft-sct-midco= m-megaco-00.txt
http://search.ietf.org/internet-drafts/draft-sct-midco= m-megaco-pkg-00.txt

The Sen proposal is as close to Midcom as it gets = & is the simplest of the three proposals. The proposal primarily = addresses the needs of different (albeit, overlapping) market segments = than STUN. STUN is useful for residential and perhaps some small/medium = Enterprise scenarios, where Cone type of NAT's predominate. The Media = Proxy is the ideal candidate for medium/large Enterprise and Carrier = service providers. Not only the predominant FW/NAT configuration for = medium/large Enterprises mimick the symmetric NAT behavior, but the = signaling/media Proxy combination provides some key advantages in terms = of route-pinning and service management (e.g., billing, legal = intercept) for service providers, carriers. 

Thanks,
Sanjoy

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Interactive Multimedia Server
Carrier VoIP
Nortel Networks
Ph: 972-685-8274, Fax: 972-685-3813
Mobile: 972-571-2062



------_=_NextPart_001_01C1660A.6061C1D0-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 6 00:51:18 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA17316 for ; Tue, 6 Nov 2001 00:51:18 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id AAA05779 for midcom-archive@odin.ietf.org; Tue, 6 Nov 2001 00:51:18 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA05668; Tue, 6 Nov 2001 00:42:06 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA05643 for ; Tue, 6 Nov 2001 00:42:04 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA17230 for ; Tue, 6 Nov 2001 00:42:04 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fA65eCVW007223; Tue, 6 Nov 2001 00:40:12 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Tue, 6 Nov 2001 00:41:30 -0500 Message-ID: From: Jonathan Rosenberg To: "'James Ho'" , mshore@cisco.com, midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates Date: Tue, 6 Nov 2001 00:41:28 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org > -----Original Message----- > From: James Ho [mailto:jamesho37@hotmail.com] > Sent: Friday, November 02, 2001 6:51 PM > To: mshore@cisco.com; midcom@ietf.org > Subject: RE: [midcom] pre-midcom candidates > > > My earlier e-mail was only regarding the pre-midcom drafts > (i.e. the requirements for the new midcom framework are clear while > I'm not clear on the need to come up with a new protocol standard > vs. use of an existing protocol standard for the pre-midcom work). > Sorry if I'm bringing up issues that may have been hashedout before. THis is indeed a good question, and its the point I have been trying to make. There are a variety of VPN solutions, and many of them allow applications to traverse nat. There are drawbacks of the VPN solutions - increased latency and increased data traffic to the provider. Any solution which retains these drawbacks is just going to define yet-another VPN approach, and its not clear what the value of that is. There IS immmediate value in a solution that does not suffer these problems, and therefore does something different from VPN will do. That is the point to the stun proposal. -Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 6 15:39:42 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02592 for ; Tue, 6 Nov 2001 15:39:42 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA17821 for midcom-archive@odin.ietf.org; Tue, 6 Nov 2001 15:39:45 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA17681; Tue, 6 Nov 2001 15:32:40 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA17652 for ; Tue, 6 Nov 2001 15:32:37 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA02408 for ; Tue, 6 Nov 2001 15:32:32 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.2) with SMTP id M2001110620295217572 ; Tue, 06 Nov 2001 20:29:52 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Tue, 6 Nov 2001 20:31:58 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639E92244@ThisAddressDoesNotExist> From: Steve Davies To: Christian Huitema , Steve Davies, midcom Cc: Melinda Shore , Jonathan Rosenberg Subject: RE: [midcom] pre-midcom candidates - the Davies Critique Date: Tue, 6 Nov 2001 20:31:55 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C16702.132E9520" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C16702.132E9520 Content-Type: text/plain; charset="ISO-8859-1" Christian, Are we talking at cross purposes? I understand that the STUN protocol itself will go through the firewall in the manner you describe here, but I couldn't find anything in your draft to say how STUN would help VoIP traverse a firewalls/NAT combination or Symmetric NAT once it has discovered that the terminal is behind such a configuration. Indeed, the Davies draft explains how VoIP can successfully traverse this deployment configuration using the technique you describe here - i.e 'let a response come in to a packet sent from an internal port' using a policy that is (at least we have found) acceptable to the local IT manager. Steve -----Original Message----- From: Christian Huitema [mailto:huitema@windows.microsoft.com] Sent: 31 October 2001 22:26 To: Steve Davies; midcom Cc: Melinda Shore; Jonathan Rosenberg Subject: RE: [midcom] pre-midcom candidates - the Davies Critique Steve, Your point regarding "Stun and firewalls" is mistaken. The STUN requirement is that if there is a firewall, it let a response come in to a packet sent from an internal port. This is the default behavior of most "residential NAT/firewall", and it is also an optional behavior in many enterprise firewalls. Whether such a policy is deemed acceptable by the local IT manager is debatable -- there are pros and cons. -- Christian Huitema -----Original Message----- From: Steve Davies [mailto:sdavies@ridgewaysystems.com] Sent: Wednesday, October 31, 2001 12:57 PM To: 'midcom' Cc: 'Melinda Shore'; 'Jonathan Rosenberg' Subject: RE: [midcom] pre-midcom candidates - the Davies Critique (Apologies if you get this twice. The first attempt was too long for the mailing list so I've deleted the history.).... Naturally, I don't entirely agree with Jonathan's analysis. Here is mine: The Sen Proposal: ----------------- I don't see the Sen proposal as an adequate near-term/pre-midcom solution for two main reasons: (a) it requires changes to the protocol: ---------------------------------------- In order to make the Sen proposal work we are told that a new service tag must be incorporated in the SIP Register request and a new SIP Ping (keep-alive) method must be incorporated. Not only will this take time to implement in SIP but presumably we'll also need corresponding protocol changes for Megaco, MGCP, H.323, etc. Or is Midcom SIP-specific? (b) it requires behavioural changes to the client: -------------------------------------------------- It requires symmetric RTP and the continual transmission of RTP and RTCP packets to keep the NAT bindings open. While symmetric RTP may be a good thing, that doesn't imply all applications have constant bi-directional streams - think of 'broadcast' type applications. Also why should terminals be expected to turn off silence suppression? How are endpoints to know when and when not to make this behavioural change? Other weaknesses of the proposal include a requirement on terminals to signal to the SIP proxy when they are behind a NAT. It is not explained how they are supposed to know whether or not they are. Additionally, the use of random ports on the RTP Proxy makes it difficult to protect such a device with a regular filtering firewall. Such configurations would be required for an enterprise do-it-yourself solution(the enterprise is its own provider) and by service providers wanting to protect their networks and service from DoS attacks. Note that correction of all these shortcomings results in the same architecture and method outlined in the Davies proposal. The Rosenberg/STUN Proposal: ---------------------------- Whilst I acknowledge the STUN proposal provides a method to determine the type of NAT a terminal may be behind, I view the proposal as incomplete and potentially impractical candidate as a near-term/pre-midcom solution. a) Firewalls are everywhere: ---------------------------- Whenever a firewall is deployed in conjunction with a NAT, irrespective of the type of NAT, the net result is equivalent to what the STUN method describes as a Symmetric NAT. In the case of symmetric NATs, the Rosenberg proposal acknowledges that a media intermediary/relay (or RTP Proxy) is required. However, the STUN proposal doesn't inform us what the architecture and method are for making calls in this case, although Jonathan acknowledges in his email that there are three solutions - the Davies proposal, the Sen proposal and an unpublished STUN proposal. Firewalls are a fact of life in all enterprises connected to the internet. An ever-increasing number of users are installing firewalls in their homes as well. The majority of calls will require a media intermediary/RTP Proxy. In other words, VoIP providers will have to install media intermediaries from Day One of any service. Can you imagine the subscription scenario if they don't: Customer: 'Please may I subscribe to your service' Provider: 'Is your terminal behind a firewall?' Customer: 'Yes' Provider: 'Sorry our service won't work for you' or 'Yes, but please place your terminal outside the firewall' or 'Yes, but you can only call other people not behind a firewall or symmetric NAT'. This is not what the VoIP industry needs right now! b) Too early to optimise: ------------------------- The STUN proposal boils down to a port saving technique for VoIP providers. But in a nascent market its impractical to start with a port saving technique particularly when its unquantifiable how many ports a provider may save. What providers need is a solution that is deployable in all cases - that implies a media intermediary solution. Trying to combine a port saving technique in conjunction with a media intermediary solution will add complexity that will delay and stall the VoIP market. From a provider's perspective, this delay and additional testing could far outweigh any savings gained by requiring fewer media intermediary ports. c) Unproven: ------------ i) TIMEOUTS. When a user is behind a firewall or symmetric NAT, to avoid use of a media intermediary the terminal must invoke the STUN protocol on a call by call basis. The STUN protocol requires potentially significant timeouts to expire in order to determine whether media may go direct. What will this do to call setup times? ii) NETWORK BASED NATS. There may be cases where the terminal determines that the media may go direct, but in fact the media passes through network based NATs and the call will fail. This would typically happen at the provider boundary, because the provider uses some internal addressing scheme or when passing from IPv4 to IPv6 networks. The solution would be to place the STUN server on the remote side of those network based NATs, but this would have the consequence of tromboning the media via those network based NATs for 'provider-internal' calls, defeating the reason for STUN. Alternatively, multiple STUN servers would need to be deployed - one for each different NAT location, but that then poses the question of how a terminal would know which STUN server to use on a call-by-call basis. Davies proposal: ---------------- The Davies proposal is very midcom-like. The Proxy Extension Agent (PEA) is like a MIDDLEBOX and the Application Proxy (AP) is like a MIDCOM AGENT. The AP is responsible for getting publicly reachable transport addresses on the PEA for external calls and publishing those addresses in the protocol messages. The Davies proposal simplifies the security policy problem being grappled with by MIDCOM to a very simple static policy administered and controlled by the IT manager and implemented on existing firewalls. Just three static pinholes are required to be configured in the firewall. Furthermore, these pinholes are outbound pinholes(i.e. out from the enterprise). Jonathan writes that in the Davies draft there are issues to do with consistency with enterprise firewall policy, but this is unsubstantiated. When details of these issues are provided, we will be happy to discuss them. The Davies method is entirely consistent with enterprise firewall policy - it is similar to, but actually far more restrictive than the firewall policy that allows web browsing for example. The Davies proposal's policy has been vetted by service providers and is already in commercial deployments - we can only assume enterprises find it acceptable. As well as being midcom-like, the Davies method has many other significant advantages: * It provides a 100% solution. It will work anywhere no matter how many and what type and combination of firewalls and NATs there are. * No change is required to any of the protocols. It is not even necessary for endpoints to implement symmetric RTP. * The implementation can be made transparent to the endpoints or be implemented by them. * Enterprise or Service Provider deployments are possible. The PEA may be deployed within a service provider's network or within the DMZ of an enterprise's own service centre. * Passing through a media intermediary is seen as enhancing security and saving IP addresses. Hiding an enterprise IP address from the remote party (only the transport addresses of the PEA are published in messages) is seen as a benefit and enables the enterprise to use the same IP address used for other Internet traffic. * Service Providers see a benefit in handling the media through PEA for several reasons. It enables them to hide the transport addresses of their other service equipment. It provides them with a suitable point to implement wire-tapping (e.g.CALEA) - ITSPs in many countries are bound to provide such capabilities. It also provides them with a media QOS execution point and it provides suitable IPv4/IPv6 migration boundary points. Jonathan seeks to belittle the Davies proposal by likening it to RSIP. I'm not sure what the point is here. It is true that we have borrowed and learnt from many of the principles and techniques used within the Internet. That's why we have well known ports, outbound initiated connections, and TCP multiplexing, so it's not surprising the method is recognisable and architecturally looks similar to other protocols. What is unique, is the way in which this method combines the different Internet techniques together with the transport of real-time UDP streams without any tunneling overhead. In fact, the single disadvantage of the Davies proposal is that it requires media intermediaries, but no-one has devised a non-media intermediary solution that solves all of today's firewall and NAT deployments. In any case, media intermediaries are not of much concern to service providers because they will co-locate those intermediaries with their access equipment in their POPs. In due course, those intermediaries may even be implemented in the access routers or Midcom will obviate them. Pre-Midcom Recommendation: -------------------------- Jonathan writes that he wants to tackle the harder stuff, i.e. firewalls and symmetric NATs, later. The fact of the matter is that the Davies proposal has solved the harder stuff already. It is the Davies proposal that is the low-hanging fruit because it addresses 100% of deployments and it has working examples. Surely this is where a pre-midcom solution must start. A VoIP provider needs it from Day One because it is very likely some/many customers will have a firewall or symmetric NAT. If in time, providers are seeking more efficient deployments or are seeking to reduce costs, then the Davies solution is easily extended to incorporate a STUN-like method. But before embarking on this effort it would be wise to judge the market need and determine when MIDCOM will kick in. Steve Davies ------_=_NextPart_001_01C16702.132E9520 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom candidates - the Davies Critique

Christian,

Are we talking at cross purposes? I understand that = the STUN protocol itself will go through the firewall in the manner you = describe here, but I couldn't find anything in your draft to say how = STUN would help VoIP traverse a firewalls/NAT combination or Symmetric = NAT once it has discovered that the terminal is behind such a = configuration. Indeed, the Davies draft explains how VoIP can = successfully traverse this deployment configuration using the technique = you describe here - i.e 'let a response come in to a packet sent from = an internal port' using a policy that is (at least we have found) = acceptable to the local IT manager.

Steve

-----Original Message-----
From: Christian Huitema [mailto:huitema@windows.mic= rosoft.com]
Sent: 31 October 2001 22:26
To: Steve Davies; midcom
Cc: Melinda Shore; Jonathan Rosenberg
Subject: RE: [midcom] pre-midcom candidates - the = Davies Critique


Steve,

Your point regarding "Stun and firewalls" = is mistaken. The STUN
requirement is that if there is a firewall, it let a = response come in to
a packet sent from an internal port. This is the = default behavior of
most "residential NAT/firewall", and it is = also an optional behavior in
many enterprise firewalls. Whether such a policy is = deemed acceptable by
the local IT manager is debatable -- there are pros = and cons.

-- Christian Huitema

-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysyste= ms.com]
Sent: Wednesday, October 31, 2001 12:57 PM
To: 'midcom'
Cc: 'Melinda Shore'; 'Jonathan Rosenberg'
Subject: RE: [midcom] pre-midcom candidates - the = Davies Critique

(Apologies if you get this twice. The first attempt = was too long for the
mailing list so I've deleted the history.).... =
Naturally, I don't entirely agree with Jonathan's = analysis. Here is
mine:
The Sen Proposal:
-----------------
I don't see the Sen proposal as an adequate = near-term/pre-midcom
solution for two main reasons:
(a) it requires changes to the protocol:
----------------------------------------
In order to make the Sen proposal work we are told = that a new service
tag must be incorporated in the SIP Register request = and a new SIP Ping
(keep-alive) method must be incorporated. Not only = will this take time
to implement in SIP but presumably we'll also need = corresponding
protocol changes for Megaco, MGCP, H.323, etc. Or is = Midcom
SIP-specific?
(b) it requires behavioural changes to the client: =
-------------------------------------------------- =
It requires symmetric RTP and the continual = transmission of RTP and RTCP
packets to keep the NAT bindings open. While = symmetric RTP may be a good
thing, that doesn't imply all applications have = constant bi-directional
streams - think of 'broadcast' type applications. = Also why should
terminals be expected to turn off silence = suppression? How are endpoints
to know when and when not to make this behavioural = change?
Other weaknesses of the proposal include a = requirement on terminals to
signal to the SIP proxy when they are behind a NAT. = It is not explained
how they are supposed to know whether or not they = are. Additionally, the
use of random ports on the RTP Proxy makes it = difficult to protect such
a device with a regular filtering firewall. Such = configurations would be
required for an enterprise do-it-yourself = solution(the enterprise is its
own provider) and by service providers wanting to = protect their networks
and service from DoS attacks.
Note that correction of all these shortcomings = results in the same
architecture and method outlined in the Davies = proposal.
The Rosenberg/STUN Proposal:
----------------------------
Whilst I acknowledge the STUN proposal provides a = method to determine
the type of NAT a terminal may be behind, I view the = proposal as
incomplete and potentially impractical candidate as = a
near-term/pre-midcom solution.
a) Firewalls are everywhere:
----------------------------
Whenever a firewall is deployed in conjunction with = a NAT, irrespective
of the type of NAT, the net result is equivalent to = what the STUN method
describes as a Symmetric NAT. In the case of = symmetric NATs, the
Rosenberg proposal acknowledges that a media = intermediary/relay (or RTP
Proxy) is required. However, the STUN proposal = doesn't inform us what
the architecture and method are for making calls in = this case, although
Jonathan acknowledges in his email that there are = three solutions - the
Davies proposal, the Sen proposal and an unpublished = STUN proposal.
Firewalls are a fact of life in all enterprises = connected to the
internet. An ever-increasing number of users are = installing firewalls in
their homes as well. The majority of calls will = require a media
intermediary/RTP Proxy. In other words, VoIP = providers will have to
install media intermediaries from Day One of any = service. Can you
imagine the subscription scenario if they don't: =
Customer: 'Please may I subscribe to your service' =
Provider: 'Is your terminal behind a firewall?' =
Customer: 'Yes'
Provider: 'Sorry our service won't work for you' or = 'Yes, but please
place your terminal outside the firewall' or 'Yes, = but you can only call
other people not behind a firewall or symmetric = NAT'.
This is not what the VoIP industry needs right now! =
b) Too early to optimise:
-------------------------
The STUN proposal boils down to a port saving = technique for VoIP
providers. But in a nascent market its impractical = to start with a port
saving technique particularly when its = unquantifiable how many ports a
provider may save. What providers need is a solution = that is deployable
in all cases - that implies a media intermediary = solution. Trying to
combine a port saving technique in conjunction with = a media intermediary
solution will add complexity that will delay and = stall the VoIP market.
From a provider's perspective, this delay and = additional testing could
far outweigh any savings gained by requiring fewer = media intermediary
ports.
c) Unproven:
------------
i) TIMEOUTS. When a user is behind a firewall or = symmetric NAT, to avoid
use of a media intermediary the terminal must invoke = the STUN protocol
on a call by call basis. The STUN protocol requires = potentially
significant timeouts to expire in order to determine = whether media may
go direct. What will this do to call setup = times?
ii) NETWORK BASED NATS. There may be cases where the = terminal determines
that the media may go direct, but in fact the media = passes through
network based NATs and the call will fail. This = would typically happen
at the provider boundary, because the provider uses = some internal
addressing scheme or when passing from IPv4 to IPv6 = networks. The
solution would be to place the STUN server on the = remote side of those
network based NATs, but this would have the = consequence of tromboning
the media via those network based NATs for = 'provider-internal' calls,
defeating the reason for STUN. Alternatively, = multiple STUN servers
would need to be deployed - one for each different = NAT location, but
that then poses the question of how a terminal would = know which STUN
server to use on a call-by-call basis.
Davies proposal:
----------------
The Davies proposal is very midcom-like. The Proxy = Extension Agent (PEA)
is like a MIDDLEBOX and the Application Proxy (AP) = is like a MIDCOM
AGENT. The AP is responsible for getting publicly = reachable transport
addresses on the PEA for external calls and = publishing those addresses
in the protocol messages.
The Davies proposal simplifies the security policy = problem being
grappled with by MIDCOM to a very simple static = policy administered and
controlled by the IT manager and implemented on = existing firewalls. Just
three static pinholes are required to be configured = in the firewall.
Furthermore, these pinholes are outbound = pinholes(i.e. out from the
enterprise).
Jonathan writes that in the Davies draft there are = issues to do with
consistency with enterprise firewall policy, but = this is
unsubstantiated. When details of these issues are = provided, we will be
happy to discuss them. The Davies method is entirely = consistent with
enterprise firewall policy - it is similar to, but = actually far more
restrictive than the firewall policy that allows web = browsing for
example. The Davies proposal's policy has been = vetted by service
providers and is already in commercial deployments - = we can only assume
enterprises find it acceptable.
As well as being midcom-like, the Davies method has = many other
significant advantages:
* It provides a 100% solution. It will work anywhere = no matter how many
and what type and combination of firewalls and NATs = there are.
* No change is required to any of the protocols. It = is not even
necessary for endpoints to implement symmetric RTP. =
* The implementation can be made transparent to the = endpoints or be
implemented by them.
* Enterprise or Service Provider deployments are = possible. The PEA may
be deployed within a service provider's network or = within the DMZ of an
enterprise's own service centre.
* Passing through a media intermediary is seen as = enhancing security and
saving IP addresses. Hiding an enterprise IP address = from the remote
party (only the transport addresses of the PEA are = published in
messages) is seen as a benefit and enables the = enterprise to use the
same IP address used for other Internet = traffic.
* Service Providers see a benefit in handling the = media through PEA for
several reasons. It enables them to hide the = transport addresses of
their other service equipment. It provides them with = a suitable point to
implement wire-tapping (e.g.CALEA) - ITSPs in many = countries are bound
to provide such capabilities. It also provides them = with a media QOS
execution point and it provides suitable IPv4/IPv6 = migration boundary
points.
Jonathan seeks to belittle the Davies proposal by = likening it to RSIP.
I'm not sure what the point is here. It is true that = we have borrowed
and learnt from many of the principles and = techniques used within the
Internet. That's why we have well known ports, = outbound initiated
connections, and TCP multiplexing, so it's not = surprising the method is
recognisable and architecturally looks similar to = other protocols. What
is unique, is the way in which this method combines = the different
Internet techniques together with the transport of = real-time UDP streams
without any tunneling overhead.
In fact, the single disadvantage of the Davies = proposal is that it
requires media intermediaries, but no-one has = devised a non-media
intermediary solution that solves all of today's = firewall and NAT
deployments. In any case, media intermediaries are = not of much concern
to service providers because they will co-locate = those intermediaries
with their access equipment in their POPs. In due = course, those
intermediaries may even be implemented in the access = routers or Midcom
will obviate them.
Pre-Midcom Recommendation:
--------------------------
Jonathan writes that he wants to tackle the harder = stuff, i.e. firewalls
and symmetric NATs, later. The fact of the matter is = that the Davies
proposal has solved the harder stuff already. It is = the Davies proposal
that is the low-hanging fruit because it addresses = 100% of deployments
and it has working examples. Surely this is where a = pre-midcom solution
must start. A VoIP provider needs it from Day One = because it is very
likely some/many customers will have a firewall or = symmetric NAT. If in
time, providers are seeking more efficient = deployments or are seeking to
reduce costs, then the Davies solution is easily = extended to incorporate
a STUN-like method. But before embarking on this = effort it would be wise
to judge the market need and determine when MIDCOM = will kick in.
Steve Davies

------_=_NextPart_001_01C16702.132E9520-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 8 15:25:09 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA06024 for ; Thu, 8 Nov 2001 15:25:09 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA15202 for midcom-archive@odin.ietf.org; Thu, 8 Nov 2001 15:25:12 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA15137; Thu, 8 Nov 2001 15:21:43 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA15111 for ; Thu, 8 Nov 2001 15:21:42 -0500 (EST) Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05898 for ; Thu, 8 Nov 2001 15:21:38 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fA8KInx02036 for ; Thu, 8 Nov 2001 12:18:53 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABW79369; Thu, 8 Nov 2001 12:20:28 -0800 (PST) Message-Id: <5.1.0.14.0.20011108151614.00a8ba20@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Thu, 08 Nov 2001 15:23:14 -0500 To: midcom@ietf.org From: Melinda Shore Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: [midcom] Requirements draft Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Unfortunately the original editors were not available to revise the requirements draft based on Scott's list so I've gone ahead and produced a new version myself. I expect that the internet-drafts queue is quite long right now and it may be a day or more before the draft is posted, so in the interim a copy is available at http://www.employees.org/~shore/draft-ietf-midcom-requirements-03.txt I have retained all of the agreed-upon requirements as well as the document structure, while trying to conform to the model provided by several requirements documents that have survived IESG review and been published as RFCs. I've added explanatory text as needed - please cast a particularly critical eye on that. The structure may need some tweaking, as well, and there's at least one requirement that duplicates another (2.3.1 and 2.3.2). Please have at it. I'm hoping that this will be the second-to-last draft - that is to say, the draft resulting from your comments on this will be the one to go to last call. Many thanks, Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 8 16:17:11 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA08110 for ; Thu, 8 Nov 2001 16:17:10 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id QAA17197 for midcom-archive@odin.ietf.org; Thu, 8 Nov 2001 16:17:12 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA17087; Thu, 8 Nov 2001 16:14:04 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA17058 for ; Thu, 8 Nov 2001 16:14:02 -0500 (EST) Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA07997 for ; Thu, 8 Nov 2001 16:14:00 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fA8LBJx02182 for ; Thu, 8 Nov 2001 13:11:20 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABW81400; Thu, 8 Nov 2001 13:12:56 -0800 (PST) Message-Id: <5.1.0.14.0.20011108161306.00a97390@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Thu, 08 Nov 2001 16:15:50 -0500 To: midcom@ietf.org From: Melinda Shore Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: [midcom] Agenda for Salt Lake City Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org The deadline for the Salt Lake City meeting agenda is drawing nigh, and I need to get it submitted. Right now the two topics I think we need to cover are 1) pre-midcom and 2) rechartering. Please let me know post-haste if there's something else you feel requires meeting time. We will not be discussing the framework or requirements documents. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 9 07:14:17 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA07603 for ; Fri, 9 Nov 2001 07:14:17 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id HAA14253 for midcom-archive@odin.ietf.org; Fri, 9 Nov 2001 07:14:19 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id HAA13988; Fri, 9 Nov 2001 07:11:36 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id HAA13961 for ; Fri, 9 Nov 2001 07:11:34 -0500 (EST) Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA07510; Fri, 9 Nov 2001 07:11:32 -0500 (EST) Message-Id: <200111091211.HAA07510@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: IETF-Announce: ; Cc: midcom@ietf.org From: Internet-Drafts@ietf.org Reply-to: Internet-Drafts@ietf.org Date: Fri, 09 Nov 2001 07:11:32 -0500 Subject: [midcom] I-D ACTION:draft-ietf-midcom-requirements-03.txt Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Middlebox Communication Working Group of the IETF. Title : Middlebox Communications (midcom) Protocol Requirements Author(s) : R. Swale, P. Mart, P. Sijben, S. Brim, M. Shore Filename : draft-ietf-midcom-requirements-03.txt Pages : 10 Date : 08-Nov-01 This document specifies the requirements that the Middlebox Commu- nication (midcom) protocol must satisfy in order to meet the needs of applications wishing to influence middlebox function. These requirements were developed with a specific focus on network address translation and firewall middleboxes. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-midcom-requirements-03.txt To remove yourself from the IETF Announcement list, send a message to ietf-announce-request with the word unsubscribe in the body of the message. Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-midcom-requirements-03.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-midcom-requirements-03.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <20011108152156.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-midcom-requirements-03.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-midcom-requirements-03.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <20011108152156.I-D@ietf.org> --OtherAccess-- --NextPart-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 12 09:31:23 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA02401 for ; Mon, 12 Nov 2001 09:31:22 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id JAA04814 for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 09:31:26 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA04448; Mon, 12 Nov 2001 09:29:34 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA04417 for ; Mon, 12 Nov 2001 09:29:32 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA02224 for ; Mon, 12 Nov 2001 09:29:28 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111214270700265 ; Mon, 12 Nov 2001 14:27:07 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Mon, 12 Nov 2001 14:28:56 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639E922F5@ThisAddressDoesNotExist> From: Steve Davies To: "'Bob Penfield'" , "'midcom'" Subject: RE: [midcom] pre-midcom candidates Date: Mon, 12 Nov 2001 14:28:51 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C16B86.599289D0" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C16B86.599289D0 Content-Type: text/plain; charset="ISO-8859-1" Bob, In my opinion there is an underlying confusion in this debate. I believe * 'the discovery of the type of firewall/NAT combination a terminal is behind' is different from * 'the traversal of VoIP through any firewall/NAT combination' And because they are different, they don't necessarily need the same protocol. The reason we have lots of protocols is because they provide different functions. Trying to extend a protocol to handle substantially different tasks usually results in a cumbersome protocol that takes forever to produce. By definition pre-midcom needs to avoid this. The STUN protocol does the discovery piece very well. The Davies proposal does no discovery - it assumes apriori it's behind a Symmetric NAT (which includes a FW/NAT combination or just a FW.) The Davies proposal does the VoIP traversal very well. The STUN proposal does no traversal. Having discovered it is behind a Cone-type NAT, it requires terminal behavioural change to get the media flowing direct. As has already been noted, STUN does not help with Symmetric NAT or a firewall/NAT combination. It has also been noted that the extension of STUN to cope with Symmetric NAT would result in a method that would be very like the Davies proposal. Therefore for 100% deployment coverage, a pre-midcom solution would need either: 1. Davies proposal - don't care about Cone NAT for the time being or 2. Davies + STUN - some media may go direct I propose starting with 1. because it is less work than 2. and it has not been quantified whether it is worthwhile to adopt STUN for the percentage of calls it would affect in a pre-midcom timeframe. Other comments in-line below: Steve -----Original Message----- From: Bob Penfield [mailto:bpenfield@acmepacket.com] Sent: 02 November 2001 15:14 To: midcom Subject: Re: [midcom] pre-midcom candidates Hi all, I just want to throw my hat into the ring as a supporter of the STUN proposal. It is very simple and will be relatively easy to implement directly in endpoints. It requires no state in the server side. It adheres to the security policy of the firewall/NAT owner. [SD] How can you say STUN adheres to the security policy of the firewall/NAT owner? It has already been noted that STUN offers no VoIP traversal solution through a firewall/NAT combination, so today it wouldn't be deployed in this case. Or are you saying the STUN protocol itself (minus traversal) adheres to the security policy? The Davies proposal also adheres very well to the security policy. Actually the mechanism the Davies proposal uses for traversal is very similar to the mechanism used to get the STUN protocol itself through the firewall. With STUN as a basic tool, more complex solutions can be developed. It could even be used to implement much of the Davies proposal. [SD] See my main point above. The discovery of the firewall/NAT combination is a different task to the actual traversal. If you are saying that STUN can be used to know when to use the Davies method then I agree, but that doesn't imply it's an extension of STUN, just that they could co-exist. The reason we have lots of protocols is because they all do different jobs. Extending one protocol to do lots of different jobs usually leads to going down a rat-hole. I do think we need to address the symmetric NAT problem soon. [SD] The Davies proposal has! The Sen proposal seems too narrow in its focus on SIP and RTP. It also includes a midcom-like component in the protocol between the SIP element and the RTP proxy. To standardize this approach we would need to standardize the RTP proxy control protocol and we would virtually have midcom. The RTP proxy is just a specialized NAT middlebox. There are number of things I find troubling about the Davies proposal: - The tunneling of the signaling through the firewall verges on subverting the security policy of the firewall owner. As others have stated, existing VPN methods can do this today. I also think that outbound TCP connections for signaling can work in most cases. [SD] The Davies proposal has ALL connections as outgoing connections. The firewall owner can choose to block the Davies protocol, if that is their policy. However we expect that they will choose to use a pre-midcom solution that fits their security policies, so there is no subversion. - The protocol that would be required to implement this solution seems to be too complex. I counted 12 methods. It seems to be as complex, if not more so, than midcom will need to be. How long will it take to devise and standardize it? Based on the claims of the draft, Ridgeway has devised this protocol, but have they published the details? Given the complexity, it will be more difficult and costly to develop endpoints that support it. Given that, intermediate devices will be needed until all the endpoints support it, which again increases the cost of deploying VOIP and other applications. [SD] Ridgeway will publish the details if it is the chosen pre-midcom candidate. The Davies proposal is more complex than STUN because it's solving a more complex problem than STUN, but that does not imply it's more complex than it needs to be. We can also infer that the Davies proposal is less complex than Midcom because it doesn't need to do any of the pin-holing that is required in Midcom. Cost of implementation generally decreases inline with competition. Standardization will enable that competition. I think STUN is the best alternative for an easy, quick, and cost effective solution for NAT/FW that will allow for wider deployment of VOIP and other applications. It provides an interim solution until midcom is completed and also is useful in the long term for scenarios where midcom is not appropriate. [SD] How can you make this claim when STUN doesn't solve the NAT/FW problem? cheers, (-:bob Robert F. Penfield Chief Software Architect Acme Packet, Inc. 130 New Boston Street Woburn, MA 01801 bpenfield@acmepacket.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom ------_=_NextPart_001_01C16B86.599289D0 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom candidates

Bob,

In my opinion there is an underlying confusion in = this debate. I believe

* 'the discovery of the type of firewall/NAT = combination a terminal is behind'

is different from

* 'the traversal of VoIP through any firewall/NAT = combination'

And because they are different, they don't = necessarily need the same protocol. The reason we have lots of = protocols is because they provide different functions. Trying to extend = a protocol to handle substantially different tasks usually results in a = cumbersome protocol that takes forever to produce. By definition = pre-midcom needs to avoid this.

The STUN protocol does the discovery piece very well. = The Davies proposal does no discovery - it assumes apriori it's behind = a Symmetric NAT (which includes a FW/NAT combination or just a = FW.)

The Davies proposal does the VoIP traversal very = well. The STUN proposal does no traversal. Having discovered it is = behind a Cone-type NAT, it requires terminal behavioural change to get = the media flowing direct. As has already been noted, STUN does not help = with Symmetric NAT or a firewall/NAT combination. It has also been = noted that the extension of STUN to cope with Symmetric NAT would = result in a method that would be very like the Davies = proposal.

Therefore for 100% deployment coverage, a pre-midcom = solution would need either:

1. Davies proposal - don't care about Cone NAT for = the time being
or
2. Davies + STUN - some media may go direct

I propose starting with 1. because it is less work = than 2. and it has not been quantified whether it is worthwhile to = adopt STUN for the percentage of calls it would affect in a pre-midcom = timeframe.

Other comments in-line below:

Steve

-----Original Message-----
From: Bob Penfield [mailto:bpenfield@acmepacket.com= ]
Sent: 02 November 2001 15:14
To: midcom
Subject: Re: [midcom] pre-midcom candidates


Hi all,

I just want to throw my hat into the ring as a = supporter of the STUN
proposal.

It is very simple and will be relatively easy to = implement directly in
endpoints. It requires no state in the server side. = It adheres to the
security policy of the firewall/NAT owner.
[SD] How can you say STUN adheres to the security = policy of the firewall/NAT owner? It has already been noted that STUN = offers no VoIP traversal solution through a firewall/NAT combination, = so today it wouldn't be deployed in this case. Or are you saying the = STUN protocol itself (minus traversal) adheres to the security policy? = The Davies proposal also adheres very well to the security policy. = Actually the mechanism the Davies proposal uses for traversal is very = similar to the mechanism used to get the STUN protocol itself through = the firewall.

With STUN as a basic tool, more complex solutions can = be developed. It could
even be used to implement much of the Davies = proposal.
[SD] See my main point above. The discovery of the = firewall/NAT combination is a different task to the actual traversal. = If you are saying that STUN can be used to know when to use the Davies = method then I agree, but that doesn't imply it's an extension of STUN, = just that they could co-exist. The reason we have lots of protocols is = because they all do different jobs. Extending one protocol to do lots = of different jobs usually leads to going down a rat-hole.

I do think we need to address the symmetric NAT = problem soon.
[SD] The Davies proposal has!

The Sen proposal seems too narrow in its focus on SIP = and RTP. It also
includes a midcom-like component in the protocol = between the SIP element and
the RTP proxy. To standardize this approach we would = need to standardize the
RTP proxy control protocol and we would virtually = have midcom. The RTP proxy
is just a specialized NAT middlebox.

There are number of things I find troubling about the = Davies proposal:

- The tunneling of the signaling through the firewall = verges on subverting
the security policy of the firewall owner. As others = have stated, existing
VPN methods can do this today. I also think that = outbound TCP connections
for signaling can work in most cases.
[SD] The Davies proposal has ALL connections as = outgoing connections. The firewall owner can choose to block the Davies = protocol, if that is their policy. However we expect that they will = choose to use a pre-midcom solution that fits their security policies, = so there is no subversion.


- The protocol that would be required to implement = this solution seems to be
too complex. I counted 12 methods. It seems to be as = complex, if not more
so, than midcom will need to be. How long will it = take to devise and
standardize it? Based on the claims of the draft, = Ridgeway has devised this
protocol, but have they published the details? Given = the complexity, it will
be more difficult and costly to develop endpoints = that support it. Given
that, intermediate devices will be needed until all = the endpoints support
it, which again increases the cost of deploying VOIP = and other applications.
[SD] Ridgeway will publish the details if it is the = chosen pre-midcom candidate. The Davies proposal is more complex than = STUN because it's solving a more complex problem than STUN, but that = does not imply it's more complex than it needs to be. We can also infer = that the Davies proposal is less complex than Midcom because it doesn't = need to do any of the pin-holing that is required in Midcom. Cost of = implementation generally decreases inline with competition. = Standardization will enable that competition.

I think STUN is the best alternative for an easy, = quick, and cost effective
solution for NAT/FW that will allow for wider = deployment of VOIP and other
applications. It provides an interim solution until = midcom is completed and
also is useful in the long term for scenarios where = midcom is not
appropriate.
[SD] How can you make this claim when STUN doesn't = solve the NAT/FW problem?

cheers,
(-:bob

Robert F. Penfield
Chief Software Architect
Acme Packet, Inc.
130 New Boston Street
Woburn, MA 01801
bpenfield@acmepacket.com



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C16B86.599289D0-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 12 11:03:43 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA08602 for ; Mon, 12 Nov 2001 11:03:43 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA07251 for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 11:03:45 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA07205; Mon, 12 Nov 2001 11:02:23 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA07173 for ; Mon, 12 Nov 2001 11:02:21 -0500 (EST) Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA08501 for ; Mon, 12 Nov 2001 11:02:18 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fACG1nr25936; Mon, 12 Nov 2001 08:01:49 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABX45114; Mon, 12 Nov 2001 08:01:19 -0800 (PST) Message-Id: <5.1.0.14.0.20011112105836.00a58b60@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Mon, 12 Nov 2001 11:04:16 -0500 To: Steve Davies , "'Bob Penfield'" , "'midcom'" From: Melinda Shore Subject: RE: [midcom] pre-midcom candidates In-Reply-To: <00533D13955AD411AF3800A0C9B42639E922F5@ThisAddressDoesNotE xist> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 02:28 PM 11/12/01 +0000, Steve Davies wrote: >[SD] How can you make this claim when STUN doesn't solve the NAT/FW problem? I'd like to remind everybody that pre-midcom != midcom. That is to say, the intent is to get a simple hack addressing the hard problem (NAT traversal) out quickly. The work that's going to address NAT and firewall traversal and attempt to be thorough about it is midcom itself. Please, let's not get carried away. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 12 11:56:51 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA11102 for ; Mon, 12 Nov 2001 11:56:51 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA09053 for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 11:56:54 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA08847; Mon, 12 Nov 2001 11:50:04 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA08816 for ; Mon, 12 Nov 2001 11:50:02 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA10843 for ; Mon, 12 Nov 2001 11:49:58 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111216473130459 ; Mon, 12 Nov 2001 16:47:31 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Mon, 12 Nov 2001 16:49:19 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639E92306@ThisAddressDoesNotExist> From: Steve Davies To: "'Melinda Shore'" , "'midcom'" Subject: RE: [midcom] pre-midcom candidates Date: Mon, 12 Nov 2001 16:49:17 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C16B99.F7DE64C0" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C16B99.F7DE64C0 Content-Type: text/plain; charset="ISO-8859-1" Melinda, Are you moving the goal-posts? I thought the new deliverable was to: 'develop or document a protocol or approach that allows clients to indirectly obtain address bindings from midcom-unaware middleboxes, through communications with server elements on the public side of the middlebox' In my book a midcom-unaware middlebox could be a firewall, a firewall/NAT combination, or just a NAT, so a pre-midcom solution must enable the traversal of all these midcom-unaware devices - not just NATs. Steve -----Original Message----- From: Melinda Shore [mailto:mshore@cisco.com] Sent: 12 November 2001 16:04 To: Steve Davies; 'Bob Penfield'; 'midcom' Subject: RE: [midcom] pre-midcom candidates At 02:28 PM 11/12/01 +0000, Steve Davies wrote: >[SD] How can you make this claim when STUN doesn't solve the NAT/FW problem? I'd like to remind everybody that pre-midcom != midcom. That is to say, the intent is to get a simple hack addressing the hard problem (NAT traversal) out quickly. The work that's going to address NAT and firewall traversal and attempt to be thorough about it is midcom itself. Please, let's not get carried away. Melinda ------_=_NextPart_001_01C16B99.F7DE64C0 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom candidates

Melinda,

Are you moving the goal-posts? I thought the new = deliverable was to:

'develop or document a protocol or approach that = allows
clients to indirectly obtain address bindings from = midcom-unaware
middleboxes, through communications with server = elements on the public
side of the middlebox'

In my book a midcom-unaware middlebox could be a = firewall, a firewall/NAT combination, or just a NAT, so a pre-midcom = solution must enable the traversal of all these midcom-unaware devices = - not just NATs.

Steve

-----Original Message-----
From: Melinda Shore [mailto:mshore@cisco.com]
Sent: 12 November 2001 16:04
To: Steve Davies; 'Bob Penfield'; 'midcom'
Subject: RE: [midcom] pre-midcom candidates


At 02:28 PM 11/12/01 +0000, Steve Davies = wrote:
>[SD] How can you make this claim when STUN = doesn't solve the NAT/FW problem?

I'd like to remind everybody that pre-midcom !=3D = midcom.  That
is to say, the intent is to get a simple hack = addressing the hard
problem (NAT traversal) out quickly.  The work = that's going to
address NAT and firewall traversal and attempt to be = thorough
about it is midcom itself.  Please, let's not = get carried away.

Melinda

------_=_NextPart_001_01C16B99.F7DE64C0-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 12 12:03:30 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11311 for ; Mon, 12 Nov 2001 12:03:30 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA10360 for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 12:03:33 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA10213; Mon, 12 Nov 2001 12:02:05 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA10185 for ; Mon, 12 Nov 2001 12:02:04 -0500 (EST) Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11270 for ; Mon, 12 Nov 2001 12:02:00 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fACGxIx06366; Mon, 12 Nov 2001 08:59:19 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABX46615; Mon, 12 Nov 2001 09:01:02 -0800 (PST) Message-Id: <5.1.0.14.0.20011112115843.00a62400@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Mon, 12 Nov 2001 12:03:58 -0500 To: Steve Davies , "'midcom'" From: Melinda Shore Subject: RE: [midcom] pre-midcom candidates In-Reply-To: <00533D13955AD411AF3800A0C9B42639E92306@ThisAddressDoesNotE xist> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 04:49 PM 11/12/01 +0000, Steve Davies wrote: >Are you moving the goal-posts? Not at all. The goal was and remains to do something quickly that does NOT supplant midcom. If we spend months and months haggling over this we will have failed. If we develop something that does more-or-less what midcom will do but is even more ugly than midcom we will have failed. Etc. Remember, it's "pre-midcom," not "instead-of-midcom." Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 12 12:28:51 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12074 for ; Mon, 12 Nov 2001 12:28:51 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA11675 for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 12:28:54 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA11596; Mon, 12 Nov 2001 12:27:25 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA11565 for ; Mon, 12 Nov 2001 12:27:24 -0500 (EST) Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12041 for ; Mon, 12 Nov 2001 12:27:20 -0500 (EST) Received: from BobP [63.67.143.2] by acmepacket.com (SMTPD32-7.04) id A67B76C900CC; Mon, 12 Nov 2001 12:27:23 -0500 Message-ID: <007001c16b9e$de0a3420$2300000a@acmepacket.com> From: "Bob Penfield" To: "Steve Davies" , "'Melinda Shore'" , "'midcom'" References: <00533D13955AD411AF3800A0C9B42639E92306@ThisAddressDoesNotExist> Subject: Re: [midcom] pre-midcom candidates Date: Mon, 12 Nov 2001 12:24:20 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit > > 'develop or document a protocol or approach that allows > clients to indirectly obtain address bindings from midcom-unaware > middleboxes, through communications with server elements on the public > side of the middlebox' > Regardless of whether its a NAT or a firewall, "indirectly obtain address bindings .... through communications with server elements" sounds a lot more like 'the discovery of the type of firewall/NAT combination a terminal is behind' than 'the traversal of VoIP through any firewall/NAT combination'. Address binding discovery is what the STUN proposal addresses rather than a complete the VOIP solution. We're not even required to deal with the symetric-NAT problem. This is something that we need to submit to the IESG ASAP (in 2001). In fact, according to the midcom web-page (which says Oct 01), we're already late. BTW, shouldn't we get the above verbage on the pre-midcom deliverable on the IETF midcom web-page? It just has a milestone right now. (-:bob _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 12 12:34:47 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12290 for ; Mon, 12 Nov 2001 12:34:46 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA12464 for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 12:34:48 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA12398; Mon, 12 Nov 2001 12:33:41 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA12370 for ; Mon, 12 Nov 2001 12:33:39 -0500 (EST) Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12263 for ; Mon, 12 Nov 2001 12:33:37 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fACHXAn13809; Mon, 12 Nov 2001 09:33:11 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABX47767; Mon, 12 Nov 2001 09:32:40 -0800 (PST) Message-Id: <5.1.0.14.0.20011112123426.00a65770@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Mon, 12 Nov 2001 12:35:36 -0500 To: "Bob Penfield" , "'midcom'" From: Melinda Shore Subject: Re: [midcom] pre-midcom candidates In-Reply-To: <007001c16b9e$de0a3420$2300000a@acmepacket.com> References: <00533D13955AD411AF3800A0C9B42639E92306@ThisAddressDoesNotExist> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 12:24 PM 11/12/01 -0500, Bob Penfield wrote: >BTW, shouldn't we get the above verbage on the pre-midcom deliverable on the >IETF midcom web-page? It just has a milestone right now. There are still discussions going on in the IESG/IAB. I'll let you know as soon as there's some sort of resolution. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 12 12:37:34 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12534 for ; Mon, 12 Nov 2001 12:37:34 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA12844 for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 12:37:35 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA12642; Mon, 12 Nov 2001 12:36:00 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA12607 for ; Mon, 12 Nov 2001 12:35:56 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA12410 for ; Mon, 12 Nov 2001 12:35:54 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111217332327368 ; Mon, 12 Nov 2001 17:33:24 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Mon, 12 Nov 2001 17:35:11 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639E9230D@ThisAddressDoesNotExist> From: Steve Davies To: "'Melinda Shore'" Cc: "'midcom'" Subject: RE: [midcom] pre-midcom candidates Date: Mon, 12 Nov 2001 17:35:06 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C16BA0.5E668140" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C16BA0.5E668140 Content-Type: text/plain; charset="ISO-8859-1" I think I agreed. I assumed and still assume that a pre-midcom solution is a solution that enables FW/NAT traversal through legacy equipment. Once Midcom is finished, gradually FW/NATs would be replaced by Midcom-aware devices obviating the pre-midcom solution. Users would migrate from pre-midcom to Midcom because Midcom would be better. In the case of the Davies proposal, a media intermediary is required. Midcom is better because it dispenses with that need. The need for a pre-midcom solution is clear. The market is stalled waiting for Midcom. But to liberate the industry the pre-midcom solution should address, I believe, all midcom-unaware middleboxes whether they be just a FW, a FW/NAT combination or just a NAT. Is this correct? Steve -----Original Message----- From: Melinda Shore [mailto:mshore@cisco.com] Sent: 12 November 2001 17:04 To: Steve Davies; 'midcom' Subject: RE: [midcom] pre-midcom candidates At 04:49 PM 11/12/01 +0000, Steve Davies wrote: >Are you moving the goal-posts? Not at all. The goal was and remains to do something quickly that does NOT supplant midcom. If we spend months and months haggling over this we will have failed. If we develop something that does more-or-less what midcom will do but is even more ugly than midcom we will have failed. Etc. Remember, it's "pre-midcom," not "instead-of-midcom." Melinda ------_=_NextPart_001_01C16BA0.5E668140 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom candidates

I think I agreed. I assumed and still assume that a = pre-midcom solution is a solution that enables FW/NAT traversal through = legacy equipment. Once Midcom is finished, gradually FW/NATs would be = replaced by Midcom-aware devices obviating the pre-midcom solution. = Users would migrate from pre-midcom to Midcom because Midcom would be = better. In the case of the Davies proposal, a media intermediary is = required. Midcom is better because it dispenses with that need. The = need for a pre-midcom solution is clear. The market is stalled waiting = for Midcom. But to liberate the industry the pre-midcom solution should = address, I believe, all midcom-unaware middleboxes whether they be just = a FW, a FW/NAT combination or just a NAT.

Is this correct?

Steve

-----Original Message-----
From: Melinda Shore [mailto:mshore@cisco.com]
Sent: 12 November 2001 17:04
To: Steve Davies; 'midcom'
Subject: RE: [midcom] pre-midcom candidates


At 04:49 PM 11/12/01 +0000, Steve Davies = wrote:
>Are you moving the goal-posts?

Not at all.  The goal was and remains to do = something quickly
that does NOT supplant midcom.  If we spend = months and
months haggling over this we will have failed.  = If we develop
something that does more-or-less what midcom will do = but is
even more ugly than midcom we will have = failed.  Etc.  Remember,
it's "pre-midcom," not = "instead-of-midcom."

Melinda

------_=_NextPart_001_01C16BA0.5E668140-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 12 13:19:41 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA14002 for ; Mon, 12 Nov 2001 13:19:41 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id NAA14249 for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 13:19:43 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA14171; Mon, 12 Nov 2001 13:17:40 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA14141 for ; Mon, 12 Nov 2001 13:17:38 -0500 (EST) Received: from rhenium (rhenium.btinternet.com [194.73.73.93]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA13936 for ; Mon, 12 Nov 2001 13:17:36 -0500 (EST) Received: from [213.122.130.231] (helo=tkw) by rhenium with smtp (Exim 3.22 #6) id 163LeI-0002hU-00; Mon, 12 Nov 2001 18:17:35 +0000 Message-ID: <005001c16ba6$3ee012e0$0200000a@tkw> From: "Pete Cordell" To: "Steve Davies" , "'Bob Penfield'" , "'midcom'" , "Melinda Shore" References: <5.1.0.14.0.20011112105836.00a58b60@localhost> Subject: Re: [midcom] pre-midcom candidates Date: Mon, 12 Nov 2001 18:16:26 -0000 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit I'm just wondering if there is any point to developing a solution that does not address the firewall. Most enterprises will have firewalls, and the percentage of residential firewalls can only go up. (As has been said elsewhere, the presence of a firewall effectively makes the NAT symmetric. The consensus so far seems to be that such NATs need additional steps beyond discovering what type they are to get the protocols through.) Also, many dial-up residential cases do not have to contend with NAT at all. My feeling is that if we don't address the firewall, we will have spent time developing something that helps out only a very few cases, and really doesn't move us any closer to where we want to be. The result would be to delay real midcom with no gain. Pete. ============================================= Pete Cordell Tech-Know-Ware pete@tech-know-ware.com +44 1473 635863 ============================================= ----- Original Message ----- From: Melinda Shore To: Steve Davies ; 'Bob Penfield' ; 'midcom' Sent: 12 November 2001 16:04 Subject: RE: [midcom] pre-midcom candidates > At 02:28 PM 11/12/01 +0000, Steve Davies wrote: > >[SD] How can you make this claim when STUN doesn't solve the NAT/FW problem? > > I'd like to remind everybody that pre-midcom != midcom. That > is to say, the intent is to get a simple hack addressing the hard > problem (NAT traversal) out quickly. The work that's going to > address NAT and firewall traversal and attempt to be thorough > about it is midcom itself. Please, let's not get carried away. > > Melinda > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 12 17:24:22 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA21191 for ; Mon, 12 Nov 2001 17:24:22 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA19730 for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 17:24:24 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA19638; Mon, 12 Nov 2001 17:22:39 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA19582 for ; Mon, 12 Nov 2001 17:22:36 -0500 (EST) Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA21047 for ; Mon, 12 Nov 2001 17:22:33 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fACMM6r08094 for ; Mon, 12 Nov 2001 14:22:06 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABX59565; Mon, 12 Nov 2001 14:21:36 -0800 (PST) Message-Id: <5.1.0.14.0.20011112171347.00a721f0@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Mon, 12 Nov 2001 17:24:18 -0500 To: midcom@ietf.org From: Melinda Shore Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: [midcom] Proposed agenda for Salt Lake City Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Notes: 1) We will not be discussing the framework or requirements documents, but you should be familiar with their contents in order to be prepared for the rechartering discussion 2) You'll note that my network-friendlier draft is on the agenda. I've tried to be careful about not abusing my position in order to promote fringe technology, but this document has gotten very positive feedback and in discussion with the ADs there was agreement that it would be discussed in the context of rechartering. Either Scott Bradner or Allison will be chairing that section of the meeting. 3) The pre-midcom discussion is subject to whatever constraints come out of current offline discussions. Melinda Middlebox Communication WG (midcom) Monday, December 10 at 1930-2200 ================================== CHAIR: Melinda Shore AGENDA: Agenda bashing, scribe Status Rechartering Pre-midcom Documents: http://www.ietf.org/internet-drafts/draft-ietf-midcom-framework-05.txt http://www.ietf.org/internet-drafts/draft-ietf-midcom-requirements-03.txt http://search.ietf.org/internet-drafts/draft-shore-friendly-midcom-00.txt http://search.ietf.org/internet-drafts/draft-sen-midcom-fw-nat-00.txt http://search.ietf.org/internet-drafts/draft-rosenberg-midcom-stun-00.txt http://search.ietf.org/internet-drafts/draft-davies-fw-nat-traversal-01.txt _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 13 07:13:59 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA20735 for ; Tue, 13 Nov 2001 07:13:59 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id HAA12309 for midcom-archive@odin.ietf.org; Tue, 13 Nov 2001 07:14:00 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id HAA11909; Tue, 13 Nov 2001 07:09:18 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id HAA11881 for ; Tue, 13 Nov 2001 07:09:16 -0500 (EST) Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA20392; Tue, 13 Nov 2001 07:09:14 -0500 (EST) Message-Id: <200111131209.HAA20392@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: IETF-Announce: ; Cc: midcom@ietf.org From: Internet-Drafts@ietf.org Reply-to: Internet-Drafts@ietf.org Date: Tue, 13 Nov 2001 07:09:14 -0500 Subject: [midcom] I-D ACTION:draft-ietf-midcom-framework-05.txt Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Middlebox Communication Working Group of the IETF. Title : Middlebox Communication Architecture and framework Author(s) : P. Srisuresh, J. Kuthan, J. Rosenberg, A. Molitor, A. Rayhan Filename : draft-ietf-midcom-framework-05.txt Pages : 36 Date : 12-Nov-01 There are a variety of intermediate devices in the Internet today that require application intelligence for their operation. Datagrams pertaining to real-time streaming applications such as SIP and H.323 and peer-to-peer applications such as Napster and NetMeeting cannot be identified by merely examining packet headers. . A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-midcom-framework-05.txt To remove yourself from the IETF Announcement list, send a message to ietf-announce-request with the word unsubscribe in the body of the message. Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-midcom-framework-05.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-midcom-framework-05.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <20011112111907.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-midcom-framework-05.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-midcom-framework-05.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <20011112111907.I-D@ietf.org> --OtherAccess-- --NextPart-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 13 10:10:38 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA28769 for ; Tue, 13 Nov 2001 10:10:38 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id KAA15870 for midcom-archive@odin.ietf.org; Tue, 13 Nov 2001 10:10:39 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA15723; Tue, 13 Nov 2001 10:03:17 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA15694 for ; Tue, 13 Nov 2001 10:03:15 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA28110 for ; Tue, 13 Nov 2001 10:03:13 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fADF2rn06615 for ; Tue, 13 Nov 2001 07:02:53 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABX78225; Tue, 13 Nov 2001 07:02:17 -0800 (PST) Message-Id: <5.1.0.14.0.20011113100329.00a6b350@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Tue, 13 Nov 2001 10:05:14 -0500 To: midcom@ietf.org From: Melinda Shore Subject: Fwd: [midcom] I-D ACTION:draft-ietf-midcom-framework-05.txt Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Now that the new revision of the framework draft is available I am starting working group last call. Please post comments to the mailing list. Last call will close on 27 November at 5pm PST. Melinda >To: IETF-Announce: ; >Cc: midcom@ietf.org >From: Internet-Drafts@ietf.org >Reply-to: Internet-Drafts@ietf.org >Date: Tue, 13 Nov 2001 07:09:14 -0500 >Subject: [midcom] I-D ACTION:draft-ietf-midcom-framework-05.txt >Sender: midcom-admin@ietf.org >X-Mailman-Version: 1.0 >List-Id: >X-BeenThere: midcom@ietf.org > >A New Internet-Draft is available from the on-line Internet-Drafts directories. >This draft is a work item of the Middlebox Communication Working Group of the IETF. > > Title : Middlebox Communication Architecture and framework > Author(s) : P. Srisuresh, J. Kuthan, J. Rosenberg, > A. Molitor, A. Rayhan > Filename : draft-ietf-midcom-framework-05.txt > Pages : 36 > Date : 12-Nov-01 > >There are a variety of intermediate devices in the Internet today >that require application intelligence for their operation. >Datagrams pertaining to real-time streaming applications such >as SIP and H.323 and peer-to-peer applications such as Napster >and NetMeeting cannot be identified by merely examining packet >headers. . > >A URL for this Internet-Draft is: >http://www.ietf.org/internet-drafts/draft-ietf-midcom-framework-05.txt > >To remove yourself from the IETF Announcement list, send a message to >ietf-announce-request with the word unsubscribe in the body of the message. > >Internet-Drafts are also available by anonymous FTP. Login with the username >"anonymous" and a password of your e-mail address. After logging in, >type "cd internet-drafts" and then > "get draft-ietf-midcom-framework-05.txt". > >A list of Internet-Drafts directories can be found in >http://www.ietf.org/shadow.html >or ftp://ftp.ietf.org/ietf/1shadow-sites.txt > > >Internet-Drafts can also be obtained by e-mail. > >Send a message to: > mailserv@ietf.org. >In the body type: > "FILE /internet-drafts/draft-ietf-midcom-framework-05.txt". > >NOTE: The mail server at ietf.org can return the document in > MIME-encoded form by using the "mpack" utility. To use this > feature, insert the command "ENCODING mime" before the "FILE" > command. To decode the response(s), you will need "munpack" or > a MIME-compliant mail reader. Different MIME-compliant mail readers > exhibit different behavior, especially when dealing with > "multipart" MIME messages (i.e. documents which have been split > up into multiple messages), so check your local documentation on > how to manipulate these messages. > > >Below is the data which will enable a MIME compliant mail reader >implementation to automatically retrieve the ASCII version of the >Internet-Draft. >Content-Type: text/plain >Content-ID: <20011112111907.I-D@ietf.org> > >ENCODING mime >FILE /internet-drafts/draft-ietf-midcom-framework-05.txt > > _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 13 13:00:20 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA08929 for ; Tue, 13 Nov 2001 13:00:19 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id NAA20865 for midcom-archive@odin.ietf.org; Tue, 13 Nov 2001 13:00:21 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA20641; Tue, 13 Nov 2001 12:57:06 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA20609 for ; Tue, 13 Nov 2001 12:57:03 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA08722 for ; Tue, 13 Nov 2001 12:57:01 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111317534422303 ; Tue, 13 Nov 2001 17:53:44 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Tue, 13 Nov 2001 17:56:20 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639172435@ThisAddressDoesNotExist> From: Steve Davies To: "'Melinda Shore'" , midcom@ietf.org Subject: RE: [midcom] Proposed agenda for Salt Lake City Date: Tue, 13 Nov 2001 17:56:13 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C16C6C.7C315480" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C16C6C.7C315480 Content-Type: text/plain; charset="ISO-8859-1" Melinda, re: 3 below. What offline discussions are going on and who has representation in them? Steve www.ridgewaysystems.com -----Original Message----- From: Melinda Shore [mailto:mshore@cisco.com] Sent: 12 November 2001 22:24 To: midcom@ietf.org Subject: [midcom] Proposed agenda for Salt Lake City Notes: 1) We will not be discussing the framework or requirements documents, but you should be familiar with their contents in order to be prepared for the rechartering discussion 2) You'll note that my network-friendlier draft is on the agenda. I've tried to be careful about not abusing my position in order to promote fringe technology, but this document has gotten very positive feedback and in discussion with the ADs there was agreement that it would be discussed in the context of rechartering. Either Scott Bradner or Allison will be chairing that section of the meeting. 3) The pre-midcom discussion is subject to whatever constraints come out of current offline discussions. Melinda Middlebox Communication WG (midcom) Monday, December 10 at 1930-2200 ================================== CHAIR: Melinda Shore AGENDA: Agenda bashing, scribe Status Rechartering Pre-midcom Documents: http://www.ietf.org/internet-drafts/draft-ietf-midcom-framework-05.txt http://www.ietf.org/internet-drafts/draft-ietf-midcom-requirements-03.txt http://search.ietf.org/internet-drafts/draft-shore-friendly-midcom-00.txt http://search.ietf.org/internet-drafts/draft-sen-midcom-fw-nat-00.txt http://search.ietf.org/internet-drafts/draft-rosenberg-midcom-stun-00.txt http://search.ietf.org/internet-drafts/draft-davies-fw-nat-traversal-01.txt _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom ------_=_NextPart_001_01C16C6C.7C315480 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] Proposed agenda for Salt Lake City

Melinda,

re: 3 below.

What offline discussions are going on and who has = representation in them?

Steve
www.ridgewaysystems.com

-----Original Message-----
From: Melinda Shore [mailto:mshore@cisco.com]
Sent: 12 November 2001 22:24
To: midcom@ietf.org
Subject: [midcom] Proposed agenda for Salt Lake = City


Notes:
1) We will not be discussing the framework or = requirements documents,
but you should be familiar with their contents in = order to be prepared
for the rechartering discussion
2) You'll note that my network-friendlier draft is = on the agenda.  I've
tried to be careful about not abusing my position in = order to promote
fringe technology, but this document has gotten very = positive feedback
and in discussion with the ADs there was agreement = that it would be
discussed in the context of rechartering.  = Either Scott Bradner or
Allison will be chairing that section of the = meeting.
3) The pre-midcom discussion is subject to whatever = constraints come
out of current offline discussions.

Melinda

Middlebox Communication WG (midcom)

Monday, December 10 at 1930-2200
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

CHAIR: Melinda Shore <mshore@cisco.com>

AGENDA:

Agenda bashing, scribe
Status
Rechartering
Pre-midcom

Documents:
http://www.ietf.org/internet-drafts/draft-ietf-midcom-= framework-05.txt
http://www.ietf.org/internet-drafts/draft-ietf-midcom-= requirements-03.txt
http://search.ietf.org/internet-drafts/draft-shore-fri= endly-midcom-00.txt
http://search.ietf.org/internet-drafts/draft-sen-midco= m-fw-nat-00.txt
http://search.ietf.org/internet-drafts/draft-rosenberg= -midcom-stun-00.txt
http://search.ietf.org/internet-drafts/draft-davies-fw= -nat-traversal-01.txt


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C16C6C.7C315480-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 13 13:17:45 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA09930 for ; Tue, 13 Nov 2001 13:17:45 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id NAA21496 for midcom-archive@odin.ietf.org; Tue, 13 Nov 2001 13:17:47 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA21401; Tue, 13 Nov 2001 13:15:37 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA21371 for ; Tue, 13 Nov 2001 13:15:36 -0500 (EST) Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA09795 for ; Tue, 13 Nov 2001 13:15:33 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fADIF6n06829; Tue, 13 Nov 2001 10:15:06 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABX84258; Tue, 13 Nov 2001 10:14:36 -0800 (PST) Message-Id: <5.1.0.14.0.20011113131542.00a7e040@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Tue, 13 Nov 2001 13:17:13 -0500 To: Steve Davies , midcom@ietf.org From: Melinda Shore Subject: RE: [midcom] Proposed agenda for Salt Lake City In-Reply-To: <00533D13955AD411AF3800A0C9B42639172435@ThisAddressDoesNotE xist> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 05:56 PM 11/13/01 +0000, Steve Davies wrote: >What offline discussions are going on and who has representation in them? It's a discussion among IESG and IAB member regarding whether or not we are loosing evil in the world. I am not involved. Indeed, the fewer people involved in that one, the better. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 13 20:59:38 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA24442 for ; Tue, 13 Nov 2001 20:59:38 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id UAA02027 for midcom-archive@odin.ietf.org; Tue, 13 Nov 2001 20:59:40 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id UAA01990; Tue, 13 Nov 2001 20:57:06 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id UAA01961 for ; Tue, 13 Nov 2001 20:57:00 -0500 (EST) Received: from calliope1.fm.intel.com (fmfdns01.fm.intel.com [132.233.247.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA24428 for ; Tue, 13 Nov 2001 20:56:56 -0500 (EST) Received: from fmsmsxvs042.fm.intel.com (fmsmsxvs042.fm.intel.com [132.233.42.128]) by calliope1.fm.intel.com (8.9.1a+p1/8.9.1/d: relay.m4,v 1.46 2001/10/25 21:02:55 root Exp $) with SMTP id BAA05929 for ; Wed, 14 Nov 2001 01:56:58 GMT Received: from FMSMSX016.fm.intel.com ([132.233.42.195]) by fmsmsxvs042.fm.intel.com (NAVGW 2.5.1.6) with SMTP id M2001111317573709876 ; Tue, 13 Nov 2001 17:57:37 -0800 Received: by fmsmsx016.fm.intel.com with Internet Mail Service (5.5.2653.19) id ; Tue, 13 Nov 2001 17:56:58 -0800 Message-ID: From: "Meyer, Greg W" To: "'Pete Cordell'" , Steve Davies, "'Bob Penfield'" , "'midcom'" , Melinda Shore Subject: RE: [midcom] pre-midcom candidates Date: Tue, 13 Nov 2001 17:56:51 -0800 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain; charset="iso-8859-1" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org I agree with Pete; I would favor a solution that addresses both firewall and NAT. The trade-offs Jonathan raise about the Davies approach are very acceptable given pre-midcom is temporary (until midcom is deployed). Any short-term solution that doesn't account for today's most deployed networks simply defeats the purpose. Greg Meyer Intel Labs -----Original Message----- From: Pete Cordell [mailto:pete@tech-know-ware.com] Sent: Monday, November 12, 2001 10:16 AM To: Steve Davies; 'Bob Penfield'; 'midcom'; Melinda Shore Subject: Re: [midcom] pre-midcom candidates I'm just wondering if there is any point to developing a solution that does not address the firewall. Most enterprises will have firewalls, and the percentage of residential firewalls can only go up. (As has been said elsewhere, the presence of a firewall effectively makes the NAT symmetric. The consensus so far seems to be that such NATs need additional steps beyond discovering what type they are to get the protocols through.) Also, many dial-up residential cases do not have to contend with NAT at all. My feeling is that if we don't address the firewall, we will have spent time developing something that helps out only a very few cases, and really doesn't move us any closer to where we want to be. The result would be to delay real midcom with no gain. Pete. ============================================= Pete Cordell Tech-Know-Ware pete@tech-know-ware.com +44 1473 635863 ============================================= ----- Original Message ----- From: Melinda Shore To: Steve Davies ; 'Bob Penfield' ; 'midcom' Sent: 12 November 2001 16:04 Subject: RE: [midcom] pre-midcom candidates > At 02:28 PM 11/12/01 +0000, Steve Davies wrote: > >[SD] How can you make this claim when STUN doesn't solve the NAT/FW problem? > > I'd like to remind everybody that pre-midcom != midcom. That > is to say, the intent is to get a simple hack addressing the hard > problem (NAT traversal) out quickly. The work that's going to > address NAT and firewall traversal and attempt to be thorough > about it is midcom itself. Please, let's not get carried away. > > Melinda > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Wed Nov 14 09:35:49 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA24659 for ; Wed, 14 Nov 2001 09:35:49 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id JAA25448 for midcom-archive@odin.ietf.org; Wed, 14 Nov 2001 09:35:53 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA25397; Wed, 14 Nov 2001 09:34:11 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA25372 for ; Wed, 14 Nov 2001 09:34:09 -0500 (EST) Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA24589 for ; Wed, 14 Nov 2001 09:34:04 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fAEEVNx05118 for ; Wed, 14 Nov 2001 06:31:23 -0800 (PST) Received: from spandex.cisco.com (ssh-sj1.cisco.com [171.68.225.134]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABY12472; Wed, 14 Nov 2001 06:33:09 -0800 (PST) Message-Id: <5.1.0.14.0.20011114093257.00a5aba0@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Wed, 14 Nov 2001 09:36:07 -0500 To: midcom@ietf.org From: Melinda Shore Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: [midcom] Requirements draft Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org There have not yet been any comments on the revised requirements draft. I'd like to get it into last call ASAP, but both the contents and the format have been points of fairly raucous contention in the past and I'd be hard-pressed to believe that everybody thinks the current document doesn't need editing. Please have a look at it and post comments to the mailing list. Thanks, Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Wed Nov 14 15:40:43 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA15677 for ; Wed, 14 Nov 2001 15:40:43 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA09298 for midcom-archive@odin.ietf.org; Wed, 14 Nov 2001 15:40:47 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA09205; Wed, 14 Nov 2001 15:35:08 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA09172 for ; Wed, 14 Nov 2001 15:35:05 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA15454 for ; Wed, 14 Nov 2001 15:35:01 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAEKXECJ025197 for ; Wed, 14 Nov 2001 15:33:14 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Wed, 14 Nov 2001 15:34:34 -0500 Message-ID: From: Jonathan Rosenberg To: "'midcom@ietf.org'" Date: Wed, 14 Nov 2001 15:34:28 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain; charset="iso-8859-1" Subject: [midcom] new I-D on "symmetric STUN" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Folks, I've talked in the past about the fact that STUN used to have a bit about handling the symmetric case, but that we yanked it out since its sufficiently orthonogonal (and a fairly crowded space). I've just submitted an I-D that documents that piece of the solution. Its a very simple mechanism, more or less the same as STUN, which uses a relay server. The protocol is called "Traversal Using Relay NAT" or TURN. Until it appears in the archives, you can pick up a copy at: http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt Thanks, Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Wed Nov 14 23:53:16 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA28220 for ; Wed, 14 Nov 2001 23:53:16 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id XAA23429 for midcom-archive@odin.ietf.org; Wed, 14 Nov 2001 23:53:21 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA22761; Wed, 14 Nov 2001 23:17:28 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA22729 for ; Wed, 14 Nov 2001 23:17:27 -0500 (EST) Received: from qtech1.quarrytech.com (email.quarrytech.com [4.17.144.4]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA27488 for ; Wed, 14 Nov 2001 23:16:02 -0500 (EST) Received: from mduffy (10.1.1.254 [10.1.1.254]) by qtech1.quarrytech.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13) id WS2P2NFW; Wed, 14 Nov 2001 23:15:35 -0500 Message-Id: <3.0.5.32.20011114230552.00930bf0@email.quarrytech.com> X-Sender: mduffy@email.quarrytech.com X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32) Date: Wed, 14 Nov 2001 23:05:52 -0500 To: midcom@ietf.org From: Mark Duffy In-Reply-To: <200111091211.HAA07510@ietf.org> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: [midcom] Re: I-D ACTION:draft-ietf-midcom-requirements-03.txt Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Hi, I just have a few comments/suggestions, both in the "nit" category. Sect 2.1.3, 2nd para, it explains why we must support multiple agents to one middlebox: "There may be multiple instances of a single application or multiple applications desiring service from a single middlebox." To really connect this to the point it is trying to support, I suggest extending the sentence with "and different agents may represent them." 2.1.12 "Rulesets that partially overlap other rulesets can create nondeterministic behavior and must not be permitted." This sentence is much more restrictive than the requirement statement it purports to explain. I think what it should be saying is that the nondeterministic behavior must not be permitted, not that the overlapping rules must not be permitted! I suggest rewording it thus: "The protocol must preclude nondeterministic behavior in the case of overlapping rulesets, e.g. by ensuring that some known precedence is imposed on overlapping rulesets." Either that or just s/and must not/which must not/ in the original sentence. Thanks, Mark _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 15 08:24:24 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA21683 for ; Thu, 15 Nov 2001 08:24:24 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id IAA13510 for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 08:24:25 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA13421; Thu, 15 Nov 2001 08:22:05 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA13391 for ; Thu, 15 Nov 2001 08:22:03 -0500 (EST) Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA21493 for ; Thu, 15 Nov 2001 08:22:01 -0500 (EST) Received: from BobP [63.67.143.2] by acmepacket.com (SMTPD32-7.04) id A1789ADC0254; Thu, 15 Nov 2001 08:22:00 -0500 Message-ID: <001d01c16dd6$e1c07540$2300000a@acmepacket.com> From: "Bob Penfield" To: , "Melinda Shore" References: <5.1.0.14.0.20011114093257.00a5aba0@localhost> Subject: Re: [midcom] Requirements draft Date: Thu, 15 Nov 2001 08:10:19 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Hi, I have some comments on the requirements draft, mostly nits. 2.1.2: 1st para: s/middleboxe/middlebox/ 2.1.3: I agree with Mark that the reasoning should mention multiple midcom agents. 2.1.4: 2nd para: s/The states/This states/ 2.1.5: 2nd para: s/provide identifying clear identification/provide clear identification/ 2.1.7: There may also be events that the agent would be interested in that may not necessarily result in the closing of pinholes or freeing of resources. For example, an agent might be interested in knowing when packets for a given ruleset start or stop flowing. 2.1.11: 1st para: s/types of middlebox/types of middleboxes/ 2.1.11: 2nd para: s/support other/support for other/ 2.1.11: This may also include capability discovery/negotiation so that peers can determine the set of operations and attributes that both support. 2.1.12: I agree with Mark that the protocol should define ruleset precedence so that behavior of such overlaps is deterministic. 2.2.1: 1st para s/dopted/adopted/ 2.2.1: There may also be new attributes or options (as implied by 2.2.5) added to message types. For example, additional filtering elements. 2.2.2: The last sentence of the 2nd paragraph is a bit confusing. I suggest: A midcom agent ought to be able to have a single midcom *session* with a middlebox and use that single session to access different middlebox functions on the same middlebox interface. 2.2.5: 2nd para: s/accomodate/accommodate/ 2.2.6: s/behaviour/behavior/ 2.2.7: The reason for this requirement is related to 2.1.5. Where there is redundancy in the application, a redundant or backup midcom agent will need to maintain and/or remove a ruleset created by a failed midcom agent. cheers, (-:bob Robert F. Penfield Chief Software Architect Acme Packet, Inc. 130 New Boston Street Woburn, MA 01801 bpenfield@acmepacket.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 15 12:23:10 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA05633 for ; Thu, 15 Nov 2001 12:23:10 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA27997 for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 12:23:13 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA27907; Thu, 15 Nov 2001 12:20:10 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA27879 for ; Thu, 15 Nov 2001 12:20:08 -0500 (EST) Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA05364 for ; Thu, 15 Nov 2001 12:20:03 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fAFHJOW24364 for ; Thu, 15 Nov 2001 09:19:24 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABY50620; Thu, 15 Nov 2001 09:18:56 -0800 (PST) Message-Id: <5.1.0.14.0.20011115121841.00a9add0@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Thu, 15 Nov 2001 12:21:46 -0500 To: midcom@ietf.org From: Melinda Shore Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: [midcom] Requirements drafts Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Many thanks to Mark and Bob for their comments, which I've incorporated into the document. If you haven't already done so, please try to take a look at the document and get comments to the mailing list in the next day or so. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 15 12:53:52 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA07906 for ; Thu, 15 Nov 2001 12:53:52 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA29223 for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 12:53:54 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA29204; Thu, 15 Nov 2001 12:51:34 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA29173 for ; Thu, 15 Nov 2001 12:51:31 -0500 (EST) Received: from Mitel.COM ([216.191.234.70]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA07680 for ; Thu, 15 Nov 2001 12:51:29 -0500 (EST) From: Tom_Gray@mitel.com Received: from kanmta01.software.mitel.com (kanmta01 [134.199.37.58]) by Mitel.COM (V8/MAIL-RELAY-2.1) with SMTP id MAA29962 for ; Thu, 15 Nov 2001 12:50:44 -0500 (EST) Received: by kanmta01.software.mitel.com(Lotus SMTP MTA v4.6.7 (934.1 12-30-1999)) id 85256B05.0061C768 ; Thu, 15 Nov 2001 12:48:00 -0500 X-Lotus-FromDomain: MITEL To: midcom@ietf.org Message-ID: <85256B05.0061C5D8.00@kanmta01.software.mitel.com> Date: Thu, 15 Nov 2001 12:50:37 -0500 Mime-Version: 1.0 Content-type: text/plain; charset=us-ascii Content-Disposition: inline Subject: [midcom] STUN/TURN proposal Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org From: Tom Gray@MITEL on 11/15/2001 12:50 PM The STUN protocol discovers the type of NAT used. How often is it contemplated that the protocol would be run in a typical installation? Would it typically be for every VoIPcall or at a lower rate than that. _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 15 14:09:52 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA12500 for ; Thu, 15 Nov 2001 14:09:51 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id OAA01581 for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 14:09:54 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA01487; Thu, 15 Nov 2001 14:08:15 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA01457 for ; Thu, 15 Nov 2001 14:08:11 -0500 (EST) Received: from hotmail.com (f147.pav1.hotmail.com [64.4.31.147]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA12321 for ; Thu, 15 Nov 2001 14:08:08 -0500 (EST) Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Thu, 15 Nov 2001 11:07:39 -0800 Received: from 207.5.1.168 by pv1fd.pav1.hotmail.msn.com with HTTP; Thu, 15 Nov 2001 19:07:39 GMT X-Originating-IP: [207.5.1.168] From: "James Ho" To: jdrosen@dynamicsoft.com, mshore@cisco.com, midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates Date: Thu, 15 Nov 2001 11:07:39 -0800 Mime-Version: 1.0 Content-Type: text/plain; format=flowed Message-ID: X-OriginalArrivalTime: 15 Nov 2001 19:07:39.0927 (UTC) FILETIME=[CBB14270:01C16E08] Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Two issues pertaining to the pre-midcom work that I still don't have clarity around. 1. What are the specific latency/peformance issues associated with tunnelling/VPN appraoches? While admitedly there is another device in the picture, as I mentioned before, there are available/evolving hw solutions for integrate wire-speed IPsec processing enabling tunnel de/encapsulation at wire-speeds, so theoretically this should not be an issue. 2. what is the benefit of developing new/additional approaches for secure tunneling when there are existing standards in place for this (e.g. IPsec)? From Jonathan's e-mail, it would seem that the answer to this is 'no'. Is there a concensus around this (I understand there is a philosophical debate underway on this but my interest is in the technical issues)? >From: Jonathan Rosenberg >To: "'James Ho'" , mshore@cisco.com, midcom@ietf.org >Subject: RE: [midcom] pre-midcom candidates >Date: Tue, 6 Nov 2001 00:41:28 -0500 > > > > > > > -----Original Message----- > > From: James Ho [mailto:jamesho37@hotmail.com] > > Sent: Friday, November 02, 2001 6:51 PM > > To: mshore@cisco.com; midcom@ietf.org > > Subject: RE: [midcom] pre-midcom candidates > > > > > > My earlier e-mail was only regarding the pre-midcom drafts > > (i.e. the requirements for the new midcom framework are clear while > > I'm not clear on the need to come up with a new protocol standard > > vs. use of an existing protocol standard for the pre-midcom work). > > Sorry if I'm bringing up issues that may have been hashedout before. > >THis is indeed a good question, and its the point I have been trying to >make. There are a variety of VPN solutions, and many of them allow >applications to traverse nat. There are drawbacks of the VPN solutions - >increased latency and increased data traffic to the provider. Any solution >which retains these drawbacks is just going to define yet-another VPN >approach, and its not clear what the value of that is. There IS immmediate >value in a solution that does not suffer these problems, and therefore does >something different from VPN will do. That is the point to the stun >proposal. > >-Jonathan R. > >--- >Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. >Chief Scientist First Floor >dynamicsoft East Hanover, NJ 07936 >jdrosen@dynamicsoft.com FAX: (973) 952-5050 >http://www.jdrosen.net PHONE: (973) 952-5000 >http://www.dynamicsoft.com _________________________________________________________________ Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 15 16:45:42 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA22836 for ; Thu, 15 Nov 2001 16:45:42 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id QAA06620 for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 16:45:44 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA06577; Thu, 15 Nov 2001 16:43:09 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA06548 for ; Thu, 15 Nov 2001 16:43:08 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id QAA22713 for ; Thu, 15 Nov 2001 16:43:05 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111521394428208 ; Thu, 15 Nov 2001 21:39:44 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Thu, 15 Nov 2001 21:42:18 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639E923BB@ThisAddressDoesNotExist> From: Steve Davies To: "'Jonathan Rosenberg'" , "'midcom@ietf.org'" Subject: RE: [midcom] new I-D on "symmetric STUN" Date: Thu, 15 Nov 2001 21:42:12 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C16E1E.62968370" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C16E1E.62968370 Content-Type: text/plain; charset="ISO-8859-1" Interesting TURN of events or should I say 'U TURN'. Puns aside, this proposal says nothing that hasn't already been proposed. While I am pleased to see TURN uses IDENTICAL concepts to the Davies proposal, it contains many flaws (too numerous to go into here). Fix those flaws and you end up with the Davies proposal. Not only does TURN come a month after the deadline set in Melinda's rules of engagement, but the development of such a new and immature proposal is by definition not in the best interests of a pre-midcom solution. If we agree on the concepts and Jonathan et al are interested in a quick solution, then surely it makes sense to jointly work on the most mature incarnation of those concepts. Why re-invent the wheel? Steve -----Original Message----- From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com] Sent: 14 November 2001 20:34 To: 'midcom@ietf.org' Subject: [midcom] new I-D on "symmetric STUN" Folks, I've talked in the past about the fact that STUN used to have a bit about handling the symmetric case, but that we yanked it out since its sufficiently orthonogonal (and a fairly crowded space). I've just submitted an I-D that documents that piece of the solution. Its a very simple mechanism, more or less the same as STUN, which uses a relay server. The protocol is called "Traversal Using Relay NAT" or TURN. Until it appears in the archives, you can pick up a copy at: http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt Thanks, Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom ------_=_NextPart_001_01C16E1E.62968370 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] new I-D on "symmetric STUN"

Interesting TURN of events or should I say 'U TURN'. =

Puns aside, this proposal says nothing that hasn't = already been proposed. While I am pleased to see TURN uses IDENTICAL = concepts to the Davies proposal, it contains many flaws (too numerous = to go into here). Fix those flaws and you end up with the Davies = proposal. Not only does TURN come a month after the deadline set in = Melinda's rules of engagement, but the development of such a new and = immature proposal is by definition not in the best interests of a = pre-midcom solution. If we agree on the concepts and Jonathan et al are = interested in a quick solution, then surely it makes sense to jointly = work on the most mature incarnation of those concepts. Why re-invent = the wheel?

Steve

-----Original Message-----
From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com]
Sent: 14 November 2001 20:34
To: 'midcom@ietf.org'
Subject: [midcom] new I-D on "symmetric = STUN"


Folks,

I've talked in the past about the fact that STUN used = to have a bit about
handling the symmetric case, but that we yanked it = out since its
sufficiently orthonogonal (and a fairly crowded = space). I've just submitted
an I-D that documents that piece of the solution. = Its a very simple
mechanism, more or less the same as STUN, which uses = a relay server. The
protocol is called "Traversal Using Relay = NAT" or TURN. Until it appears in
the archives, you can pick up a copy at:

http://www.jdrosen.net/papers/draft-rosenberg-midcom-t= urn-00.txt

Thanks,
Jonathan R.

---
Jonathan D. Rosenberg, = Ph.D.           &= nbsp;    72 Eagle Rock Ave.
Chief = Scientist          &nb= sp;           &nb= sp;      First Floor
dynamicsoft        &nbs= p;           &nbs= p;            = East Hanover, NJ 07936
jdrosen@dynamicsoft.com      &nbs= p;           &nbs= p;  FAX:   (973) 952-5050
http://www.jdrosen.net    &nbs= p;           &nbs= p;     PHONE: (973) 952-5000
http://www.dynamicsoft.com
 

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C16E1E.62968370-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 15 17:02:28 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA23680 for ; Thu, 15 Nov 2001 17:02:28 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA07324 for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 17:02:30 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA06809; Thu, 15 Nov 2001 16:59:45 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA06781 for ; Thu, 15 Nov 2001 16:59:43 -0500 (EST) Received: from mail.netscreen.com (mail.netscreen.com [63.126.135.15]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23541 for ; Thu, 15 Nov 2001 16:59:40 -0500 (EST) Received: from ns-ca.netscreen.com (ns-ca.netscreen.com [10.100.10.21]) by mail.netscreen.com (8.10.0/8.10.0) with ESMTP id fAFLZnU23416; Thu, 15 Nov 2001 13:35:49 -0800 Received: by NS-CA with Internet Mail Service (5.5.2653.19) id ; Thu, 15 Nov 2001 13:58:30 -0800 Message-ID: From: John LaCour To: "'Steve Davies'" , "'Jonathan Rosenberg'" , "'midcom@ietf.org'" Subject: RE: [midcom] new I-D on "symmetric STUN" Date: Thu, 15 Nov 2001 13:57:41 -0800 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C16E20.8C907210" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C16E20.8C907210 Content-Type: text/plain; charset="iso-8859-1" Steve, You may or may not be correct, but this message does next to nothing to help any of us evaluate the merits of either proposal. Just because something was created earlier or even implemented doesn't make it inherently better. Rather than try to strong-arm us, you really need to enumerate the many flaws and how your proposal addresses them. If you want to be completely forthcoming coming you should also discuss the weaknesses of your own proposal and why you've made those trade-offs. In fairness to you and Jonathan, I haven't done a thorough review of either proposal yet. This message should not be misconstrued as supporting either proposal. Rather I'm trying to encourage you to tell us something useful. -John -----Original Message----- From: Steve Davies [mailto:sdavies@ridgewaysystems.com] Sent: Thursday, November 15, 2001 1:42 PM To: 'Jonathan Rosenberg'; 'midcom@ietf.org' Subject: RE: [midcom] new I-D on "symmetric STUN" Interesting TURN of events or should I say 'U TURN'. Puns aside, this proposal says nothing that hasn't already been proposed. While I am pleased to see TURN uses IDENTICAL concepts to the Davies proposal, it contains many flaws (too numerous to go into here). Fix those flaws and you end up with the Davies proposal. Not only does TURN come a month after the deadline set in Melinda's rules of engagement, but the development of such a new and immature proposal is by definition not in the best interests of a pre-midcom solution. If we agree on the concepts and Jonathan et al are interested in a quick solution, then surely it makes sense to jointly work on the most mature incarnation of those concepts. Why re-invent the wheel? Steve -----Original Message----- From: Jonathan Rosenberg [ mailto:jdrosen@dynamicsoft.com ] Sent: 14 November 2001 20:34 To: 'midcom@ietf.org' Subject: [midcom] new I-D on "symmetric STUN" Folks, I've talked in the past about the fact that STUN used to have a bit about handling the symmetric case, but that we yanked it out since its sufficiently orthonogonal (and a fairly crowded space). I've just submitted an I-D that documents that piece of the solution. Its a very simple mechanism, more or less the same as STUN, which uses a relay server. The protocol is called "Traversal Using Relay NAT" or TURN. Until it appears in the archives, you can pick up a copy at: http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt Thanks, Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom ------_=_NextPart_001_01C16E20.8C907210 Content-Type: text/html; charset="iso-8859-1" RE: [midcom] new I-D on "symmetric STUN"
Steve,
 
You may or may not be correct, but this message does next to nothing
to help any of us evaluate the merits of either proposal.
 
Just because something was created earlier or even implemented doesn't
make it inherently better.
 
Rather than try to strong-arm us, you really need to enumerate the many
flaws and how your proposal addresses them.  If you want to be
completely forthcoming coming you should also discuss the weaknesses
of your own proposal and why you've made those trade-offs.
 
In fairness to you and Jonathan, I haven't done a thorough review of
either proposal yet.  This message should not be misconstrued
as  supporting either proposal.  Rather I'm trying to encourage
you to tell us something useful.
 
-John
-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: Thursday, November 15, 2001 1:42 PM
To: 'Jonathan Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric STUN"

Interesting TURN of events or should I say 'U TURN'.

Puns aside, this proposal says nothing that hasn't already been proposed. While I am pleased to see TURN uses IDENTICAL concepts to the Davies proposal, it contains many flaws (too numerous to go into here). Fix those flaws and you end up with the Davies proposal. Not only does TURN come a month after the deadline set in Melinda's rules of engagement, but the development of such a new and immature proposal is by definition not in the best interests of a pre-midcom solution. If we agree on the concepts and Jonathan et al are interested in a quick solution, then surely it makes sense to jointly work on the most mature incarnation of those concepts. Why re-invent the wheel?

Steve

-----Original Message-----
From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com]
Sent: 14 November 2001 20:34
To: 'midcom@ietf.org'
Subject: [midcom] new I-D on "symmetric STUN"


Folks,

I've talked in the past about the fact that STUN used to have a bit about
handling the symmetric case, but that we yanked it out since its
sufficiently orthonogonal (and a fairly crowded space). I've just submitted
an I-D that documents that piece of the solution. Its a very simple
mechanism, more or less the same as STUN, which uses a relay server. The
protocol is called "Traversal Using Relay NAT" or TURN. Until it appears in
the archives, you can pick up a copy at:

http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt

Thanks,
Jonathan R.

---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com
 

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C16E20.8C907210-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 15 18:48:06 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA28248 for ; Thu, 15 Nov 2001 18:48:06 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id SAA10967 for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 18:48:09 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA10747; Thu, 15 Nov 2001 18:45:47 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA10717 for ; Thu, 15 Nov 2001 18:45:45 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA28103 for ; Thu, 15 Nov 2001 18:45:41 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAFNhpCJ005077; Thu, 15 Nov 2001 18:43:51 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Thu, 15 Nov 2001 18:45:13 -0500 Message-ID: From: Jonathan Rosenberg To: "'Steve Davies'" , Jonathan Rosenberg , "'midcom@ietf.org'" Subject: RE: [midcom] new I-D on "symmetric STUN" Date: Thu, 15 Nov 2001 18:45:12 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain; charset="iso-8859-1" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org -----Original Message----- From: Steve Davies [mailto:sdavies@ridgewaysystems.com] Sent: Thursday, November 15, 2001 4:42 PM To: 'Jonathan Rosenberg'; 'midcom@ietf.org' Subject: RE: [midcom] new I-D on "symmetric STUN" >Interesting TURN of events or should I say 'U TURN'. This is not a u-turn at all. I have mentioned this aspect of the proposal on the list for sometime. I myself am still hazy on the merits of an application layer vpn style approach (which is what this, and yours, are), as compared to pure VPN. Indeed, there is a section in my draft which begins to discuss the issues. >Puns aside, this proposal says nothing that hasn't already been proposed. Really? It is not bitwise or semanticwise identical to your proposal, so how do you claim it has already been proposed? It avoids a control connection, which you have. It avoids tunnelling, which you do. It avoids the complexities of the probe packets, which your proposal has, and mine does not. Thus, how do you claim this is the same? > While I am >pleased to see TURN uses IDENTICAL concepts to the Davies proposal, See above, for at least three substantive differences. We've focused on simplicity. Thats not the same. Both do obtain addresses for use in UDP and TCP from an intermediary. That is certainly shared, but its also unavoidable for a solution to the symmetric problem. Even VPN and RSIP do this too. The differences are in how this is done. > it contains many flaws >(too numerous to go into here). A fine technical assessment! Thats right up there with "it just won't work" and "it won't scale" in the category of vacuous criticisms. >If we agree on the concepts and Jonathan et al are >interested in a quick solution, then surely it makes sense to jointly work on the most >mature incarnation of those concepts. Why re-invent the wheel? Indeed. With existing VPN solutions I am unsure about the need for TURN or your proposal. My document at least begins to discuss what the pros and cons might be. Interesting to note that STUN is the only protocol that actually does something new. -Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 15 20:41:34 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA01329 for ; Thu, 15 Nov 2001 20:41:34 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id UAA14038 for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 20:41:36 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id UAA14003; Thu, 15 Nov 2001 20:40:00 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id UAA13927 for ; Thu, 15 Nov 2001 20:39:57 -0500 (EST) Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA01306 for ; Thu, 15 Nov 2001 20:39:54 -0500 (EST) Received: from smtprch2.nortel.com (erchg0k.us.nortel.com [47.113.64.104]) by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id TAA27613 for ; Thu, 15 Nov 2001 19:39:26 -0600 (CST) Received: from zsc4c000.us.nortel.com by smtprch2.nortel.com; Thu, 15 Nov 2001 19:32:17 -0600 Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19) id ; Thu, 15 Nov 2001 17:38:08 -0800 Message-ID: <2F1FC1DEA077D5119FAD00508BCFD6D2FF92E8@zsc3c030.us.nortel.com> From: "Francois Audet" To: "'Jonathan Rosenberg'" , "'midcom@ietf.org'" Subject: RE: [midcom] new I-D on "symmetric STUN" Date: Thu, 15 Nov 2001 17:38:14 -0800 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C16E3F.5BC4E570" X-Orig: Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C16E3F.5BC4E570 Content-Type: text/plain; charset="iso-8859-1" Jonathan, I believe that in your Figure 2, message (4), the port number for the mapped address should be "1124" and not "1123". > -----Original Message----- > From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com] > Sent: Wednesday, November 14, 2001 12:34 > To: 'midcom@ietf.org' > Subject: [midcom] new I-D on "symmetric STUN" > > > Folks, > > I've talked in the past about the fact that STUN used to have > a bit about > handling the symmetric case, but that we yanked it out since its > sufficiently orthonogonal (and a fairly crowded space). I've > just submitted > an I-D that documents that piece of the solution. Its a very simple > mechanism, more or less the same as STUN, which uses a relay > server. The > protocol is called "Traversal Using Relay NAT" or TURN. Until > it appears in > the archives, you can pick up a copy at: > > http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt > > Thanks, > Jonathan R. > > --- > Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. > Chief Scientist First Floor > dynamicsoft East Hanover, NJ 07936 > jdrosen@dynamicsoft.com FAX: (973) 952-5050 > http://www.jdrosen.net PHONE: (973) 952-5000 > http://www.dynamicsoft.com > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom > ------_=_NextPart_001_01C16E3F.5BC4E570 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] new I-D on "symmetric STUN"

Jonathan,

I believe that in your Figure 2, message (4), the = port number for the mapped address
should be "1124" and not = "1123".

> -----Original Message-----
> From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com]
> Sent: Wednesday, November 14, 2001 12:34
> To: 'midcom@ietf.org'
> Subject: [midcom] new I-D on "symmetric = STUN"
>
>
> Folks,
>
> I've talked in the past about the fact that = STUN used to have
> a bit about
> handling the symmetric case, but that we yanked = it out since its
> sufficiently orthonogonal (and a fairly crowded = space). I've
> just submitted
> an I-D that documents that piece of the = solution. Its a very simple
> mechanism, more or less the same as STUN, which = uses a relay
> server. The
> protocol is called "Traversal Using Relay = NAT" or TURN. Until
> it appears in
> the archives, you can pick up a copy at:
>
>
http://www.jdrosen.net/papers/draft-rosenberg-midcom-t= urn-00.txt
>
> Thanks,
> Jonathan R.
>
> ---
> Jonathan D. Rosenberg, = Ph.D.           &= nbsp;    72 Eagle Rock Ave.
> Chief = Scientist          &nb= sp;           &nb= sp;      First Floor
> = dynamicsoft          &= nbsp;           &= nbsp;          East = Hanover, NJ 07936
> = jdrosen@dynamicsoft.com        &= nbsp;            = FAX:   (973) 952-5050
> http://www.jdrosen.net    &nbs= p;           &nbs= p;     PHONE: (973) 952-5000
> http://www.dynamicsoft.com

>
> = _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
>

------_=_NextPart_001_01C16E3F.5BC4E570-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 15 23:02:26 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05389 for ; Thu, 15 Nov 2001 23:02:26 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id XAA16317 for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 23:02:28 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA16160; Thu, 15 Nov 2001 23:00:26 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA16116 for ; Thu, 15 Nov 2001 23:00:23 -0500 (EST) Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05354 for ; Thu, 15 Nov 2001 23:00:20 -0500 (EST) Received: from imop.cisco.com (imop.cisco.com [171.69.11.44]) by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fAG3xqH29274; Thu, 15 Nov 2001 19:59:52 -0800 (PST) Received: from buckthorn-nt.cisco.com (dhcp-128-107-142-151.cisco.com [128.107.142.151]) by imop.cisco.com (Mirapoint) with ESMTP id ACB12825; Thu, 15 Nov 2001 19:59:51 -0800 (PST) Message-Id: <5.0.0.25.2.20011115191959.01cb3d90@imop.cisco.com> X-Sender: rmahy@imop.cisco.com X-Mailer: QUALCOMM Windows Eudora Version 5.0 Date: Thu, 15 Nov 2001 19:22:33 -0800 To: Tom_Gray@mitel.com From: Rohan Mahy Cc: midcom@ietf.org Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Subject: [midcom] re: STUN/TURN proposal Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org >From: Tom Gray@MITEL on 11/15/2001 12:50 PM > >The STUN protocol discovers the type of NAT used. How often is it contemplated >that the protocol would be run in a typical installation? Would it >typically be >for every VoIPcall or at a lower rate than that. You would typically use STUN at *startup* to find out if you are behind a NAT. You may also want to check if your IP address moved to a different subnet unexpectedly. thanks, -rohan _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 16 09:43:30 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03462 for ; Fri, 16 Nov 2001 09:43:29 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id JAA07495 for midcom-archive@odin.ietf.org; Fri, 16 Nov 2001 09:43:33 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07387; Fri, 16 Nov 2001 09:41:27 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07360 for ; Fri, 16 Nov 2001 09:41:25 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03375 for ; Fri, 16 Nov 2001 09:41:21 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAGEer829892; Fri, 16 Nov 2001 06:40:53 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABY80971; Fri, 16 Nov 2001 06:40:24 -0800 (PST) Message-Id: <5.1.0.14.0.20011116093934.00a8b130@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Fri, 16 Nov 2001 09:43:23 -0500 To: John LaCour , "'Steve Davies'" , "'Jonathan Rosenberg'" , "'midcom@ietf.org'" From: Melinda Shore Subject: RE: [midcom] new I-D on "symmetric STUN" In-Reply-To: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 01:57 PM 11/15/01 -0800, John LaCour wrote: >Rather than try to strong-arm us, you really need to enumerate the many >flaws and how your proposal addresses them. If you want to be >completely forthcoming coming you should also discuss the weaknesses >of your own proposal and why you've made those trade-offs. During the pre-midcom discussion at the Salt Lake City meeting the authors of each candidate draft will be doing precisely that. Well, not *precisely* - what I've asked for is one slide listing the benefits of their proposal and one slide listing the open issues. It might be helpful if they posted that material to the mailing list when it's ready. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 16 09:46:44 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03580 for ; Fri, 16 Nov 2001 09:46:44 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id JAA07672 for midcom-archive@odin.ietf.org; Fri, 16 Nov 2001 09:46:48 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07545; Fri, 16 Nov 2001 09:45:03 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07514 for ; Fri, 16 Nov 2001 09:45:02 -0500 (EST) Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03504 for ; Fri, 16 Nov 2001 09:44:57 -0500 (EST) Received: from BobP [63.67.143.2] by acmepacket.com (SMTPD32-7.04) id A66BF8B90116; Fri, 16 Nov 2001 09:44:59 -0500 Message-ID: <010801c16eaa$46868040$2300000a@acmepacket.com> From: "Bob Penfield" To: "Steve Davies" , "'Jonathan Rosenberg'" , References: <00533D13955AD411AF3800A0C9B42639E923BB@ThisAddressDoesNotExist> Subject: Re: [midcom] new I-D on "symmetric STUN" Date: Fri, 16 Nov 2001 09:23:34 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Hi Steve, You call your proposal mature, however I have not yet seen a detailed specification of the protocol. Or am I missing something? I can make an implementation based on the STUN/TURN proposals (after a few corrections that I will post separately). Can you provide the details we need to create implementations? This is an urgent need which the community/industry would like make deployable solutions within the immediate future. We cannot afford to go through the normal 18+ month protocol development cycle. We need to submit an implementable specification to the IESG in the next month or so. I am also very interested in knowing what flaws you see in the proposal. Maybe you could enumerate the most serious. cheers, (-:bob Robert F. Penfield Chief Software Architect Acme Packet, Inc. 130 New Boston Street Woburn, MA 01801 bpenfield@acmepacket.com ----- Original Message ----- From: "Steve Davies" To: "'Jonathan Rosenberg'" ; Sent: Thursday, November 15, 2001 4:42 PM Subject: RE: [midcom] new I-D on "symmetric STUN" > Interesting TURN of events or should I say 'U TURN'. > > Puns aside, this proposal says nothing that hasn't already been proposed. > While I am pleased to see TURN uses IDENTICAL concepts to the Davies > proposal, it contains many flaws (too numerous to go into here). Fix those > flaws and you end up with the Davies proposal. Not only does TURN come a > month after the deadline set in Melinda's rules of engagement, but the > development of such a new and immature proposal is by definition not in the > best interests of a pre-midcom solution. If we agree on the concepts and > Jonathan et al are interested in a quick solution, then surely it makes > sense to jointly work on the most mature incarnation of those concepts. Why > re-invent the wheel? > > Steve > > -----Original Message----- > From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com] > Sent: 14 November 2001 20:34 > To: 'midcom@ietf.org' > Subject: [midcom] new I-D on "symmetric STUN" > > > Folks, > > I've talked in the past about the fact that STUN used to have a bit about > handling the symmetric case, but that we yanked it out since its > sufficiently orthonogonal (and a fairly crowded space). I've just submitted > an I-D that documents that piece of the solution. Its a very simple > mechanism, more or less the same as STUN, which uses a relay server. The > protocol is called "Traversal Using Relay NAT" or TURN. Until it appears in > the archives, you can pick up a copy at: > > http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt > > Thanks, > Jonathan R. > > --- > Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. > Chief Scientist First Floor > dynamicsoft East Hanover, NJ 07936 > jdrosen@dynamicsoft.com FAX: (973) 952-5050 > http://www.jdrosen.net PHONE: (973) 952-5000 > http://www.dynamicsoft.com > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom > _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 16 09:50:03 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03719 for ; Fri, 16 Nov 2001 09:50:02 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id JAA07725 for midcom-archive@odin.ietf.org; Fri, 16 Nov 2001 09:50:06 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07598; Fri, 16 Nov 2001 09:46:02 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07571 for ; Fri, 16 Nov 2001 09:46:01 -0500 (EST) Received: from web14106.mail.yahoo.com (web14106.mail.yahoo.com [216.136.172.136]) by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA03529 for ; Fri, 16 Nov 2001 09:45:56 -0500 (EST) Message-ID: <20011116144558.13032.qmail@web14106.mail.yahoo.com> Received: from [216.191.234.100] by web14106.mail.yahoo.com via HTTP; Fri, 16 Nov 2001 06:45:58 PST Date: Fri, 16 Nov 2001 06:45:58 -0800 (PST) From: Mark Taylor Subject: RE: [midcom] new I-D on "symmetric STUN" To: "'midcom@ietf.org'" MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org The main difference between the Davies and STUN/TURN is that one speaks of a firewall strategy while the other is effectively silent. The other differences are really inconsequential and superficial. What benefits does the Davies firewall strate3gy bring? In addition, the purpose of STUN is really not clear to me. The information that it gathers seems to be something that would be done only very rarely and could probably be obtained from an inquiry to the network designer. Indeed if the answer turns out to be a symmetric NAT, a TURN server would have to be provided outside of the NAT which is something that would have to be done physically. STUN and TURN as protocols that adapt to network configurations is a concept that seems very fuzzy to me. I must be missing something about their operation. __________________________________________________ Do You Yahoo!? Find the one for you at Yahoo! Personals http://personals.yahoo.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 16 09:55:25 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03987 for ; Fri, 16 Nov 2001 09:55:25 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id JAA07882 for midcom-archive@odin.ietf.org; Fri, 16 Nov 2001 09:55:28 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07852; Fri, 16 Nov 2001 09:54:30 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07821 for ; Fri, 16 Nov 2001 09:54:29 -0500 (EST) Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03923 for ; Fri, 16 Nov 2001 09:54:24 -0500 (EST) Received: from BobP [63.67.143.2] by acmepacket.com (SMTPD32-7.04) id A8A252E0116; Fri, 16 Nov 2001 09:54:26 -0500 Message-ID: <011801c16eab$95cd3080$2300000a@acmepacket.com> From: "Bob Penfield" To: "midcom" Date: Fri, 16 Nov 2001 09:32:57 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Content-Transfer-Encoding: 7bit Subject: [midcom] STUN/TURN missing/colliding attribute types Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit The TURN draft says that STUN and TURN can be used together. However, there is an overlap in the Message Attribute types in the STUN and TURN drafts. The TURN proposal re-uses type 0x0004 for CHALLENGE. It is SOURCE-ADDRESS in STUN. The STUN proposal names 5 attributes, but section 10.2 list only types 1 thru 4. What type is CHANGED-ADDRESS? Since it is likely that people will want to implement a unified STUN/TURN server, the attribute types should be unique. cheers, (-:bob Robert F. Penfield Chief Software Architect Acme Packet, Inc. 130 New Boston Street Woburn, MA 01801 bpenfield@acmepacket.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 16 11:54:33 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA10206 for ; Fri, 16 Nov 2001 11:54:32 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA10664 for midcom-archive@odin.ietf.org; Fri, 16 Nov 2001 11:54:35 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA10458; Fri, 16 Nov 2001 11:46:57 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA10419 for ; Fri, 16 Nov 2001 11:46:55 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA09777; Fri, 16 Nov 2001 11:46:51 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAGGj3CJ008538; Fri, 16 Nov 2001 11:45:03 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Fri, 16 Nov 2001 11:46:24 -0500 Message-ID: From: Jonathan Rosenberg To: "'sipping@ietf.org'" Cc: "'midcom@ietf.org'" Date: Fri, 16 Nov 2001 11:46:24 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain; charset="iso-8859-1" Subject: [midcom] New I-D on SIP NAT and Firewall Scenarios and Solutions Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Folks, Rohan Mahy, myself, and Sanjoy Sen submitted a new I-D that documents scenarios and solutions for a whole bunch of different NAT and firewall scenarios for SIP. It should appear in the archives shortly, but until it does, you can pick it up at: http://www.jdrosen.net/papers/draft-rosenberg-sipping-nat-scenarios-00.txt It needs a lot more work, but should hopefully help people understand how all of the various drafts and solutions fit together. Thanks, Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 03:26:12 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22659 for ; Sat, 17 Nov 2001 03:26:12 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id DAA10252 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 03:26:14 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA10184; Sat, 17 Nov 2001 03:19:55 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA10153 for ; Sat, 17 Nov 2001 03:19:53 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22611 for ; Sat, 17 Nov 2001 03:19:51 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAH8I0CJ012813; Sat, 17 Nov 2001 03:18:00 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Sat, 17 Nov 2001 03:19:21 -0500 Message-ID: From: Jonathan Rosenberg To: "'Mark Taylor'" , "'midcom@ietf.org'" Subject: RE: [midcom] new I-D on "symmetric STUN" Date: Sat, 17 Nov 2001 03:19:17 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org > -----Original Message----- > From: Mark Taylor [mailto:m_taylorus@yahoo.com] > Sent: Friday, November 16, 2001 9:46 AM > To: 'midcom@ietf.org' > Subject: RE: [midcom] new I-D on "symmetric STUN" > > > The main difference between the Davies and STUN/TURN > is that one speaks of a firewall strategy while the > other is effectively silent. The other differences are > really inconsequential and superficial. Not really. I think TURN is significantly simpler than the Davies proposal. It does that by doing fewer things (for example, the Davies draft supports outbound TCP connections through their tunneling mechanism, outbound TCP is not provided in TURN. I'll explain that in a separate note). > > What benefits does the Davies firewall strate3gy > bring? > > In addition, the purpose of STUN is really not clear > to me. It does two main things: 1. helps a device discover what its nat situation is, 2. if the nat situation is full cone, restricted cone, port restricted cone, allows it to get an ip address it can use in applications. > The information that it gathers seems to be > something that would be done only very rarely Discovery, yes. Item two above would be done for each SIP call, for example. > and > could probably be obtained from an inquiry to the > network designer. I think that is quite impractical. I can imagine a PC phone app documentation saying "next, please call your cable provider and ask them the type of NAT they are running in their network. Enter the value in dialog box...". I don't think so. > Indeed if the answer turns out to be > a symmetric NAT, a TURN server would have to be > provided outside of the NAT which is something that > would have to be done physically. Yes. > STUN and TURN as > protocols that adapt to network configurations is a > concept that seems very fuzzy to me. I must be missing > something about their operation. I can answer specific questions. Hopefully the new draft on nat scenarios might clarify some of it. -Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 03:59:32 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22868 for ; Sat, 17 Nov 2001 03:59:28 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id DAA10914 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 03:59:29 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA10747; Sat, 17 Nov 2001 03:49:55 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA10718 for ; Sat, 17 Nov 2001 03:49:53 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22798 for ; Sat, 17 Nov 2001 03:49:50 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAH8lpCJ012848; Sat, 17 Nov 2001 03:47:51 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Sat, 17 Nov 2001 03:49:12 -0500 Message-ID: From: Jonathan Rosenberg To: "'John LaCour'" , "'Steve Davies'" , Jonathan Rosenberg , "'midcom@ietf.org'" Subject: RE: [midcom] new I-D on "symmetric STUN" Date: Sat, 17 Nov 2001 03:49:06 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain; charset="iso-8859-1" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org John, You are right; we need to have real differences discussed and honest assessments of strengths and weakenesses. Let me try to do that. STUN by itself is a bit hard to compare to the Davies proposal since its a bit of apples/oranges. STUN provides a discovery capability, which is not present in the Davies draft. STUN allows you to obtain an address from your own nat that you can use in applications, which the Davies draft doesn't. The Davies approach is to not bother with such things, and instead go for the full symmetric solution in all cases. This has the advantage of being a single solution which works broadly, but this generality comes at a cost. The cost is that media is ALWAYS routed to the provider network, even when it doesn't really have to. The result could be big increases in latency (I call my neighbor; my provider is on the west coast, so my media goes from New Jersey to California and back to New Jersey), and also additional cost for the provider to purchase the bandwidth for the media to come in and go back out. I personally believe that we should be avoiding triangle routing of media at all costs. Whether you agree with that will heavily influence your assessment of the solutions. TURN is more comparable to the Davies draft. They share commonalities. Both use a service provider intermediary to terminate UDP and TCP traffic. Both provide the client with an IP address and port that will route to this intermediary. Both support bidirectional sending on the "connections" established between the client and the intermediary. There are many differences too: * the Davies proposal uses a single connection between the client and intermediary, over which control commands and outbound TCP and UDP "subchannels" can be established. There is no such thing in TURN. The reason is that the Davies draft assumes that outbound TCP connections would only be allowed towards a statically configured address and port, that of the intermediary. So, all other traffic needs to go within this connection, and thus muxing is needed. I found this odd; if the firewall policy prevents outbound TCP connections to anywhere but the intermediary, and the intermediary's job is to allow you to make outbound TCP connections to anywhere, for example, this would be a violation of enterprise firewall policy. Similar for UDP. So, TURN assumes that the firewall allows outbound UDP and outbound TCP to anywhere, since if it doesn't, you're not supposed to be doing it anyway. Since the assumption is a firewall policy that allows outbound messaging anywhere, the need for a separate multiplexed connection is eliminated in TURN. * the Davies proposal uses a "control channel" within their multiplex connection. The presence of a separate control channel allows for messaging to the client outside of the "data channels" that are established. One of the things this enables is for a tcp listener to be created at the intermediary, and for that listener to have lots of connections made to it. As each connection is made, the client is informed of this (through the control channel). Since TURN has no control channel, there is no ability to let the client know when a connection is established, and no ability to support multiple connections to a specific listener. Its a one-one mapping only. This would not be sufficient for building a web server behind a NAT, for example, but thats not what TURN is trying to solve. Presumably, if the enterprise is disallowing incoming connections from anywhere to the inside, its to prevent users from doing things like running a web server. If the enteprirse is allowing outbound TCP, it means its OK for the user to make a connection to a single peer. So, we support a similar model, but with roles "turned" - you have a single connection to a single peer, but its initiated from the peer rather than from you. TURN doesn't let you do more than that. When only a single peer can connect to a TCP listener, you don't need much of the functionality in the Davies draft. * The Davies proposal has this interesting "probe" mechanism that allows the intermediary to associate a UDP "connection" from the client with commands on the control channel. The association is only needed because commands can be sent on the channel. The commands allow you to do things like explicitly set the remote destination, even changing it after its set up. There is no such capability in TURN, for much the same reasons as described above. TURN allows a client to connect to a single peer with UDP, its just that the peer initiates, instead of the client inside. Thats it. With that restriction, there is no need to set the remote addresses, or to change them, and thus the control channel is not needed, and thus the probes are not needed. Overall, TURN is much, much simpler than the Davies proposal since: (1) it does not attempt to do things that are outside of the scope of the administrator's firewall policy, (2) it does less than the Davies proposal, because it merely supports peer to peer connectivity where the external entity initiates to the inside, rather than the other way around (thus the name TURN). Because it does less, its oodles simpler. If you want to do things like build an HTTP server, you are far better off using a VPN, IMHO. TURN is meant to facilitate a class of applications that have requirements similar to client-server applications permitted by firewalls and NATs, but where the "server" is unknown, and it initiates communications to the client first. This includes a LOT of applications, I think, and because it tries hard to stay within the bounds of enterprise firewall policy, is something I believe administrators would be aggreable to allowing. I hope I have not misrepresented features in the Davies draft; I am sure Steve will correct me with vigor in the event that I have. Thanks, Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com -----Original Message----- From: John LaCour [mailto:jlacour@netscreen.com] Sent: Thursday, November 15, 2001 4:58 PM To: 'Steve Davies'; 'Jonathan Rosenberg'; 'midcom@ietf.org' Subject: RE: [midcom] new I-D on "symmetric STUN" Steve, You may or may not be correct, but this message does next to nothing to help any of us evaluate the merits of either proposal. Just because something was created earlier or even implemented doesn't make it inherently better. Rather than try to strong-arm us, you really need to enumerate the many flaws and how your proposal addresses them. If you want to be completely forthcoming coming you should also discuss the weaknesses of your own proposal and why you've made those trade-offs. In fairness to you and Jonathan, I haven't done a thorough review of either proposal yet. This message should not be misconstrued as supporting either proposal. Rather I'm trying to encourage you to tell us something useful. -John -----Original Message----- From: Steve Davies [mailto:sdavies@ridgewaysystems.com] Sent: Thursday, November 15, 2001 1:42 PM To: 'Jonathan Rosenberg'; 'midcom@ietf.org' Subject: RE: [midcom] new I-D on "symmetric STUN" Interesting TURN of events or should I say 'U TURN'. Puns aside, this proposal says nothing that hasn't already been proposed. While I am pleased to see TURN uses IDENTICAL concepts to the Davies proposal, it contains many flaws (too numerous to go into here). Fix those flaws and you end up with the Davies proposal. Not only does TURN come a month after the deadline set in Melinda's rules of engagement, but the development of such a new and immature proposal is by definition not in the best interests of a pre-midcom solution. If we agree on the concepts and Jonathan et al are interested in a quick solution, then surely it makes sense to jointly work on the most mature incarnation of those concepts. Why re-invent the wheel? Steve -----Original Message----- From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com] Sent: 14 November 2001 20:34 To: 'midcom@ietf.org' Subject: [midcom] new I-D on "symmetric STUN" Folks, I've talked in the past about the fact that STUN used to have a bit about handling the symmetric case, but that we yanked it out since its sufficiently orthonogonal (and a fairly crowded space). I've just submitted an I-D that documents that piece of the solution. Its a very simple mechanism, more or less the same as STUN, which uses a relay server. The protocol is called "Traversal Using Relay NAT" or TURN. Until it appears in the archives, you can pick up a copy at: http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt Thanks, Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 04:00:38 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA22899 for ; Sat, 17 Nov 2001 04:00:38 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id EAA11179 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 04:00:39 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA10832; Sat, 17 Nov 2001 03:56:56 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA10804 for ; Sat, 17 Nov 2001 03:56:54 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22840 for ; Sat, 17 Nov 2001 03:56:52 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAH8srCJ012862; Sat, 17 Nov 2001 03:54:54 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Sat, 17 Nov 2001 03:56:15 -0500 Message-ID: From: Jonathan Rosenberg To: "'Meyer, Greg W'" , "'Pete Cordell'" , Steve Davies , "'Bob Penfield'" , "'midcom'" , Melinda Shore Subject: RE: [midcom] pre-midcom candidates Date: Sat, 17 Nov 2001 03:56:14 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain; charset="iso-8859-1" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org > -----Original Message----- > From: Meyer, Greg W [mailto:greg.w.meyer@intel.com] > Sent: Tuesday, November 13, 2001 8:57 PM > To: 'Pete Cordell'; Steve Davies; 'Bob Penfield'; 'midcom'; Melinda > Shore > Subject: RE: [midcom] pre-midcom candidates > > > I agree with Pete; I would favor a solution that addresses > both firewall and > NAT. The trade-offs Jonathan raise about the Davies approach are very > acceptable given pre-midcom is temporary (until midcom is > deployed). Any > short-term solution that doesn't account for today's most > deployed networks > simply defeats the purpose. I just posted a note with far more details, but there is a really, really, really important point that needs to be made here. "addressing the firewall" CANNOT MEAN VIOLATING ENTERPRISE FIREWALL POLICY. PERIOD. Even if this group chose to do that, I sincerely doubt that the IESG would approve a protocol that would allow a client to bypass the firewall's policy, unless this draft was an April Fools rfc (and there is one). So, if the firewall disallows outbound UDP, sorry, no VoIP. I wish it wasn't so, but thats the policy. I am sure people will deploy hacks to get around this, and those hacks will be countered by smarter firewalls, and the game will continue. At IETF, we develop protocols that are good for the Internet, not protocols that are convenient for getting around annoying policies that prevent us from making money. I fully realize that this is a tough pill to swallow, especially these days, but I think thats the truth here. Thanks, Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 04:26:21 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA23082 for ; Sat, 17 Nov 2001 04:26:21 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id EAA11547 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 04:26:22 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA11401; Sat, 17 Nov 2001 04:14:18 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA11370 for ; Sat, 17 Nov 2001 04:14:16 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA22992 for ; Sat, 17 Nov 2001 04:14:14 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAH9CMCJ012878; Sat, 17 Nov 2001 04:12:22 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Sat, 17 Nov 2001 04:13:43 -0500 Message-ID: From: Jonathan Rosenberg To: "'James Ho'" , Jonathan Rosenberg , mshore@cisco.com, midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates Date: Sat, 17 Nov 2001 04:13:39 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org > -----Original Message----- > From: James Ho [mailto:jamesho37@hotmail.com] > Sent: Thursday, November 15, 2001 2:08 PM > To: jdrosen@dynamicsoft.com; mshore@cisco.com; midcom@ietf.org > Subject: RE: [midcom] pre-midcom candidates > > > Two issues pertaining to the pre-midcom work that I still don't > have clarity around. > > 1. What are the specific latency/peformance issues associated with > tunnelling/VPN appraoches? While admitedly there is another device > in the picture, as I mentioned before, there are available/evolving > hw solutions for integrate wire-speed IPsec processing > enabling tunnel de/encapsulation at wire-speeds, so theoretically > this should not be an issue. It has nothing to do with processing speed at the intermediary. The problem is the painfully slow speed of light. Consider two users, A and B, who sign up for service with a provider foo.com. Foo has a data center in California. Foo has no idea where its customers physically reside when they make calls. In fact, foo may not even know the mailing address for its customers. Now, it so happens that A and B are in New York. A makes a VoIP call to B. The media for these calls is routed from A, over some kind of VPN solution to the foo.com data center in CA where the VPN server sits. The media then goes right back into another tunnel, to B, in New York. The media, as a result, has done a round trip through the US, just to go across the street. That adds substantial latency, increases loss probabilities, and costs a lot for the provider. Since media comes in and goes back out, for whatever the number of erlangs the provider is trying to handle, they need TWICE that in access bandwidth in their data center. If the media never goes through this VPN server, they need only the bandwidth to support signaling. The cost differences between these are astounding. Lets say the provider wants to handle a modest 4 calls a second. With signaling alone, assuming maybe 2kB worth of SIP messages per call, thats 64 kbps. No problem. With media, lets assume a 3 minute call hold time. At 4 calls per second, thats 720 erlangs. Lets assume G.711 plus RTP overheads, which is 80kbps. You need to support that much in each direction, but each direction goes in and out of the provider network. Thats 115 Mbps in each direction! Thats 1800 TIMES as much bandwidth needed. I don't know about you, but my customers are not itching to pay for the access bandwidth for that, the switches, the operating expenses, and so on, which very much add up. Another way to think about it is this; the IP network is designed to figure out the shortest route between A and B. By using VPN solutions, you are inserting additional hops that can result in seriously non-optimal routing. > > 2. what is the benefit of developing new/additional approaches > for secure tunneling when there are existing standards in place > for this (e.g. IPsec)? From Jonathan's e-mail, it would seem that > the answer to this is 'no'. Is there a concensus around this > (I understand there is a philosophical debate underway on this but my > interest is in the technical issues)? > There are at least a few reasons why one might want a new solution for this kind of tunneling (since it is, alas, needed for symmetric cases). I outline these in the TURN draft, but here they are repeated: o RSIP and the VPN solutions all allocate an entire IP address to the client. This means the provider must have sufficient IP addresses for all the clients which would simultaneously need service. This could require significant address space. With this proposal, its an IP address/port thats allocated, which means very few IP addresses are needed. This is the standard NAT argument. o RSIP and VPN solutions all require tunneling. In this proposal, there is no tunneling. The result is more efficient bandwidth usage, which is important for media packets (RTP is a likely user of this mechanism). o RSIP and VPN solutions might contradict enterprise firewall policy, allowing people to run servers, to use UDP when only TCP is allowed, and so on. Some would consider this a feature, not a drawback. But, if the goal is consistency with IT established policies, it is a drawback. Our proposal provides a simple, minimalistic functionality that is consistent with enterprise policy. The only feature TURN adds, is the ability of a user behind the firewall/NAT to receive a single incoming connection, which it has previously requested. I am still on the fence, but here is at least a start on some reasons to do it. Thanks, Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 04:27:21 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA23100 for ; Sat, 17 Nov 2001 04:27:21 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id EAA11561 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 04:27:22 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA11464; Sat, 17 Nov 2001 04:22:01 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA11433 for ; Sat, 17 Nov 2001 04:22:00 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA23057 for ; Sat, 17 Nov 2001 04:21:58 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAH9K8CJ012890; Sat, 17 Nov 2001 04:20:08 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Sat, 17 Nov 2001 04:21:30 -0500 Message-ID: From: Jonathan Rosenberg To: "'Bob Penfield'" , midcom Subject: RE: [midcom] STUN/TURN missing/colliding attribute types Date: Sat, 17 Nov 2001 04:21:29 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain; charset="iso-8859-1" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org > -----Original Message----- > From: Bob Penfield [mailto:bpenfield@acmepacket.com] > Sent: Friday, November 16, 2001 9:33 AM > To: midcom > Subject: [midcom] STUN/TURN missing/colliding attribute types > > > The TURN draft says that STUN and TURN can be used together. > However, there > is an overlap in the Message Attribute types in the STUN and > TURN drafts. > The TURN proposal re-uses type 0x0004 for CHALLENGE. It is > SOURCE-ADDRESS in > STUN. > > The STUN proposal names 5 attributes, but section 10.2 list > only types 1 > thru 4. What type is CHANGED-ADDRESS? To quote the great Homer Simpson "Doh!". Here is the right table: 0x0001: MAPPED-ADDRESS 0x0002: RESPONSE-ADDRESS 0x0003: FLAGS 0x0004: SOURCE-ADDRESS 0x0005: CHANGED-ADDRESS 0x0006: CHALLENGE 0x0007: AUTHENTICATION 0x0008: LIFETIME 0x0009: ALTERNATE-SERVER Thanks, Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 04:35:42 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA23153 for ; Sat, 17 Nov 2001 04:35:41 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id EAA11997 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 04:35:43 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA11518; Sat, 17 Nov 2001 04:24:41 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA11489 for ; Sat, 17 Nov 2001 04:24:39 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA23068 for ; Sat, 17 Nov 2001 04:24:37 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAH9MiCJ012900; Sat, 17 Nov 2001 04:22:45 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Sat, 17 Nov 2001 04:24:06 -0500 Message-ID: From: Jonathan Rosenberg To: "'Francois Audet'" , Jonathan Rosenberg , "'midcom@ietf.org'" Subject: RE: [midcom] new I-D on "symmetric STUN" Date: Sat, 17 Nov 2001 04:24:05 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain; charset="iso-8859-1" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org -----Original Message----- From: Francois Audet [mailto:audet@nortelnetworks.com] Sent: Thursday, November 15, 2001 8:38 PM To: 'Jonathan Rosenberg'; 'midcom@ietf.org' Subject: RE: [midcom] new I-D on "symmetric STUN" >Jonathan, >I believe that in your Figure 2, message (4), the port number for the mapped address >should be "1124" and not "1123". Yup. Thanks. -Jonathan R. > -----Original Message----- > From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com] > Sent: Wednesday, November 14, 2001 12:34 > To: 'midcom@ietf.org' > Subject: [midcom] new I-D on "symmetric STUN" > > > Folks, > > I've talked in the past about the fact that STUN used to have > a bit about > handling the symmetric case, but that we yanked it out since its > sufficiently orthonogonal (and a fairly crowded space). I've > just submitted > an I-D that documents that piece of the solution. Its a very simple > mechanism, more or less the same as STUN, which uses a relay > server. The > protocol is called "Traversal Using Relay NAT" or TURN. Until > it appears in > the archives, you can pick up a copy at: > > http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt > > Thanks, > Jonathan R. > > --- > Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. > Chief Scientist First Floor > dynamicsoft East Hanover, NJ 07936 > jdrosen@dynamicsoft.com FAX: (973) 952-5050 > http://www.jdrosen.net PHONE: (973) 952-5000 > http://www.dynamicsoft.com > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom > --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 08:44:58 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA24656 for ; Sat, 17 Nov 2001 08:44:57 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id IAA15997 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 08:44:59 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA15916; Sat, 17 Nov 2001 08:33:06 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA15846 for ; Sat, 17 Nov 2001 08:33:02 -0500 (EST) Received: from radvpost.us.radvision.com ([38.150.216.6]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA24596 for ; Sat, 17 Nov 2001 08:33:00 -0500 (EST) Received: by RADVPOST with Internet Mail Service (5.5.2650.21) id ; Sat, 17 Nov 2001 08:31:56 -0500 Message-ID: <0D5BBF5D638DD4119E3400508BD949459ED6B9@RADVPOST> From: Orit Levin To: "'midcom@ietf.org'" Cc: "'Jonathan Rosenberg'" , Steve Davies Subject: RE: [midcom] new I-D on "symmetric STUN" Date: Sat, 17 Nov 2001 08:31:55 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2650.21) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C16F6C.396B9EF0" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C16F6C.396B9EF0 Content-Type: text/plain; charset="iso-8859-1" Closely following the latest developments on this arena, I also was amused (and pleased) by the latest TURN of the events. Without bothering with the syntax of the both proposals, I could see that TURN technique is a (central) part of the "Davies complete solution". 1. STUN suggests learning the topology and (if possible) achieving traversal without help from a proxy on the public side. 2. TURN suggests a protocol between a single entity in the private network and a server on the public side in order to pinhole the NAT "from the inside" (complying with the local security policies) and use this hole (in a strictly managed manner) to send the traffic from the public side through the public server. The single entity in the private network can be a proxy (representing many end users) if agreed with the local policies. In this case it is highly desirable to be able to use a single "hole" on behalf of these many users. Note, that it doesn't make this solution tunneling or VPN. 4. Davies proposal builds around this basic "pinholing technique" an added feature: if the server in the private network is installed (for the reason explained above), it talks to the public server (using Davies protocol) in order to agree on a single hole for all the transferred streams. 5. At this stage of the solution, having two servers talking to each other on both sides of the firewall/NAT, it is tempting to add additional tunneling/VPN solution for the "signaling part" of the story. It is more secure (because it is closer to a real VPN) and in some situations would be the only working solution. It doesn't necessarily mean that there is a need for additional standardization for this case. I see a problem with current Davies proposal in a sense that it bundles all the steps above tightly together. On the other hand, Davies solution successfully uses the exact technique presented in TURN for a couple of years now. Moreover, there are additional proprietary implementations in the market that have been inspired by NAT behavior and RSIP efforts and are using the same idea, documented in TURN. I believe, that we need to integrate the theory with the practical experience in a single TURN protocol including functionality (4) above. It improves the solution a lot. In terms of security, you will not install a server in your private network if your policy doesn't allow for it. I would like to hear from Steve Davies whether my understanding is correct and what additional flows the current TURN may have. Also, it may be very helpful to publish the expanded Davies solution (and other solutions) as a common practice documents so that the community would better understand existing techniques with their pros and cons. Orit Levin Chief Architect RADVISION Inc. TEL: +1.201.529.4300 x 230 FAX: +1.201.529.3516 -----Original Message----- From: Steve Davies [mailto:sdavies@ridgewaysystems.com] Sent: Thursday, November 15, 2001 4:42 PM To: 'Jonathan Rosenberg'; 'midcom@ietf.org' Subject: RE: [midcom] new I-D on "symmetric STUN" Interesting TURN of events or should I say 'U TURN'. Puns aside, this proposal says nothing that hasn't already been proposed. While I am pleased to see TURN uses IDENTICAL concepts to the Davies proposal, it contains many flaws (too numerous to go into here). Fix those flaws and you end up with the Davies proposal. Not only does TURN come a month after the deadline set in Melinda's rules of engagement, but the development of such a new and immature proposal is by definition not in the best interests of a pre-midcom solution. If we agree on the concepts and Jonathan et al are interested in a quick solution, then surely it makes sense to jointly work on the most mature incarnation of those concepts. Why re-invent the wheel? Steve -----Original Message----- From: Jonathan Rosenberg [ mailto:jdrosen@dynamicsoft.com ] Sent: 14 November 2001 20:34 To: 'midcom@ietf.org' Subject: [midcom] new I-D on "symmetric STUN" Folks, I've talked in the past about the fact that STUN used to have a bit about handling the symmetric case, but that we yanked it out since its sufficiently orthonogonal (and a fairly crowded space). I've just submitted an I-D that documents that piece of the solution. Its a very simple mechanism, more or less the same as STUN, which uses a relay server. The protocol is called "Traversal Using Relay NAT" or TURN. Until it appears in the archives, you can pick up a copy at: http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt Thanks, Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom ------_=_NextPart_001_01C16F6C.396B9EF0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] new I-D on "symmetric STUN"

C= losely following the latest developments on this arena, I also was amused (and pleased) by the latest TURN of the = events.

W= ithout bothering with the syntax of the both proposals, I could see that TURN technique is a (central) part of the “Davies complete = solution”.

1= . STUN suggests learning the topology and (if possible) achieving traversal = without help from a proxy on the public = side.

2= . TURN suggests a protocol between a single entity in the private network and = a server on the public side in order to pinhole the NAT “from the = inside” (complying with the local security policies) and use this hole (in a strictly = managed manner) to send the traffic from the public side through the public = server.

T= he single entity in the private network can be a proxy (representing many end = users) if agreed with the local policies. In this case it is highly desirable to = be able to use a single “hole” on behalf of these many users. Note, = that it doesn’t make this solution tunneling or VPN. =

4= . Davies proposal builds around this basic “pinholing technique” an = added feature: if the server in the private network is installed (for the reason = explained above), it talks to the public server (using Davies protocol) in order = to agree on a single hole for all the transferred = streams.

5= . At this stage of the solution, having two servers talking to each other on both = sides of the firewall/NAT, it is tempting to add additional tunneling/VPN = solution for the “signaling part” of the story. It is more secure = (because it is closer to a real VPN) and in some situations would be the only working = solution. It doesn’t necessarily mean that there is a need for additional = standardization for this case.

<= ![if = !supportEmptyParas]> 

=

I= see a problem with current Davies proposal in a sense that it bundles all the = steps above tightly together. On the other hand, Davies solution successfully = uses the exact technique presented in TURN for a couple of years now. = Moreover, there are additional proprietary implementations in the market that = have been inspired by NAT behavior and RSIP efforts and are using the same idea, documented in TURN.

<= ![if = !supportEmptyParas]> 

=

I= believe, that we need to integrate the theory with the practical experience in a = single TURN protocol including functionality (4) above. It improves the = solution a lot. In terms of security, you will not install a server in your private = network if your policy doesn’t allow for = it.

I= would like to hear from Steve Davies whether my understanding is correct and = what additional flows the current TURN may have. =

<= ![if = !supportEmptyParas]> 

=

A= lso, it may be very helpful to publish the expanded Davies solution (and other solutions) as a common practice documents so that the community would = better understand existing techniques with their pros and = cons.

<= ![if = !supportEmptyParas]> 

=

Orit Levin<= /p>

Chief = Architect<= /p>

RADVISION Inc.<= /p>

TEL: +1.201.529.4300 x = 230<= /p>

FAX: = +1.201.529.3516<= /p>

=  

=

-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: Thursday, November = 15, 2001 4:42 PM
To: 'Jonathan = Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] = new I-D on "symmetric STUN"
<= /p>

 <= /p>

Interesting TURN of events or = should I say 'U TURN'.

Puns aside, this proposal says = nothing that hasn't already been proposed. While I am pleased to see TURN uses IDENTICAL concepts to the Davies proposal, it contains many flaws (too = numerous to go into here). Fix those flaws and you end up with the Davies = proposal. Not only does TURN come a month after the deadline set in Melinda's rules = of engagement, but the development of such a new and immature proposal is = by definition not in the best interests of a pre-midcom solution. If we = agree on the concepts and Jonathan et al are interested in a quick solution, = then surely it makes sense to jointly work on the most mature incarnation of those concepts. Why re-invent the wheel?<= /p>

Steve <= /p>

-----Original = Message-----
From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com]
Sent: 14 November 2001 20:34
To: 'midcom@ietf.org'
Subject: [midcom] new I-D on "symmetric = STUN" <= /p>

 <= /p>

Folks,

I've talked in the past about = the fact that STUN used to have a bit about
handling the symmetric case, but that we yanked it out = since its
sufficiently orthonogonal (and a fairly crowded space). = I've just submitted =
an I-D that documents that piece of the solution. Its a = very simple =
mechanism, more or less the same as STUN, which uses a = relay server. The
protocol is called "Traversal Using Relay NAT" = or TURN. Until it appears in
the archives, you can pick up a copy = at: <= /p>

http://www.jdrosen.net/papers/draft-rosenberg-midcom-t= urn-00.txt <= /p>

Thanks,
Jonathan R.

---
Jonathan D. Rosenberg, Ph.D.           &= nbsp;    72 Eagle Rock Ave.
Chief Scientist          &nb= sp;           &nb= sp;      First Floor
dynamicsoft        =             =             = East Hanover, NJ 07936
jdrosen@dynamicsoft.com      =             =    FAX:   (973) 952-5050
http://www.jdrosen.net    &nbs= p;           &nbs= p;     PHONE: (973) 952-5000
http://www.dynamicsoft.com
  <= /p>

_________________________________= ______________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom <= /p>

------_=_NextPart_001_01C16F6C.396B9EF0-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 11:17:24 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA26858 for ; Sat, 17 Nov 2001 11:17:24 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA19469 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 11:17:25 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA19395; Sat, 17 Nov 2001 11:13:48 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA19367 for ; Sat, 17 Nov 2001 11:13:47 -0500 (EST) Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA26799 for ; Sat, 17 Nov 2001 11:13:44 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fAHGDHl00182 for ; Sat, 17 Nov 2001 08:13:17 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABZ08852; Sat, 17 Nov 2001 08:12:49 -0800 (PST) Message-Id: <5.1.0.14.0.20011117111028.00a3f750@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Sat, 17 Nov 2001 11:15:49 -0500 To: midcom@ietf.org From: Melinda Shore Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: [midcom] Minor agenda revision Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org I am adding the Rosenberg TURN draft to the list of drafts to read in preparation for the SLC meeting. I realize that this draft was prepared well after the deadline for submission of pre-midcom candidates, but 1) it's already under discussion on the mailing list, 2) I had been under the (mis)impression that the charter revision had been accepted by the IAB and that we were clear to move the work forward quickly, and 3) most importantly, we must not allow procedural rigidity to prevent us from doing thorough technical work. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 12:50:13 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA28014 for ; Sat, 17 Nov 2001 12:50:13 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA21452 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 12:50:14 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA21343; Sat, 17 Nov 2001 12:37:39 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA21312 for ; Sat, 17 Nov 2001 12:37:33 -0500 (EST) Received: from protactinium (protactinium.btinternet.com [194.73.73.176]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA27909 for ; Sat, 17 Nov 2001 12:37:26 -0500 (EST) Received: from [213.122.43.55] (helo=tkw) by protactinium with smtp (Exim 3.22 #6) id 1659P7-0004qR-00; Sat, 17 Nov 2001 17:37:22 +0000 Message-ID: <005c01c16f8e$77fea1e0$0200000a@tkw> From: "Pete Cordell" To: "Jonathan Rosenberg" , "'Meyer, Greg W'" , "Steve Davies" , "'Bob Penfield'" , "'midcom'" , "Melinda Shore" References: Subject: Re: [midcom] pre-midcom candidates Date: Sat, 17 Nov 2001 17:26:51 -0000 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit ----- Original Message ----- From: Jonathan Rosenberg To: 'Meyer, Greg W' ; 'Pete Cordell' ; Steve Davies ; 'Bob Penfield' ; 'midcom' ; Melinda Shore Sent: 17 November 2001 08:56 Subject: RE: [midcom] pre-midcom candidates > > > > > > -----Original Message----- > > From: Meyer, Greg W [mailto:greg.w.meyer@intel.com] > > Sent: Tuesday, November 13, 2001 8:57 PM > > To: 'Pete Cordell'; Steve Davies; 'Bob Penfield'; 'midcom'; Melinda > > Shore > > Subject: RE: [midcom] pre-midcom candidates > > > > > > I agree with Pete; I would favor a solution that addresses > > both firewall and > > NAT. The trade-offs Jonathan raise about the Davies approach are very > > acceptable given pre-midcom is temporary (until midcom is > > deployed). Any > > short-term solution that doesn't account for today's most > > deployed networks > > simply defeats the purpose. > > I just posted a note with far more details, but there is a really, really, > really important point that needs to be made here. > > "addressing the firewall" CANNOT MEAN VIOLATING ENTERPRISE FIREWALL POLICY. > PERIOD. Even if this group chose to do that, I sincerely doubt that the IESG > would approve a protocol that would allow a client to bypass the firewall's > policy, unless this draft was an April Fools rfc (and there is one). > > So, if the firewall disallows outbound UDP, sorry, no VoIP. I wish it wasn't > so, but thats the policy. I am sure people will deploy hacks to get around > this, and those hacks will be countered by smarter firewalls, and the game > will continue. At IETF, we develop protocols that are good for the Internet, > not protocols that are convenient for getting around annoying policies that > prevent us from making money. I fully realize that this is a tough pill to > swallow, especially these days, but I think thats the truth here. > > Thanks, > Jonathan R. > > --- > Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. > Chief Scientist First Floor > dynamicsoft East Hanover, NJ 07936 > jdrosen@dynamicsoft.com FAX: (973) 952-5050 > http://www.jdrosen.net PHONE: (973) 952-5000 > http://www.dynamicsoft.com Agreed, and that's what the draft says. Pete. ============================================= Pete Cordell Tech-Know-Ware pete@tech-know-ware.com +44 1473 635863 ============================================= _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 19:37:37 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA01008 for ; Sat, 17 Nov 2001 19:37:37 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id TAA28194 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 19:37:37 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA28137; Sat, 17 Nov 2001 19:35:39 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA28109 for ; Sat, 17 Nov 2001 19:35:36 -0500 (EST) Received: from gull.prod.itd.earthlink.net (gull.mail.pas.earthlink.net [207.217.120.84]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA00985 for ; Sat, 17 Nov 2001 19:35:35 -0500 (EST) Received: from pool0851.cvx19-bradley.dialup.earthlink.net ([209.179.247.86] helo=saqibj) by gull.prod.itd.earthlink.net with smtp (Exim 3.33 #1) id 165Fve-0007Ir-00; Sat, 17 Nov 2001 16:35:22 -0800 Message-ID: <001d01c16fc9$c6d2d4e0$56f7b3d1@vip.best.com> Reply-To: "Saqib Jang" From: "Saqib Jang" To: "Jonathan Rosenberg" , "'Meyer, Greg W'" , "'Pete Cordell'" , "Steve Davies" , "'Bob Penfield'" , "'midcom'" , "Melinda Shore" References: Subject: Re: [midcom] pre-midcom candidates Date: Sat, 17 Nov 2001 16:41:26 -0800 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2615.200 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2615.200 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit > "addressing the firewall" CANNOT MEAN VIOLATING ENTERPRISE FIREWALL POLICY. > PERIOD. Even if this group chose to do that, I sincerely doubt that the IESG > would approve a protocol that would allow a client to bypass the firewall's > policy, unless this draft was an April Fools rfc (and there is one). > > So, if the firewall disallows outbound UDP, sorry, no VoIP. I wish it wasn't > so, but thats the policy. I am sure people will deploy hacks to get around > this, and those hacks will be countered by smarter firewalls, and the game > will continue. At IETF, we develop protocols that are good for the Internet, > not protocols that are convenient for getting around annoying policies that > prevent us from making money. I fully realize that this is a tough pill to > swallow, especially these days, but I think thats the truth here. This seems a rather broad generalization. A firewall is one component of an enterprises' security policy. For example, an enterprise may choose to use a VPN set-up in conjunction with a firewall to allow secure firewall traversal of specific protocols to specific external endpoints. even though the firewall may disallow generalized use of such protocols. I the goal has to be to allow enterprises the flexibility in building thier security policy through the use of firewalls and VPNs versus trying to restrict their ability for security policy management to only firewalls. ----- Original Message ----- From: Jonathan Rosenberg To: 'Meyer, Greg W' ; 'Pete Cordell' ; Steve Davies ; 'Bob Penfield' ; 'midcom' ; Melinda Shore Sent: Saturday, November 17, 2001 12:56 AM Subject: RE: [midcom] pre-midcom candidates > > > > > > -----Original Message----- > > From: Meyer, Greg W [mailto:greg.w.meyer@intel.com] > > Sent: Tuesday, November 13, 2001 8:57 PM > > To: 'Pete Cordell'; Steve Davies; 'Bob Penfield'; 'midcom'; Melinda > > Shore > > Subject: RE: [midcom] pre-midcom candidates > > > > > > I agree with Pete; I would favor a solution that addresses > > both firewall and > > NAT. The trade-offs Jonathan raise about the Davies approach are very > > acceptable given pre-midcom is temporary (until midcom is > > deployed). Any > > short-term solution that doesn't account for today's most > > deployed networks > > simply defeats the purpose. > > I just posted a note with far more details, but there is a really, really, > really important point that needs to be made here. > > "addressing the firewall" CANNOT MEAN VIOLATING ENTERPRISE FIREWALL POLICY. > PERIOD. Even if this group chose to do that, I sincerely doubt that the IESG > would approve a protocol that would allow a client to bypass the firewall's > policy, unless this draft was an April Fools rfc (and there is one). > > So, if the firewall disallows outbound UDP, sorry, no VoIP. I wish it wasn't > so, but thats the policy. I am sure people will deploy hacks to get around > this, and those hacks will be countered by smarter firewalls, and the game > will continue. At IETF, we develop protocols that are good for the Internet, > not protocols that are convenient for getting around annoying policies that > prevent us from making money. I fully realize that this is a tough pill to > swallow, especially these days, but I think thats the truth here. > > Thanks, > Jonathan R. > > --- > Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. > Chief Scientist First Floor > dynamicsoft East Hanover, NJ 07936 > jdrosen@dynamicsoft.com FAX: (973) 952-5050 > http://www.jdrosen.net PHONE: (973) 952-5000 > http://www.dynamicsoft.com > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom > _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 19:52:56 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA01154 for ; Sat, 17 Nov 2001 19:52:56 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id TAA28380 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 19:52:56 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA28332; Sat, 17 Nov 2001 19:51:34 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA28301 for ; Sat, 17 Nov 2001 19:51:33 -0500 (EST) Received: from gull.prod.itd.earthlink.net (gull.mail.pas.earthlink.net [207.217.120.84]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA01139 for ; Sat, 17 Nov 2001 19:51:31 -0500 (EST) Received: from pool0851.cvx19-bradley.dialup.earthlink.net ([209.179.247.86] helo=saqibj) by gull.prod.itd.earthlink.net with smtp (Exim 3.33 #1) id 165GBC-0006IH-00; Sat, 17 Nov 2001 16:51:27 -0800 Message-ID: <002301c16fcc$05a38aa0$56f7b3d1@vip.best.com> Reply-To: "Saqib Jang" From: "Saqib Jang" To: "Jonathan Rosenberg" , "'James Ho'" , , References: Subject: Re: [midcom] pre-midcom candidates Date: Sat, 17 Nov 2001 16:57:38 -0800 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2615.200 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2615.200 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit > It has nothing to do with processing speed at the intermediary. The problem > is the painfully slow speed of light. Consider two users, A and B, who sign > up for service with a provider foo.com. Foo has a data center in California. > Foo has no idea where its customers physically reside when they make calls. > In fact, foo may not even know the mailing address for its customers. Now, > it so happens that A and B are in New York. A makes a VoIP call to B. The > media for these calls is routed from A, over some kind of VPN solution to > the foo.com data center in CA where the VPN server sits. The media then goes > right back into another tunnel, to B, in New York. The media, as a result, > has done a round trip through the US, just to go across the street. That > adds substantial latency, increases loss probabilities, and costs a lot for > the provider. Since media comes in and goes back out, for whatever the > number of erlangs the provider is trying to handle, they need TWICE that in > access bandwidth in their data center. If the media never goes through this > VPN server, they need only the bandwidth to support signaling. > > The cost differences between these are astounding. Lets say the provider > wants to handle a modest 4 calls a second. With signaling alone, assuming > maybe 2kB worth of SIP messages per call, thats 64 kbps. No problem. With > media, lets assume a 3 minute call hold time. At 4 calls per second, thats > 720 erlangs. Lets assume G.711 plus RTP overheads, which is 80kbps. You need > to support that much in each direction, but each direction goes in and out > of the provider network. Thats 115 Mbps in each direction! Thats 1800 TIMES > as much bandwidth needed. I don't know about you, but my customers are not > itching to pay for the access bandwidth for that, the switches, the > operating expenses, and so on, which very much add up. > > Another way to think about it is this; the IP network is designed to figure > out the shortest route between A and B. By using VPN solutions, you are > inserting additional hops that can result in seriously non-optimal routing. The above discussion assumes a completely centralized model of service delivery which will not always be the desireable case. The typical model of delivery of business-grade IP services is to distribute intelligence to the network edge (for QoS, per-subscriber management, etc) versus one centralized instance of the service delivery platform. Meaning that VPN end points could be distributed to PoPs across the network in which case the latency issues described above would not be relevant. For example, tthe model distributed model is being followed by all/most SPs undertaking deployment of managed VPN services. Saqib > o RSIP and VPN solutions might contradict enterprise firewall > policy, allowing people to run servers, to use UDP when only > TCP is allowed, and so on. Some would consider this a feature, > not a drawback. But, if the goal is consistency with IT > established policies, it is a drawback. Our proposal provides > a simple, minimalistic functionality that is consistent with > enterprise policy. The only feature TURN adds, is the ability > of a user behind the firewall/NAT to receive a single incoming > connection, which it has previously requested. As I mentioned in an earlier e-mail, standards-based VPN solutions are (in addition to firewalls) an important component of an enterprises security policy and could be used to allow secure firewall traversal of specific protocols to specific external endpoints. Enabling an enterprise to make such a choice through deploying a VPN set-up (in addition to a firewall) if it deems it acceptacle in view of its security policy is viewed positively. I see generalizations such as the above to be questioning the rationale for standards such as tunnel-mode IPsec which I don't this working group wants to get into. Saqib ----- Original Message ----- From: Jonathan Rosenberg To: 'James Ho' ; Jonathan Rosenberg ; ; Sent: Saturday, November 17, 2001 1:13 AM Subject: RE: [midcom] pre-midcom candidates > > > > > > -----Original Message----- > > From: James Ho [mailto:jamesho37@hotmail.com] > > Sent: Thursday, November 15, 2001 2:08 PM > > To: jdrosen@dynamicsoft.com; mshore@cisco.com; midcom@ietf.org > > Subject: RE: [midcom] pre-midcom candidates > > > > > > Two issues pertaining to the pre-midcom work that I still don't > > have clarity around. > > > > 1. What are the specific latency/peformance issues associated with > > tunnelling/VPN appraoches? While admitedly there is another device > > in the picture, as I mentioned before, there are available/evolving > > hw solutions for integrate wire-speed IPsec processing > > enabling tunnel de/encapsulation at wire-speeds, so theoretically > > this should not be an issue. > > It has nothing to do with processing speed at the intermediary. The problem > is the painfully slow speed of light. Consider two users, A and B, who sign > up for service with a provider foo.com. Foo has a data center in California. > Foo has no idea where its customers physically reside when they make calls. > In fact, foo may not even know the mailing address for its customers. Now, > it so happens that A and B are in New York. A makes a VoIP call to B. The > media for these calls is routed from A, over some kind of VPN solution to > the foo.com data center in CA where the VPN server sits. The media then goes > right back into another tunnel, to B, in New York. The media, as a result, > has done a round trip through the US, just to go across the street. That > adds substantial latency, increases loss probabilities, and costs a lot for > the provider. Since media comes in and goes back out, for whatever the > number of erlangs the provider is trying to handle, they need TWICE that in > access bandwidth in their data center. If the media never goes through this > VPN server, they need only the bandwidth to support signaling. > > The cost differences between these are astounding. Lets say the provider > wants to handle a modest 4 calls a second. With signaling alone, assuming > maybe 2kB worth of SIP messages per call, thats 64 kbps. No problem. With > media, lets assume a 3 minute call hold time. At 4 calls per second, thats > 720 erlangs. Lets assume G.711 plus RTP overheads, which is 80kbps. You need > to support that much in each direction, but each direction goes in and out > of the provider network. Thats 115 Mbps in each direction! Thats 1800 TIMES > as much bandwidth needed. I don't know about you, but my customers are not > itching to pay for the access bandwidth for that, the switches, the > operating expenses, and so on, which very much add up. > > Another way to think about it is this; the IP network is designed to figure > out the shortest route between A and B. By using VPN solutions, you are > inserting additional hops that can result in seriously non-optimal routing. > > > > > > 2. what is the benefit of developing new/additional approaches > > for secure tunneling when there are existing standards in place > > for this (e.g. IPsec)? From Jonathan's e-mail, it would seem that > > the answer to this is 'no'. Is there a concensus around this > > (I understand there is a philosophical debate underway on this but my > > interest is in the technical issues)? > > > > There are at least a few reasons why one might want a new solution for this > kind of tunneling (since it is, alas, needed for symmetric cases). I outline > these in the TURN draft, but here they are repeated: > > o RSIP and the VPN solutions all allocate an entire IP address > to the client. This means the provider must have sufficient IP > addresses for all the clients which would simultaneously need > service. This could require significant address space. With > this proposal, its an IP address/port thats allocated, which > means very few IP addresses are needed. This is the standard > NAT argument. > > o RSIP and VPN solutions all require tunneling. In this > proposal, there is no tunneling. The result is more efficient > bandwidth usage, which is important for media packets (RTP is > a likely user of this mechanism). > > o RSIP and VPN solutions might contradict enterprise firewall > policy, allowing people to run servers, to use UDP when only > TCP is allowed, and so on. Some would consider this a feature, > not a drawback. But, if the goal is consistency with IT > established policies, it is a drawback. Our proposal provides > a simple, minimalistic functionality that is consistent with > enterprise policy. The only feature TURN adds, is the ability > of a user behind the firewall/NAT to receive a single incoming > connection, which it has previously requested. > > > I am still on the fence, but here is at least a start on some reasons to do > it. > > Thanks, > Jonathan R. > > --- > Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. > Chief Scientist First Floor > dynamicsoft East Hanover, NJ 07936 > jdrosen@dynamicsoft.com FAX: (973) 952-5050 > http://www.jdrosen.net PHONE: (973) 952-5000 > http://www.dynamicsoft.com > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom > _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 23:39:30 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05158 for ; Sat, 17 Nov 2001 23:39:29 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id XAA03339 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 23:39:33 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA03260; Sat, 17 Nov 2001 23:38:11 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA03224 for ; Sat, 17 Nov 2001 23:38:09 -0500 (EST) Received: from pallas.host4u.net (pallas.host4u.net [216.71.64.48]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05140; Sat, 17 Nov 2001 23:38:05 -0500 (EST) Received: from C1380748B (c1380748-b.snvl1.sfba.home.com [65.11.102.112]) by pallas.host4u.net (8.11.6/8.11.6) with SMTP id fAI4bYA01855; Sat, 17 Nov 2001 22:37:34 -0600 From: "Shai Mohaban" To: "Jonathan Rosenberg" , Cc: Subject: RE: [midcom] New I-D on SIP NAT and Firewall Scenarios and Solutions Date: Sat, 17 Nov 2001 20:36:17 -0800 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0) Importance: Normal X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700 In-Reply-To: Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Jonathan, I find this nice and simple for a change...:-) One comment regarding the security considerations (section 11). You are saying: "TURN has the important property that compromise of the TURN servers cannot cause security breaches when the client is within an enterprise." and I am not sure this is true. Correct me if I am wrong but it seems that a malicious TURN server can decide to send to the client any traffic it likes as long as it is coming from the mapped address and port. More than that, the server can decide when a "call" (or whatever the data stream stands for) starts and ends and can fake "calls" in general (one at a time, though), including their content... I guess we should at least add that authenticating the server is highly recommended... > -----Original Message----- > From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On > Behalf Of Jonathan Rosenberg > Sent: Friday, November 16, 2001 8:46 AM > To: 'sipping@ietf.org' > Cc: 'midcom@ietf.org' > Subject: [midcom] New I-D on SIP NAT and Firewall Scenarios and Solutions > > > Folks, > > Rohan Mahy, myself, and Sanjoy Sen submitted a new I-D that documents > scenarios and solutions for a whole bunch of different NAT and firewall > scenarios for SIP. It should appear in the archives shortly, but until it > does, you can pick it up at: > > http://www.jdrosen.net/papers/draft-rosenberg-sipping-nat-scenarios-00.txt > > It needs a lot more work, but should hopefully help people understand how > all of the various drafts and solutions fit together. > > Thanks, > Jonathan R. > > --- > Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. > Chief Scientist First Floor > dynamicsoft East Hanover, NJ 07936 > jdrosen@dynamicsoft.com FAX: (973) 952-5050 > http://www.jdrosen.net PHONE: (973) 952-5000 > http://www.dynamicsoft.com > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sat Nov 17 23:50:51 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05352 for ; Sat, 17 Nov 2001 23:50:51 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id XAA03474 for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 23:50:54 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA03409; Sat, 17 Nov 2001 23:44:34 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA03378 for ; Sat, 17 Nov 2001 23:44:32 -0500 (EST) Received: from pallas.host4u.net (pallas.host4u.net [216.71.64.48]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05208 for ; Sat, 17 Nov 2001 23:44:28 -0500 (EST) Received: from C1380748B (c1380748-b.snvl1.sfba.home.com [65.11.102.112]) by pallas.host4u.net (8.11.6/8.11.6) with SMTP id fAI4hxA03046 for ; Sat, 17 Nov 2001 22:43:59 -0600 From: "Shai Mohaban" To: Date: Sat, 17 Nov 2001 20:42:42 -0800 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0) Importance: Normal X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700 Content-Transfer-Encoding: 7bit Subject: [midcom] NAT traversal in IPSEC Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Does anyone follow the related work in the IPSEC WG? It seems that some IDs there are dealing with similar issues: http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-reqts-00.txt http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-t-ike-01.txt http://www.ietf.org/internet-drafts/draft-ietf-ipsec-udp-encaps-justificatio n-00.txt Hope we are not trying to duplicate any of the work... _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sun Nov 18 10:02:07 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA25323 for ; Sun, 18 Nov 2001 10:02:07 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id KAA20885 for midcom-archive@odin.ietf.org; Sun, 18 Nov 2001 10:02:11 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA20510; Sun, 18 Nov 2001 09:58:10 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA20481 for ; Sun, 18 Nov 2001 09:58:08 -0500 (EST) Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA25217 for ; Sun, 18 Nov 2001 09:58:04 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fAIEval15813; Sun, 18 Nov 2001 06:57:36 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABZ14239; Sun, 18 Nov 2001 06:57:08 -0800 (PST) Message-Id: <5.1.0.14.0.20011118095812.00a53da0@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Sun, 18 Nov 2001 10:00:09 -0500 To: "Shai Mohaban" , From: Melinda Shore Subject: Re: [midcom] NAT traversal in IPSEC In-Reply-To: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 08:42 PM 11/17/01 -0800, Shai Mohaban wrote: >Does anyone follow the related work in the IPSEC WG? It seems that some IDs >there are dealing with similar issues: >http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-reqts-00.txt >http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-t-ike-01.txt >http://www.ietf.org/internet-drafts/draft-ietf-ipsec-udp-encaps-justificatio >n-00.txt They're dealing with a different set of problems - it's not that they don't know where to send the traffic, it's that header rewrites break the HMAC. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sun Nov 18 17:50:59 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA29484 for ; Sun, 18 Nov 2001 17:50:59 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA28303 for midcom-archive@odin.ietf.org; Sun, 18 Nov 2001 17:51:04 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28139; Sun, 18 Nov 2001 17:49:33 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28108 for ; Sun, 18 Nov 2001 17:49:31 -0500 (EST) Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA29447 for ; Sun, 18 Nov 2001 17:49:25 -0500 (EST) Received: from airborne.cisco.com (airborne.cisco.com [171.71.154.32]) by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fAIMmxE11060 for ; Sun, 18 Nov 2001 14:48:59 -0800 (PST) Received: from SBRIM-W2K (sjc-vpn2-593.cisco.com [10.21.114.81]) by airborne.cisco.com (Mirapoint) with SMTP id AAF21415; Sun, 18 Nov 2001 14:48:55 -0800 (PST) Received: by SBRIM-W2K (sSMTP sendmail emulation); Sun, 18 Nov 2001 17:48:58 -0500 Date: Sun, 18 Nov 2001 17:48:58 -0500 From: Scott Brim To: midcom@ietf.org Subject: Re: [midcom] Minor agenda revision Message-ID: <20011118174858.C1544@SBRIM-W2K> Mail-Followup-To: Scott Brim , midcom@ietf.org References: <5.1.0.14.0.20011117111028.00a3f750@localhost> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: <5.1.0.14.0.20011117111028.00a3f750@localhost>; from mshore@cisco.com on Sat, Nov 17, 2001 at 11:15:49AM -0500 Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org On Sat, Nov 17, 2001 11:15:49AM -0500, Melinda Shore wrote: > I am adding the Rosenberg TURN draft to the list of drafts > to read in preparation for the SLC meeting. I realize that > this draft was prepared well after the deadline for submission > of pre-midcom candidates, but 1) it's already under discussion > on the mailing list, 2) I had been under the (mis)impression > that the charter revision had been accepted by the IAB and > that we were clear to move the work forward quickly, and 3) > most importantly, we must not allow procedural rigidity to > prevent us from doing thorough technical work. I can't find the charter revision. Pointers? _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sun Nov 18 18:08:41 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA29639 for ; Sun, 18 Nov 2001 18:08:41 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id SAA29116 for midcom-archive@odin.ietf.org; Sun, 18 Nov 2001 18:08:46 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA28923; Sun, 18 Nov 2001 18:01:52 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA28892 for ; Sun, 18 Nov 2001 18:01:50 -0500 (EST) Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA29563 for ; Sun, 18 Nov 2001 18:01:45 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fAIN1IE13869; Sun, 18 Nov 2001 15:01:18 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABZ16383; Sun, 18 Nov 2001 15:00:50 -0800 (PST) Message-Id: <5.1.0.14.0.20011118180140.00a58e80@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Sun, 18 Nov 2001 18:03:48 -0500 To: Scott Brim , midcom@ietf.org From: Melinda Shore Subject: Re: [midcom] Minor agenda revision In-Reply-To: <20011118174858.C1544@SBRIM-W2K> References: <5.1.0.14.0.20011117111028.00a3f750@localhost> <5.1.0.14.0.20011117111028.00a3f750@localhost> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 05:48 PM 11/18/01 -0500, Scott Brim wrote: >On Sat, Nov 17, 2001 11:15:49AM -0500, Melinda Shore wrote: >> I am adding the Rosenberg TURN draft to the list of drafts >> to read in preparation for the SLC meeting. I realize that >> this draft was prepared well after the deadline for submission >> of pre-midcom candidates, but 1) it's already under discussion >> on the mailing list, 2) I had been under the (mis)impression >> that the charter revision had been accepted by the IAB and >> that we were clear to move the work forward quickly, and 3) >> most importantly, we must not allow procedural rigidity to >> prevent us from doing thorough technical work. >I can't find the charter revision. Pointers? The deliverable was added to the charter but the revision was not (go figure). The text has been sent out several times, but one more time can't hurt (much): Ubiquitous deployment of midcom in all middleboxes could take many years. In the interim, a solution is needed that allows applications to operate in the presence of midcom-unaware middleboxes. To support this, the midcom group will develop or document a protocol or approach that allows clients to indirectly obtain address bindings from midcom-unaware middleboxes, through communications with server elements on the public side of the middlebox. The key goals for this effort are rapid delivery of a simple solution (since it is an interim solution), consistency with the midcom framework, and security. _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sun Nov 18 23:32:06 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA04240 for ; Sun, 18 Nov 2001 23:32:06 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id XAA07165 for midcom-archive@odin.ietf.org; Sun, 18 Nov 2001 23:31:58 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA06341; Sun, 18 Nov 2001 23:20:00 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA06288 for ; Sun, 18 Nov 2001 23:19:58 -0500 (EST) Received: from mail1.dynamicsoft.com ([63.113.40.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA03769; Sun, 18 Nov 2001 23:19:53 -0500 (EST) Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7]) by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAJ4HvCJ016667; Sun, 18 Nov 2001 23:17:57 -0500 (EST) Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id ; Sun, 18 Nov 2001 23:19:19 -0500 Message-ID: From: Jonathan Rosenberg To: "'Shai Mohaban'" , Jonathan Rosenberg , sipping@ietf.org Cc: midcom@ietf.org Subject: RE: [midcom] New I-D on SIP NAT and Firewall Scenarios and Soluti ons Date: Sun, 18 Nov 2001 23:19:11 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: text/plain; charset="iso-8859-1" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org > -----Original Message----- > From: Shai Mohaban [mailto:shai@kagoor.com] > Sent: Saturday, November 17, 2001 11:36 PM > To: Jonathan Rosenberg; sipping@ietf.org > Cc: midcom@ietf.org > Subject: RE: [midcom] New I-D on SIP NAT and Firewall Scenarios and > Solutions > > > Jonathan, > > I find this nice and simple for a change...:-) > One comment regarding the security considerations (section > 11). You are > saying: "TURN has the important property that compromise of > the TURN servers > cannot cause security breaches when the client is within an > enterprise." and > I am not sure this is true. Correct me if I am wrong but it > seems that a > malicious TURN server can decide to send to the client any > traffic it likes > as long as it is coming from the mapped address and port. Yes, thats true. What it means is that it won't be able to attack other hosts inside the enterprise. > More than that, > the server can decide when a "call" (or whatever the data > stream stands for) > starts and ends and can fake "calls" in general (one at a > time, though), > including their content... > I guess we should at least add that authenticating the server > is highly > recommended... Yeah, thats why mutual authentication is provided. -Jonathan R. --- Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Ave. Chief Scientist First Floor dynamicsoft East Hanover, NJ 07936 jdrosen@dynamicsoft.com FAX: (973) 952-5050 http://www.jdrosen.net PHONE: (973) 952-5000 http://www.dynamicsoft.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 19 00:09:17 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA04694 for ; Mon, 19 Nov 2001 00:09:16 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id AAA08470 for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 00:09:18 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA08400; Mon, 19 Nov 2001 00:07:45 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA08372 for ; Mon, 19 Nov 2001 00:07:41 -0500 (EST) Received: from mgo.iij.ad.jp (root@mgo.iij.ad.jp [202.232.15.6]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA04669 for ; Mon, 19 Nov 2001 00:07:38 -0500 (EST) Received: from ns.iij.ad.jp (ns.iij.ad.jp [192.168.2.8]) by mgo.iij.ad.jp (8.8.8/MGO1.0) with ESMTP id OAA14459; Mon, 19 Nov 2001 14:07:25 +0900 (JST) Received: from zeus (h188n005.iij.ad.jp [192.168.5.188]) by ns.iij.ad.jp (8.8.5/3.5Wpl7) with ESMTP id OAA26376; Mon, 19 Nov 2001 14:07:25 +0900 (JST) To: midcom@ietf.org Cc: nats@ml.canonet.ne.jp, nats@bugest.net From: Kuniaki Kondo Message-Id: <200111191407.FAG89993.JOLJLBV@iij.ad.jp> X-Mailer: Winbiff [Version 2.34beta3] X-Accept-Language: ja,en Date: Mon, 19 Nov 2001 14:07:25 +0900 Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Subject: [midcom] draft-kuniaki-nats-01.txt Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Hello. This is kuniaki KONDO, IIJ. I submitted new two internet-drafts. draft-kuniaki-nats-01.txt http://www.ietf.org/internet-drafts/draft-kuniaki-nats-01.txt draft-kuniaki-capsulated-nats-00.txt http://www.ietf.org/internet-drafts/draft-kuniaki-capsulated-nats-00.txt In this new draft, I would like to propose a new method which enables internet hosts to have direct access to hosts behind NAT routers using sub-addresses. Under current NAT scheme, it is impossible for internet hosts to point exact hosts behind NAT routers. This method solves the problem by incorporating hostname to sub-address resolution into DNS and enhancing NAT routers to handle this resolution. I would like to have some comments. And, I would like to explain more detail at next midcom meeting, in no more 15 minutes. Thank you. -- Kuniaki Kondo kuniaki@iij.ad.jp _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 19 03:52:00 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22632 for ; Mon, 19 Nov 2001 03:52:00 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id DAA21989 for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 03:52:01 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA21183; Mon, 19 Nov 2001 03:40:35 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA21132 for ; Mon, 19 Nov 2001 03:40:33 -0500 (EST) Received: from mgo.iij.ad.jp (root@mgo.iij.ad.jp [202.232.15.6]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22397 for ; Mon, 19 Nov 2001 03:40:30 -0500 (EST) Received: from ns.iij.ad.jp (ns.iij.ad.jp [192.168.2.8]) by mgo.iij.ad.jp (8.8.8/MGO1.0) with ESMTP id RAA21276; Mon, 19 Nov 2001 17:40:25 +0900 (JST) Received: from zeus (h188n005.iij.ad.jp [192.168.5.188]) by ns.iij.ad.jp (8.8.5/3.5Wpl7) with ESMTP id RAA21013; Mon, 19 Nov 2001 17:40:25 +0900 (JST) To: kuniaki@iij.ad.jp, midcom@ietf.org Cc: nats@ml.canonet.ne.jp, nats@bugest.net Subject: Re: [midcom] draft-kuniaki-nats-01.txt From: Kuniaki Kondo References: <200111191407.FAG89993.JOLJLBV@iij.ad.jp> In-Reply-To: <200111191407.FAG89993.JOLJLBV@iij.ad.jp> Message-Id: <200111191740.BHF16695.JLVJLOB@iij.ad.jp> X-Mailer: Winbiff [Version 2.34beta3] X-Accept-Language: ja,en Date: Mon, 19 Nov 2001 17:40:25 +0900 Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Hi, Previously, I sent about my draft. However, I did not say about the purpose of my draft. Then, I would like to say about difference between midcom and my draft. The purpose of proposal is same as my draft. However, approaches are different. According to midcom-draft, it needs to implement for Firewall/NAT and internal hosts. And they have to exchange information to use midcom. I think that this is one of approach for solve NAT problem. However, my approach is different. In my draft, to implement to internal host is optional in first step. I mean that internal hosts can try to connect to external hosts or other internal hosts. NATS router or FW distinguishes whether a destination host supports NATS protocol or not, and they add sub-address and translate IP address, instead. Furthermore, I think, when there are two same server in internal network such as WWW server which is using same port(80), external host can not choice the server except using SRV RR. However, in my draft, the NATS router selects internal server depending on sub-address. Thus, those servers can use same port. "Kuniaki Kondo " (Mon, 19 Nov 2001 14:07:25 +0900) wrote: > Hello. > > This is kuniaki KONDO, IIJ. > I submitted new two internet-drafts. > > draft-kuniaki-nats-01.txt > http://www.ietf.org/internet-drafts/draft-kuniaki-nats-01.txt > > draft-kuniaki-capsulated-nats-00.txt > http://www.ietf.org/internet-drafts/draft-kuniaki-capsulated-nats-00.txt > > In this new draft, I would like to propose a new method which enables > internet hosts to have direct access to hosts behind NAT routers using > sub-addresses. > Under current NAT scheme, it is impossible for internet hosts to point > exact hosts behind NAT routers. > This method solves the problem by incorporating hostname to > sub-address resolution into DNS and enhancing NAT routers to handle > this resolution. > > I would like to have some comments. And, I would like to explain > more detail at next midcom meeting, in no more 15 minutes. > > Thank you. > > -- > Kuniaki Kondo > kuniaki@iij.ad.jp > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom -- Kuniaki Kondo kuniaki@iij.ad.jp _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 19 12:08:13 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA10075 for ; Mon, 19 Nov 2001 12:08:13 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA09730 for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 12:08:13 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09705; Mon, 19 Nov 2001 12:05:36 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09673 for ; Mon, 19 Nov 2001 12:05:34 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA09980 for ; Mon, 19 Nov 2001 12:05:31 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111917030514867 ; Mon, 19 Nov 2001 17:03:05 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Mon, 19 Nov 2001 17:04:54 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639E92412@ThisAddressDoesNotExist> From: Steve Davies To: "'Jonathan Rosenberg'" , "'midcom@ietf.org'" Subject: RE: [midcom] new I-D on "symmetric STUN" Date: Mon, 19 Nov 2001 17:04:48 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C1711C.4B8365D0" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C1711C.4B8365D0 Content-Type: text/plain; charset="ISO-8859-1" -----Original Message----- From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com] Sent: 15 November 2001 23:45 To: 'Steve Davies'; Jonathan Rosenberg; 'midcom@ietf.org' Subject: RE: [midcom] new I-D on "symmetric STUN" >>... this proposal says nothing that hasn't already been proposed. > Really? It is not bitwise or semanticwise identical to your proposal, so how > do you claim it has already been proposed? The reason I said that TURN is the same as what has been proposed elsewhere is because it uses the following core concepts in common with other proposals made to the list, including the Davies proposal (henceforth called FANTOM - Firewall And NAT Traversal Overt Method). The common core concepts includes: * the use of a public forwarding intermediary, * ensuring all connections are outbound connections, * use of designated ports on the intermediary to which outbound connections are made and from which in-bound traffic comes * a client-server protocol to dynamically map and track (a) the logical channels the terminal/endpoint is using with (b) outbound connections to the intermediaries with (c) unique transport addresses dynamically allocated on the server. Both TURN and FANTOM use these core concepts to build a solution. Without them, neither would work. TURN presents as if it were a new concept for the group, whereas the concepts have been presented in other drafts presented to the list. These concepts have also been explained in public presentations for the past year. As a minimum a new draft of this nature, coming after the other drafts, should compare and contrast what it is saying with what has already been presented. True, at the bit level the protocols are different, but there are likely to be many thousands of permutations using the above concepts that achieve the similar or the same results. I do not think it is in the groups interest to enumerate all of these individually. Instead, it would be better to discuss the strengths and weaknesses of the methods used to implement the concepts, and explore those variations as a group, hopefully developing an optimal bit-level solution (subject to the time constraints that we have). This isn't achieved by presenting an allegedly new solution in isolation. If it is felt that the differences in TURN have value, then it would have been better to present TURN as a delta to the FANTOM (or Sen) procedure, along with a discussion of why it is better. The debate would then have moved on, rather just being mired even further. The key contributors to the resulting solution would then be able to present a combined draft that included the insight of the whole group. After all, given the short time scale we have, collaborating and working together, with proper respect for each parties contributions, is going to be the fastest way to get to a deployable solution. Steve ------_=_NextPart_001_01C1711C.4B8365D0 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] new I-D on "symmetric STUN"

-----Original Message-----
From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com]
Sent: 15 November 2001 23:45
To: 'Steve Davies'; Jonathan Rosenberg; = 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric = STUN"

>>... this proposal says nothing that hasn't = already been proposed.

> Really? It is not bitwise or semanticwise = identical to your proposal, so how
> do you claim it has already been = proposed? 

The reason I said that TURN is the same as what has = been proposed elsewhere is because it uses the following core concepts = in common with other proposals made to the list, including the Davies = proposal (henceforth called FANTOM - Firewall And NAT Traversal Overt = Method).

The common core concepts includes:
* the use of a public forwarding intermediary, =
* ensuring all connections are outbound connections, =
* use of designated ports on the intermediary to = which outbound connections are made and from which in-bound traffic = comes

* a client-server protocol to dynamically map and = track (a) the logical channels the terminal/endpoint is using
with (b) outbound connections to the intermediaries = with (c) unique transport addresses dynamically allocated on the = server.

Both TURN and FANTOM use these core concepts to build = a solution. Without them, neither would work. TURN presents as if it = were a new concept for the group, whereas the concepts have been = presented in other drafts presented to the list. These concepts have = also been explained in public presentations for the past year. As a = minimum a new draft of this nature, coming after the other drafts, = should compare and contrast what it is saying with what has already = been presented.

True, at the bit level the protocols are different, = but there are likely to be many thousands of permutations using the = above concepts that achieve the similar or the same results. I do not = think it is in the groups interest to enumerate all of these = individually.  Instead, it would be better to discuss the = strengths and weaknesses of the methods used to implement the concepts, = and explore those variations as a group, hopefully developing an = optimal bit-level solution (subject to the time constraints that we = have).  This isn't achieved by presenting an allegedly new = solution in isolation. If it is felt that the differences in TURN have = value, then it would have been better to present TURN as a delta to the = FANTOM (or Sen) procedure, along with a discussion of why it is = better.  The debate would then have moved on, rather just being = mired even further.

The key contributors to the resulting solution would = then be able to present a combined draft that included the insight of = the whole group.  After all, given the short time scale we have, = collaborating and working together, with proper respect for each = parties contributions, is going to be the fastest way to get to a = deployable solution.

Steve

------_=_NextPart_001_01C1711C.4B8365D0-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 19 12:12:18 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA10304 for ; Mon, 19 Nov 2001 12:12:18 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA09830 for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 12:12:20 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09773; Mon, 19 Nov 2001 12:08:50 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09742 for ; Mon, 19 Nov 2001 12:08:45 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA10119 for ; Mon, 19 Nov 2001 12:08:42 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111917062626380 for ; Mon, 19 Nov 2001 17:06:26 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Mon, 19 Nov 2001 17:08:14 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639E92413@ThisAddressDoesNotExist> From: Steve Davies To: "'midcom@ietf.org'" Subject: Re: [midcom] pre-midcom candidates - Protocol Name for Davies Pro posal Date: Mon, 19 Nov 2001 17:08:09 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C1711C.C34CD560" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C1711C.C34CD560 Content-Type: text/plain; charset="ISO-8859-1" The protocol and method described in the Davies proposal is now referred to as FANTOM - Firewall And NAT Traversal Overt Method. Please refer to it as such. Thanks Steve ------_=_NextPart_001_01C1711C.C34CD560 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable Re: [midcom] pre-midcom candidates - Protocol Name for Davies = Proposal

The protocol and method described in the Davies = proposal is now referred to as FANTOM - Firewall And NAT Traversal = Overt Method. Please refer to it as such.

Thanks

Steve


------_=_NextPart_001_01C1711C.C34CD560-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 19 12:41:37 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11978 for ; Mon, 19 Nov 2001 12:41:37 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA10923 for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 12:41:37 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA10827; Mon, 19 Nov 2001 12:34:12 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA10796 for ; Mon, 19 Nov 2001 12:34:10 -0500 (EST) Received: from mail5.microsoft.com (mail5.microsoft.com [131.107.3.121]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11535 for ; Mon, 19 Nov 2001 12:34:06 -0500 (EST) Received: from inet-vrs-05.redmond.corp.microsoft.com ([157.54.6.148]) by mail5.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Mon, 19 Nov 2001 09:33:15 -0800 Received: from 157.54.5.25 by inet-vrs-05.redmond.corp.microsoft.com (InterScan E-Mail VirusWall NT); Mon, 19 Nov 2001 09:33:15 -0800 Received: from red-imc-02.redmond.corp.microsoft.com ([157.54.9.107]) by inet-hub-03.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Mon, 19 Nov 2001 09:33:14 -0800 Received: from win-imc-01.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.39]) by red-imc-02.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Mon, 19 Nov 2001 09:33:13 -0800 Received: from win-msg-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.134]) by win-imc-01.wingroup.windeploy.ntdev.microsoft.com with Microsoft SMTPSVC(6.0.3588.0); Mon, 19 Nov 2001 09:32:32 -0800 X-MimeOLE: Produced By Microsoft Exchange V6.0.6063.0 Content-Class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies Proposal Date: Mon, 19 Nov 2001 09:32:32 -0800 Message-ID: Thread-Topic: [midcom] pre-midcom candidates - Protocol Name for Davies Proposal thread-index: AcFxHNBG+VywQdnORQ2vGTtmPjrtvwAAzPqA From: "Christian Huitema" To: "Steve Davies" , X-OriginalArrivalTime: 19 Nov 2001 17:32:32.0901 (UTC) FILETIME=[2BB13350:01C17120] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by optimus.ietf.org id MAA10797 Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 8bit Steve, On the ridgeway web site, one finds phrases such as "Ridgeway uses patent-pending technology to limit H.323 traffic to Ridgeway's well-known ports". Is your proposal covered by any of these pending patents, and if yes what is your licensing strategy? -- Christian Huitema -----Original Message----- From: Steve Davies [mailto:sdavies@ridgewaysystems.com] Sent: Monday, November 19, 2001 9:08 AM To: 'midcom@ietf.org' Subject: Re: [midcom] pre-midcom candidates - Protocol Name for Davies Proposal The protocol and method described in the Davies proposal is now referred to as FANTOM - Firewall And NAT Traversal Overt Method. Please refer to it as such. Thanks Steve _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 19 14:19:40 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA18494 for ; Mon, 19 Nov 2001 14:19:35 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id OAA13360 for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 14:19:36 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA13341; Mon, 19 Nov 2001 14:17:38 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA13310 for ; Mon, 19 Nov 2001 14:17:36 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA18326 for ; Mon, 19 Nov 2001 14:17:34 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAJJH5829385; Mon, 19 Nov 2001 11:17:05 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABZ31909; Mon, 19 Nov 2001 11:15:20 -0800 (PST) Message-Id: <5.1.0.14.0.20011119141220.00a65840@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Mon, 19 Nov 2001 14:18:08 -0500 To: "Christian Huitema" , "Steve Davies" , From: Melinda Shore Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies Proposal In-Reply-To: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 09:32 AM 11/19/01 -0800, Christian Huitema wrote: >On the ridgeway web site, one finds phrases such as "Ridgeway uses >patent-pending technology to limit H.323 traffic to Ridgeway's >well-known ports". Is your proposal covered by any of these pending >patents, and if yes what is your licensing strategy? Ridgeway posted an intellectual property rights notice against this some time ago (http://www.ietf.org/ietf/IPR/RIDGEWAY-NAT-TRAVERSAL). I've written them about this on several occasions and gotten answers, but the answers have not been posted to the midcom mailing list. I think this is somewhat unfortunate, since we are trying to select from among several proposed protocols and the IETF policy is that a technology with IPR claims against it will only be preferred against competing technology when it's clearly superior. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 19 15:17:23 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22320 for ; Mon, 19 Nov 2001 15:17:23 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA15060 for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 15:17:25 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA14764; Mon, 19 Nov 2001 15:03:30 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA14736 for ; Mon, 19 Nov 2001 15:03:29 -0500 (EST) Received: from Mitel.COM ([216.191.234.70]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA21487 for ; Mon, 19 Nov 2001 15:03:26 -0500 (EST) From: Tom_Gray@mitel.com Received: from kanmta01.software.mitel.com (kanmta01 [134.199.37.58]) by Mitel.COM (V8/MAIL-RELAY-2.1) with SMTP id PAA20522; Mon, 19 Nov 2001 15:00:46 -0500 (EST) Received: by kanmta01.software.mitel.com(Lotus SMTP MTA v4.6.7 (934.1 12-30-1999)) id 85256B09.006DEAF5 ; Mon, 19 Nov 2001 15:00:35 -0500 X-Lotus-FromDomain: MITEL To: Melinda Shore cc: "Christian Huitema" , "Steve Davies" , midcom@ietf.org Message-ID: <85256B09.006DE8DE.00@kanmta01.software.mitel.com> Date: Mon, 19 Nov 2001 15:00:33 -0500 Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies Proposal Mime-Version: 1.0 Content-type: text/plain; charset=us-ascii Content-Disposition: inline Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org From: Tom Gray@MITEL on 11/19/2001 03:00 PM Since the claim is that the Davies proposal is fundamentally the same as that of the new TURN proposal, wouldn't this issue be also important for it as well. Melinda Shore on 11/19/2001 02:18:08 PM To: "Christian Huitema" , "Steve Davies" , midcom@ietf.org cc: (bcc: Tom Gray/Kan/Mitel) Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies Proposal At 09:32 AM 11/19/01 -0800, Christian Huitema wrote: >On the ridgeway web site, one finds phrases such as "Ridgeway uses >patent-pending technology to limit H.323 traffic to Ridgeway's >well-known ports". Is your proposal covered by any of these pending >patents, and if yes what is your licensing strategy? Ridgeway posted an intellectual property rights notice against this some time ago (http://www.ietf.org/ietf/IPR/RIDGEWAY-NAT-TRAVERSAL). I've written them about this on several occasions and gotten answers, but the answers have not been posted to the midcom mailing list. I think this is somewhat unfortunate, since we are trying to select from among several proposed protocols and the IETF policy is that a technology with IPR claims against it will only be preferred against competing technology when it's clearly superior. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 19 16:55:35 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA28264 for ; Mon, 19 Nov 2001 16:55:35 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id QAA17590 for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 16:55:36 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA17409; Mon, 19 Nov 2001 16:43:19 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA17378 for ; Mon, 19 Nov 2001 16:43:17 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA27548 for ; Mon, 19 Nov 2001 16:43:15 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAJLgl817130; Mon, 19 Nov 2001 13:42:47 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABZ37468; Mon, 19 Nov 2001 13:42:20 -0800 (PST) Message-Id: <5.1.0.14.0.20011119164355.00a52ad0@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Mon, 19 Nov 2001 16:45:01 -0500 To: From: Melinda Shore Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies Proposal Cc: "Steve Davies" , midcom@ietf.org In-Reply-To: <85256B09.006DE8DE.00@kanmta01.software.mitel.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 03:00 PM 11/19/01 -0500, Tom_Gray@Mitel.COM wrote: >Since the claim is that the Davies proposal is fundamentally the same as that of >the new TURN proposal, wouldn't this issue be also important for it as well. Are you asking if Ridgeway is intending to assert that TURN is using Ridgeway-patented technology? Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 20 07:28:05 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA05418 for ; Tue, 20 Nov 2001 07:28:04 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id HAA15001 for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 07:28:08 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id HAA14903; Tue, 20 Nov 2001 07:25:30 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id HAA14870 for ; Tue, 20 Nov 2001 07:25:23 -0500 (EST) Received: from Mitel.COM ([216.191.234.70]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA05333 for ; Tue, 20 Nov 2001 07:25:19 -0500 (EST) From: Tom_Gray@mitel.com Received: from kanmta01.software.mitel.com (kanmta01 [134.199.37.58]) by Mitel.COM (V8/MAIL-RELAY-2.1) with SMTP id HAA03035; Tue, 20 Nov 2001 07:24:11 -0500 (EST) Received: by kanmta01.software.mitel.com(Lotus SMTP MTA v4.6.7 (934.1 12-30-1999)) id 85256B0A.00441FC2 ; Tue, 20 Nov 2001 07:24:05 -0500 X-Lotus-FromDomain: MITEL To: Melinda Shore cc: "Steve Davies" , midcom@ietf.org Message-ID: <85256B0A.00441EEE.00@kanmta01.software.mitel.com> Date: Tue, 20 Nov 2001 07:24:07 -0500 Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies Proposal Mime-Version: 1.0 Content-type: text/plain; charset=us-ascii Content-Disposition: inline Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org From: Tom Gray@MITEL on 11/20/2001 07:24 AM I think that that would be a valid question given the discussion about the equivalence of TURN and Davies. Melinda Shore on 11/19/2001 04:45:01 PM To: Tom Gray/Kan/Mitel@Mitel cc: "Steve Davies" , midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies Proposal At 03:00 PM 11/19/01 -0500, Tom_Gray@Mitel.COM wrote: >Since the claim is that the Davies proposal is fundamentally the same as that of >the new TURN proposal, wouldn't this issue be also important for it as well. Are you asking if Ridgeway is intending to assert that TURN is using Ridgeway-patented technology? Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Tue Nov 20 12:31:13 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA22116 for ; Tue, 20 Nov 2001 12:31:13 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA27511 for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 12:31:17 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA27155; Tue, 20 Nov 2001 12:28:02 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA27126 for ; Tue, 20 Nov 2001 12:28:01 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA21866 for ; Tue, 20 Nov 2001 12:27:55 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112017245123144 for ; Tue, 20 Nov 2001 17:24:51 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Tue, 20 Nov 2001 17:27:28 -0000 Message-ID: <00533D13955AD411AF3800A0C9B426390EC4E8@ThisAddressDoesNotExist> From: Barry Scott To: midcom@ietf.org Date: Tue, 20 Nov 2001 17:27:25 -0000 X-Mailer: Internet Mail Service (5.5.2653.19) Subject: [midcom] pre-midcom solutions != VPN Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org We see VPNs as different from the technology that pre-midcom solutions will require. Pre-midcom goal: the pre-midcom solution allows users in a private network to use voice and video IP terminals to communicate with users outside their private network. It has to allow private to public network transition without compromising security. VPN goal: a VPN allows users at remote locations to use resources within a private network as if they are locally connected. The VPN extends the boundary of the private network to that remote location, but it remains a private network. Tunneling happens to be the technique used to make that extension. No crossing of the boundary from the private network to the public network occurs. VPN technology often incorporates firewall technology to ensure the private boundary remains protected through the extension to the remote location. A VPN is a good choice when you wish to allow a trusted remote user or remote site to be added to your network from outside. Examples: a home worker, a branch office. There may be superficial similarities between VPN and pre-midcom technology, but fundamentally the functionality is diametrically opposed. BArry _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Tue Nov 20 12:36:25 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA22453 for ; Tue, 20 Nov 2001 12:36:24 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA27623 for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 12:36:27 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA26982; Tue, 20 Nov 2001 12:18:37 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA26951 for ; Tue, 20 Nov 2001 12:18:35 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA21274 for ; Tue, 20 Nov 2001 12:18:30 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112017151130576 ; Tue, 20 Nov 2001 17:15:11 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Tue, 20 Nov 2001 17:17:48 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639172481@ThisAddressDoesNotExist> From: Steve Davies To: "'John LaCour'" , "'midcom@ietf.org'" Cc: "'Jonathan Rosenberg'" Subject: RE: [midcom] new I-D on "symmetric STUN" Date: Tue, 20 Nov 2001 17:17:41 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C171E7.42C64A40" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C171E7.42C64A40 Content-Type: text/plain; charset="ISO-8859-1" John, You are quite right. This email didn't help move the debate forward much. I'm afraid I got a little frustrated with the politics. Nevertheless, I stick by my statements so let me give you a couple of examples of the flaws I see. * FANTOM uses an out-of-band signalling method 'Create Media Flow' to assign transport addresses on the remote server/public intemediary. It then sends outbound UDP Probes (with a session identifier) to create the dynamic NAT assignment and to complete the mapping between the resultant random source port the probe came from, and the transport addresses the Create Media Flow method assigned, and the call. The first probe effectively creates an outbound UDP connection down which media may flow in either direction for that call. Please note that media is NOT tunneled in FANTOM. TURN tries to simplify this approach by combining the 'probe' (the method to create the dynamic NAT assignment) with an in-band signalling method to assign transport addresses on the public intermediary. This is the ALLOCATE method in TURN. One of the main reasons FANTOM has out-of-band signalling was to conform to the spirit of RTP/RTCP by assigning consecutive port pairs to represent the receive RTP/RTCP addresses at the intermediary. A single method 'Create Media Flow' does that. Having grabbed a port pair, 2 UDP outbound connections are needed to the intermediary to receive the respective RTP and RTCP flows. Hence the Probes. TURN cannot conform to the spirit of RTP in this way because the ALLOCATE method only reserves a single transport address on the intermediary. If it requested 2 transport addresses, a probe or very similar mechanism would be required to establish the second outbound UDP connection. Even worse, the way TURN is specified, there is a good chance that as a TURN server runs out of resource the associated RTP and RTCP transport addresses could have different IP addresses. NOT ALLOWED. There are many other advantages to using a separate Probe message. One very good use of probes is to keep NAT bindings assigned, i.e. they are sent at regular intervals to prevent the NAT from timing out. TURN has no probe or NAT keep-alive methods which breaks the solution on at least 2 counts. In one case, a terminal may make an ALLOCATE to obtain an address with which to register with a public SIP proxy. It then sits there waiting to receive incoming calls. However, without some traffic such as a probe or a NAT keep alive, the NAT assignment created by the ALLOCATE times out, which means the terminal won't receive incoming call notifications. A second case when the NAT binding may time out is when the remote party is not talking and their terminal implements silence suppression. FANTOM uses probes to ensure this doesn't happen. In FANTOM probes are designed to be easily recognisable in order to help the implementation of an efficient forwarding intermediary. * TURN doesn't use a tunnel. FANTOM does. Some think that this implies FANTOM is a VPN variant. FANTOM is most definitely not, but we'll deal with that separately. FANTOM uses a tunnel for multiplexing out-of-band call control and the out-of-band FANTOM client-server protocol into a single connection. The connection is TCP because we valued reliability and the life-time is more easily managed by the NAT. It could be UDP but we didn't feel we needed to re-invent a UDP session with TCP characteristics. We envisaged that the client end of FANTOM would be implemented in severals ways. For example, it could be implemented in a standalone system, serving many terminals in a single enterprise. In Centrex applications there would be no local proxy. In this case the FANTOM client would have to handle multiple simultaneous call setups and cleardowns. We judged a single persistant tunnel for all call control from the FANTOM client to FANTOM server was the most efficient use of resources. To avoid tunnels, a similar TURN implementation would require the standalone client to create many UDP connections to the intermediary - one for each terminal wanting to receive incoming calls. As we remarked above, these UDP connections need to keep NAT bindings through some sort of NAT-keep-alive messages. The SEN proposal implemented a similar technique and found it to be too resource intensive - hence their SIP proposal extensions. Having a tunnel in FANTOM has further advantages, not least in allowing out-of-band signalling and control. The benefit here is that the protocol can be extended to include other functions such as network management without breaking the architecture. We want FANTOM to be extensible. This email is getting quite long so I'll conclude by remarking that I hope that these explanations indicate that while FANTOM appears more complex than TURN, there is a reason behind each method FANTOM implements. We haven't made it complex for complexity's sake. FANTOM may be unfamiliar, but that's no reason to start from scratch which I fear TURN is. Steve -----Original Message----- From: John LaCour [mailto:jlacour@netscreen.com] Sent: 15 November 2001 21:58 To: 'Steve Davies'; 'Jonathan Rosenberg'; 'midcom@ietf.org' Subject: RE: [midcom] new I-D on "symmetric STUN" Steve, You may or may not be correct, but this message does next to nothing to help any of us evaluate the merits of either proposal. Just because something was created earlier or even implemented doesn't make it inherently better. Rather than try to strong-arm us, you really need to enumerate the many flaws and how your proposal addresses them. If you want to be completely forthcoming coming you should also discuss the weaknesses of your own proposal and why you've made those trade-offs. In fairness to you and Jonathan, I haven't done a thorough review of either proposal yet. This message should not be misconstrued as supporting either proposal. Rather I'm trying to encourage you to tell us something useful. -John -----Original Message----- From: Steve Davies [mailto:sdavies@ridgewaysystems.com] Sent: Thursday, November 15, 2001 1:42 PM To: 'Jonathan Rosenberg'; 'midcom@ietf.org' Subject: RE: [midcom] new I-D on "symmetric STUN" Interesting TURN of events or should I say 'U TURN'. Puns aside, this proposal says nothing that hasn't already been proposed. While I am pleased to see TURN uses IDENTICAL concepts to the Davies proposal, it contains many flaws (too numerous to go into here). Fix those flaws and you end up with the Davies proposal. Not only does TURN come a month after the deadline set in Melinda's rules of engagement, but the development of such a new and immature proposal is by definition not in the best interests of a pre-midcom solution. If we agree on the concepts and Jonathan et al are interested in a quick solution, then surely it makes sense to jointly work on the most mature incarnation of those concepts. Why re-invent the wheel? Steve ------_=_NextPart_001_01C171E7.42C64A40 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] new I-D on "symmetric STUN"

John,

You are quite right. This email didn't help move the = debate forward much. I'm afraid I got a little frustrated with the = politics. Nevertheless, I stick by my statements so let me give you a = couple of examples of the flaws I see.

* FANTOM uses an out-of-band signalling method = 'Create Media Flow' to assign transport addresses on the remote = server/public intemediary. It then sends outbound UDP Probes (with a = session identifier) to create the dynamic NAT assignment and to = complete the mapping between the resultant random source port the probe = came from, and the transport addresses the Create Media Flow method = assigned, and the call. The first probe effectively creates an outbound = UDP connection down which media may flow in either direction for that = call. Please note that media is NOT tunneled in FANTOM.

TURN tries to simplify this approach by combining the = 'probe' (the method to create the dynamic NAT assignment) with an = in-band signalling method to assign transport addresses on the public = intermediary. This is the ALLOCATE method in TURN.

One of the main reasons FANTOM has out-of-band = signalling was to conform to the spirit of RTP/RTCP by assigning = consecutive port pairs to represent the receive RTP/RTCP addresses at = the intermediary. A single method 'Create Media Flow' does that. Having = grabbed a port pair, 2 UDP outbound connections are needed to the = intermediary to receive the respective RTP and RTCP flows. Hence the = Probes.

TURN cannot conform to the spirit of RTP in this way = because the ALLOCATE method only reserves a single transport address on = the intermediary. If it requested 2 transport addresses, a probe or = very similar mechanism would be required to establish the second = outbound UDP connection. Even worse, the way TURN is specified, there = is a good chance that as a TURN server runs out of resource the = associated RTP and RTCP transport addresses could have different IP = addresses. NOT ALLOWED.

There are many other advantages to using a separate = Probe message. One very good use of probes is to keep NAT bindings = assigned, i.e. they are sent at regular intervals to prevent the NAT = from timing out. TURN has no probe or NAT keep-alive methods which = breaks the solution on at least 2 counts. In one case, a terminal may = make an ALLOCATE to obtain an address with which to register with a = public SIP proxy. It then sits there waiting to receive incoming calls. = However, without some traffic such as a probe or a NAT keep alive, the = NAT assignment created by the ALLOCATE times out, which means the = terminal won't receive incoming call notifications. A second case when = the NAT binding may time out is when the remote party is not talking = and their terminal implements silence suppression.

FANTOM uses probes to ensure this doesn't happen. In = FANTOM probes are designed to be easily recognisable in order to help = the implementation of an efficient forwarding intermediary.

* TURN doesn't use a tunnel. FANTOM does. Some think = that this implies FANTOM is a VPN variant. FANTOM is most definitely = not, but we'll deal with that separately. FANTOM uses a tunnel for = multiplexing out-of-band call control and the out-of-band FANTOM = client-server protocol into a single connection. The connection is TCP = because we valued reliability and the life-time is more easily managed = by the NAT. It could be UDP but we didn't feel we needed to re-invent a = UDP session with TCP characteristics.

We envisaged that the client end of FANTOM would be = implemented in severals ways. For example, it could be implemented in a = standalone system, serving many terminals in a single enterprise. In = Centrex applications there would be no local proxy. In this case the = FANTOM client would have to handle multiple simultaneous call setups = and cleardowns. We judged a single persistant tunnel for all call = control from the FANTOM client to FANTOM server was the most efficient = use of resources.

To avoid tunnels, a similar TURN implementation would = require the standalone client to create many UDP connections to the = intermediary - one for each terminal wanting to receive incoming calls. = As we remarked above, these UDP connections need to keep NAT bindings = through some sort of NAT-keep-alive messages. The SEN proposal = implemented a similar technique and found it to be too resource = intensive - hence their SIP proposal extensions.

Having a tunnel in FANTOM has further advantages, not = least in allowing out-of-band signalling and control. The benefit here = is that the protocol can be extended to include other functions such as = network management without breaking the architecture. We want FANTOM to = be extensible.

This email is getting quite long so I'll conclude by = remarking that I hope that these explanations indicate that while  = FANTOM appears more complex than TURN, there is a reason behind each = method FANTOM implements. We haven't made it complex for complexity's = sake. FANTOM may be unfamiliar, but that's no reason to start from = scratch which I fear TURN is.

Steve

-----Original Message-----
From: John LaCour [
mailto:jlacour@netscreen.com]<= /FONT>
Sent: 15 November 2001 21:58
To: 'Steve Davies'; 'Jonathan Rosenberg'; = 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric = STUN"


Steve,
 
You may or may not be correct, but this message does = next to nothing
to help any of us evaluate the merits of either = proposal.
 
Just because something was created earlier or even = implemented doesn't
make it inherently better.
 
Rather than try to strong-arm us, you really need to = enumerate the many
flaws and how your proposal addresses them.  If = you want to be
completely forthcoming coming you should also = discuss the weaknesses
of your own proposal and why you've made those = trade-offs.
 
In fairness to you and Jonathan, I haven't done a = thorough review of
either proposal yet.  This message should not = be misconstrued
as  supporting either proposal.  Rather = I'm trying to encourage
you to tell us something useful.
 
-John
-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysyste= ms.com]
Sent: Thursday, November 15, 2001 1:42 PM
To: 'Jonathan Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric = STUN"


Interesting TURN of events or should I say 'U TURN'. =
Puns aside, this proposal says nothing that hasn't = already been proposed. While I am pleased to see TURN uses IDENTICAL = concepts to the Davies proposal, it contains many flaws (too numerous = to go into here). Fix those flaws and you end up with the Davies = proposal. Not only does TURN come a month after the deadline set in = Melinda's rules of engagement, but the development of such a new and = immature proposal is by definition not in the best interests of a = pre-midcom solution. If we agree on the concepts and Jonathan et al are = interested in a quick solution, then surely it makes sense to jointly = work on the most mature incarnation of those concepts. Why re-invent = the wheel?

Steve

------_=_NextPart_001_01C171E7.42C64A40-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Tue Nov 20 12:43:29 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA22922 for ; Tue, 20 Nov 2001 12:43:29 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA27760 for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 12:43:32 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA27566; Tue, 20 Nov 2001 12:34:25 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA27535 for ; Tue, 20 Nov 2001 12:34:23 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA22379 for ; Tue, 20 Nov 2001 12:34:20 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112017310115699 ; Tue, 20 Nov 2001 17:31:01 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Tue, 20 Nov 2001 17:33:38 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639172482@ThisAddressDoesNotExist> From: Steve Davies To: "'Melinda Shore'" , Christian Huitema, midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates - On IPR Date: Tue, 20 Nov 2001 17:33:35 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C171E9.7B58F270" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C171E9.7B58F270 Content-Type: text/plain; charset="ISO-8859-1" This is the email I sent to Melinda on the topic of IPR. -----Original Message----- From: Steve Davies Sent: 12 October 2001 20:57 To: Melinda Shore Cc: Steve Davies; Barry Scott; Pete Cordell Subject: RE: ID Submission - draft-davies-fw-nat-traversal-01.txt Melinda, In making this second contribution, draft-davies-fw-nat-traversal-01.txt, Ridgeway stands by the declaration made to the IETF on 21st March, 2001, regarding intellectual property claims. Ridgeway has applied for one or more patents on the technology related to the traversal of firewalls and NATs. To date no patents have been awarded to Ridgeway. Ridgeway remains willing to disclose any patents awarded in this area and to license them under openly specified, fair and non-discriminatory terms should one of our patents be required to implement any standard associated with the traversal of firewalls and NATs. I hope this clarifies our position and the status of our claims, but please ask if you need further information. Kindest regards Steve Steve Davies Chief Technical Officer Ridgeway Systems and Software Email: mailto:sdavies@ridgewaysystems.com Web: www.ridgewaysystems.com Tel W: +44 (0)118 938 1114 Tel H: +44 (0)1285 770979 -----Original Message----- From: Melinda Shore [mailto:mshore@cisco.com] Sent: 19 November 2001 19:18 To: Christian Huitema; Steve Davies; midcom@ietf.org Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies Proposal At 09:32 AM 11/19/01 -0800, Christian Huitema wrote: >On the ridgeway web site, one finds phrases such as "Ridgeway uses >patent-pending technology to limit H.323 traffic to Ridgeway's >well-known ports". Is your proposal covered by any of these pending >patents, and if yes what is your licensing strategy? Ridgeway posted an intellectual property rights notice against this some time ago (http://www.ietf.org/ietf/IPR/RIDGEWAY-NAT-TRAVERSAL). I've written them about this on several occasions and gotten answers, but the answers have not been posted to the midcom mailing list. I think this is somewhat unfortunate, since we are trying to select from among several proposed protocols and the IETF policy is that a technology with IPR claims against it will only be preferred against competing technology when it's clearly superior. Melinda ------_=_NextPart_001_01C171E9.7B58F270 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom candidates - On IPR

This is the email I sent to Melinda on the topic of = IPR.


-----Original Message-----
From: Steve Davies
Sent: 12 October 2001 20:57
To: Melinda Shore
Cc: Steve Davies; Barry Scott; Pete Cordell
Subject: RE: ID Submission - = draft-davies-fw-nat-traversal-01.txt


Melinda,

In making this second contribution, = draft-davies-fw-nat-traversal-01.txt, Ridgeway stands by the = declaration made to the IETF on 21st March, 2001, regarding = intellectual property claims.

Ridgeway has applied for one or more patents on the = technology related to the traversal of firewalls and NATs. To date no = patents have been awarded to Ridgeway.

Ridgeway remains willing to disclose any patents = awarded in this area and to license them under openly specified, fair = and non-discriminatory terms should one of our patents be required to = implement any standard associated with the traversal of firewalls and = NATs.

I hope this clarifies our position and the status of = our claims, but please ask if you need further information.

Kindest regards

Steve

Steve Davies
Chief Technical Officer
Ridgeway Systems and Software
Email: mailto:sdavies@ridgewaysyste= ms.com
Web:  www.ridgewaysystems.com
Tel W: +44 (0)118 938 1114
Tel H: +44 (0)1285 770979


-----Original Message-----
From: Melinda Shore [mailto:mshore@cisco.com]
Sent: 19 November 2001 19:18
To: Christian Huitema; Steve Davies; = midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates - = Protocol Name for Davies
Proposal


At 09:32 AM 11/19/01 -0800, Christian Huitema = wrote:
>On the ridgeway web site, one finds phrases such = as "Ridgeway uses
>patent-pending technology to limit H.323 traffic = to Ridgeway's
>well-known ports". Is your proposal covered = by any of these pending
>patents, and if yes what is your licensing = strategy?

Ridgeway posted an intellectual property rights = notice against this
some time ago (http://www.ietf.org/ietf/IPR/RIDGEWAY-NAT-TRAVERSAL).
I've written them about this on several occasions = and gotten answers,
but the answers have not been posted to the midcom = mailing list.  I
think this is somewhat unfortunate, since we are = trying to select from
among several proposed protocols and the IETF policy = is that a
technology with IPR claims against it will only be = preferred against
competing technology when it's clearly superior. = ;

Melinda

------_=_NextPart_001_01C171E9.7B58F270-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Tue Nov 20 12:58:41 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23938 for ; Tue, 20 Nov 2001 12:58:41 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA28078 for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 12:58:43 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA28052; Tue, 20 Nov 2001 12:56:53 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA28021 for ; Tue, 20 Nov 2001 12:56:51 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23773 for ; Tue, 20 Nov 2001 12:56:48 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAKHuL807125; Tue, 20 Nov 2001 09:56:21 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABZ59760; Tue, 20 Nov 2001 09:55:52 -0800 (PST) Message-Id: <5.1.0.14.0.20011120125804.00a68390@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Tue, 20 Nov 2001 12:58:52 -0500 To: Barry Scott , midcom@ietf.org From: Melinda Shore Subject: Re: [midcom] pre-midcom solutions != VPN In-Reply-To: <00533D13955AD411AF3800A0C9B426390EC4E8@ThisAddressDoesNotE xist> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 05:27 PM 11/20/01 +0000, Barry Scott wrote: >Pre-midcom goal: the pre-midcom solution allows users in a private network >to use voice and video IP terminals to communicate with users outside their >private network. It has to allow private to public network transition >without compromising security. I'd amend that to say "within the midcom framework." Ideally we'd like endpoints to be able to get their public address for signaling purposes. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Tue Nov 20 13:19:22 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA25828 for ; Tue, 20 Nov 2001 13:19:21 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id NAA29014 for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 13:19:23 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA28815; Tue, 20 Nov 2001 13:09:22 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA28784 for ; Tue, 20 Nov 2001 13:09:20 -0500 (EST) Received: from pop.mainstreet.net (smtp.mainstreet.net [207.5.0.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA25008 for ; Tue, 20 Nov 2001 13:09:16 -0500 (EST) Received: from vip (saqibj.mainstreet.net [207.5.1.168]) by pop.mainstreet.net (8.11.3/8.11.3) with SMTP id fAKI9FP06942; Tue, 20 Nov 2001 10:09:15 -0800 (PST) Reply-To: From: "Saqib Jang" To: "Barry Scott" , Subject: RE: [midcom] pre-midcom solutions != VPN Date: Tue, 20 Nov 2001 10:16:20 -0800 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) Importance: Normal In-Reply-To: <00533D13955AD411AF3800A0C9B426390EC4E8@ThisAddressDoesNotExist> X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit IPsec is a IETF standard protocol that can and is being used to create secure communication channels between protected enterprise networks and public networks for specific (e.g. voice, video, storage) or all protocols, which is clearly the goal behind pre-midcom work (i.e. how can media protocols securely traverse private/public network boundries of existing networks). IPsec end-points support crypto-based authentication and optional encryption allowing for the security of the IPsec-based channels to be beyond the capabilities of the proposed drafts. While IPsec has been used for site-to-site and remote access VPN deployment, its use is not limited to VPNs. For example, IP storage folks view IPsec as a critical enabler for use of iSCSI over metro or long-haul networks. I'm not convinced that that there are clear-cut technical advantages of the proposed drafts over tunnel-mode IPsec. Plus, IPR issues are another reason why it would be preferable to look to an existing standard. Saqib Saqib Jang Margalla Communications, Inc. 3301 El Camino Real, Suite 220 Atherton, CA 94027 Ph: 650 298 8462 Fax: 650 368 8198 www.margallacomm.com -----Original Message----- From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of Barry Scott Sent: Tuesday, November 20, 2001 9:27 AM To: midcom@ietf.org Subject: [midcom] pre-midcom solutions != VPN We see VPNs as different from the technology that pre-midcom solutions will require. Pre-midcom goal: the pre-midcom solution allows users in a private network to use voice and video IP terminals to communicate with users outside their private network. It has to allow private to public network transition without compromising security. VPN goal: a VPN allows users at remote locations to use resources within a private network as if they are locally connected. The VPN extends the boundary of the private network to that remote location, but it remains a private network. Tunneling happens to be the technique used to make that extension. No crossing of the boundary from the private network to the public network occurs. VPN technology often incorporates firewall technology to ensure the private boundary remains protected through the extension to the remote location. A VPN is a good choice when you wish to allow a trusted remote user or remote site to be added to your network from outside. Examples: a home worker, a branch office. There may be superficial similarities between VPN and pre-midcom technology, but fundamentally the functionality is diametrically opposed. BArry _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Tue Nov 20 13:44:23 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27756 for ; Tue, 20 Nov 2001 13:44:18 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id NAA00184 for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 13:44:22 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA29998; Tue, 20 Nov 2001 13:39:09 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA29918 for ; Tue, 20 Nov 2001 13:39:05 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id NAA27378 for ; Tue, 20 Nov 2001 13:39:01 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112018353309254 ; Tue, 20 Nov 2001 18:35:33 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Tue, 20 Nov 2001 18:38:09 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639172486@ThisAddressDoesNotExist> From: Steve Davies To: "'saqibj@margallacomm.com'" , midcom@ietf.org Cc: Barry Scott Subject: RE: [midcom] pre-midcom solutions != VPN Date: Tue, 20 Nov 2001 18:38:03 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C171F2.7CAD96E0" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C171F2.7CAD96E0 Content-Type: text/plain; charset="ISO-8859-1" Of course tunnels can be used between trusted parties. But a pre-midcom/midcom solution must support open communications - the ability for anyone to call anyone else. VPN technology or tunnel-mode IPSEC (they're equivalent in this context) cannot be used to construct a pre-midcom/midcom solution. Any attempt will leave gaping holes in the private/public network boundary. Plugging the hole requires firewalls and NATs that require a pre-midcom/midcom solution - catch-22! The catch goes something like this: To use VPN technology for inter-enterprise communication, a service provider or communications broker would be required to connect to every VPN. An application-aware NAT function is required that can map all private IP addresses to unique IP addresses in a shared address space, otherwise inter-enterprise calls will fail. This requires a signalling proxy to NAT the signalling, and an RTP Proxy to NAT the media. For security reasons, the service provider or enterprise must also provide a firewall on every VPN to prevent malicious attacks and unauthorized access from other enterprises or from the public network. These firewalls will have the same problems as enterprise firewalls that wish to allow through voice over IP protocols, without allowing through other undesired protocols. Which brings us back to the firewall/NAT problem and the need for pre-midcom/midcom solution! Steve -----Original Message----- From: Saqib Jang [mailto:saqibj@margallacomm.com] Sent: 20 November 2001 18:16 To: Barry Scott; midcom@ietf.org Subject: RE: [midcom] pre-midcom solutions != VPN IPsec is a IETF standard protocol that can and is being used to create secure communication channels between protected enterprise networks and public networks for specific (e.g. voice, video, storage) or all protocols, which is clearly the goal behind pre-midcom work (i.e. how can media protocols securely traverse private/public network boundries of existing networks). IPsec end-points support crypto-based authentication and optional encryption allowing for the security of the IPsec-based channels to be beyond the capabilities of the proposed drafts. While IPsec has been used for site-to-site and remote access VPN deployment, its use is not limited to VPNs. For example, IP storage folks view IPsec as a critical enabler for use of iSCSI over metro or long-haul networks. I'm not convinced that that there are clear-cut technical advantages of the proposed drafts over tunnel-mode IPsec. Plus, IPR issues are another reason why it would be preferable to look to an existing standard. Saqib Saqib Jang Margalla Communications, Inc. 3301 El Camino Real, Suite 220 Atherton, CA 94027 Ph: 650 298 8462 Fax: 650 368 8198 www.margallacomm.com -----Original Message----- From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of Barry Scott Sent: Tuesday, November 20, 2001 9:27 AM To: midcom@ietf.org Subject: [midcom] pre-midcom solutions != VPN We see VPNs as different from the technology that pre-midcom solutions will require. Pre-midcom goal: the pre-midcom solution allows users in a private network to use voice and video IP terminals to communicate with users outside their private network. It has to allow private to public network transition without compromising security. VPN goal: a VPN allows users at remote locations to use resources within a private network as if they are locally connected. The VPN extends the boundary of the private network to that remote location, but it remains a private network. Tunneling happens to be the technique used to make that extension. No crossing of the boundary from the private network to the public network occurs. VPN technology often incorporates firewall technology to ensure the private boundary remains protected through the extension to the remote location. A VPN is a good choice when you wish to allow a trusted remote user or remote site to be added to your network from outside. Examples: a home worker, a branch office. There may be superficial similarities between VPN and pre-midcom technology, but fundamentally the functionality is diametrically opposed. BArry _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom ------_=_NextPart_001_01C171F2.7CAD96E0 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom solutions !=3D VPN

Of course tunnels can be used between trusted = parties. But a pre-midcom/midcom solution must support open = communications - the ability for anyone to call anyone else. VPN = technology or tunnel-mode IPSEC (they're equivalent in this context) = cannot be used to construct a pre-midcom/midcom solution. Any attempt = will leave gaping holes in the private/public network boundary. = Plugging the hole requires firewalls and NATs that require a = pre-midcom/midcom solution - catch-22!

The catch goes something like this:

To use VPN technology for inter-enterprise = communication, a service provider or communications broker would be = required to connect to every VPN. An application-aware NAT function is = required that can map all private IP addresses to unique IP addresses = in a shared address space, otherwise inter-enterprise calls will fail. = This requires a signalling proxy to NAT the signalling, and an RTP = Proxy to NAT the media.  For security reasons, the service = provider or enterprise must also provide a firewall on every VPN to = prevent malicious attacks and unauthorized access from other = enterprises or from the public network. These firewalls will have the = same problems as enterprise firewalls that wish to allow through voice = over IP protocols, without allowing through other undesired = protocols.

Which brings us back to the firewall/NAT problem and = the need for pre-midcom/midcom solution!

Steve

-----Original Message-----
From: Saqib Jang [
mailto:saqibj@margallacomm.com]
Sent: 20 November 2001 18:16
To: Barry Scott; midcom@ietf.org
Subject: RE: [midcom] pre-midcom solutions !=3D = VPN


IPsec is a IETF standard protocol that can and is = being used
to create secure communication channels between = protected enterprise
networks and public networks for specific (e.g. = voice, video, storage)
or all protocols, which is clearly the goal behind = pre-midcom
work (i.e. how can media protocols securely = traverse
private/public network boundries of existing = networks). IPsec
end-points support crypto-based authentication and = optional
encryption allowing for the security of the = IPsec-based channels
to be beyond the capabilities of the proposed = drafts.

While IPsec has been used for site-to-site and remote = access
VPN deployment, its use is not limited to VPNs. For = example,
IP storage folks view IPsec as a critical enabler = for use of iSCSI
over metro or long-haul networks.

I'm not convinced that that there are clear-cut = technical advantages
of the proposed drafts over tunnel-mode IPsec. Plus, = IPR issues are
another reason why it would be preferable to look to = an existing standard.

Saqib

Saqib Jang
Margalla Communications, Inc.
3301 El Camino Real, Suite 220
Atherton, CA 94027
Ph: 650 298 8462
Fax: 650 368 8198
www.margallacomm.com


-----Original Message-----
From: midcom-admin@ietf.org [
mailto:midcom-admin@ietf.org]O= n Behalf Of
Barry Scott
Sent: Tuesday, November 20, 2001 9:27 AM
To: midcom@ietf.org
Subject: [midcom] pre-midcom solutions !=3D = VPN


We see VPNs as different from the technology that = pre-midcom solutions will
require.

Pre-midcom goal: the pre-midcom solution allows users = in a private network
to use voice and video IP terminals to communicate = with users outside their
private network. It has to allow private to public = network transition
without compromising security.

VPN goal: a VPN allows users at remote locations to = use resources within a
private network as if they are locally connected. = The VPN extends the
boundary of the private network to that remote = location, but it remains a
private network. Tunneling happens to be the = technique used to make that
extension. No crossing of the boundary from the = private network to the
public network occurs. VPN technology often = incorporates firewall technology
to ensure the private boundary remains protected = through the extension to
the remote location.

A VPN is a good choice when you wish to allow a = trusted remote user or
remote site to be added to your network from = outside. Examples: a home
worker, a branch office.

There may be superficial similarities between VPN and = pre-midcom technology,
but fundamentally the functionality is diametrically = opposed.

        BArry

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C171F2.7CAD96E0-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Tue Nov 20 14:53:36 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA01916 for ; Tue, 20 Nov 2001 14:53:35 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id OAA02849 for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 14:53:39 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA02760; Tue, 20 Nov 2001 14:46:08 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA02733 for ; Tue, 20 Nov 2001 14:46:06 -0500 (EST) Received: from pop.mainstreet.net (smtp.mainstreet.net [207.5.0.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA01619 for ; Tue, 20 Nov 2001 14:46:01 -0500 (EST) Received: from vip (saqibj.mainstreet.net [207.5.1.168]) by pop.mainstreet.net (8.11.3/8.11.3) with SMTP id fAKJjwP13680; Tue, 20 Nov 2001 11:45:59 -0800 (PST) Reply-To: From: "Saqib Jang" To: "Steve Davies" , Cc: "Barry Scott" Subject: RE: [midcom] pre-midcom solutions != VPN Date: Tue, 20 Nov 2001 11:53:10 -0800 Message-ID: MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_001E_01C171B9.ECF433C0" X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) Importance: Normal In-Reply-To: <00533D13955AD411AF3800A0C9B42639172486@ThisAddressDoesNotExist> X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This is a multi-part message in MIME format. ------=_NextPart_000_001E_01C171B9.ECF433C0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit RE: [midcom] pre-midcom solutions != VPNThe focus of the thread is on pre-midcom work (i.e. secure media traversal of *existing* firewalls/NATs that may or may not have media intelligence) not on the midcom framework, so I think it would be helpful to not lump both aspects together. 1. Implementing IPsec across firewalls should not/does not leave 'gaping holes' within firewalls. From my standpoint, implement a tunnelling protocol that is a widespread standard and one that has strong security capabilities makes for much more simplified enterprise security policy management. 2. I don't see a problem with providers having the choice of deploying application-aware firewall and NAT services within the 'cloud'. Is it a pre-midcom goal to prevent SPs from from doing this? As I understood it, the goal of the pre-midcom work was to remove the compatibility issues that installed *enterprise* firewalls have with media protocols. Saqib -----Original Message----- From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of Steve Davies Sent: Tuesday, November 20, 2001 10:38 AM To: 'saqibj@margallacomm.com'; midcom@ietf.org Cc: Barry Scott Subject: RE: [midcom] pre-midcom solutions != VPN Of course tunnels can be used between trusted parties. But a pre-midcom/midcom solution must support open communications - the ability for anyone to call anyone else. VPN technology or tunnel-mode IPSEC (they're equivalent in this context) cannot be used to construct a pre-midcom/midcom solution. Any attempt will leave gaping holes in the private/public network boundary. Plugging the hole requires firewalls and NATs that require a pre-midcom/midcom solution - catch-22! The catch goes something like this: To use VPN technology for inter-enterprise communication, a service provider or communications broker would be required to connect to every VPN. An application-aware NAT function is required that can map all private IP addresses to unique IP addresses in a shared address space, otherwise inter-enterprise calls will fail. This requires a signalling proxy to NAT the signalling, and an RTP Proxy to NAT the media. For security reasons, the service provider or enterprise must also provide a firewall on every VPN to prevent malicious attacks and unauthorized access from other enterprises or from the public network. These firewalls will have the same problems as enterprise firewalls that wish to allow through voice over IP protocols, without allowing through other undesired protocols. Which brings us back to the firewall/NAT problem and the need for pre-midcom/midcom solution! Steve -----Original Message----- From: Saqib Jang [mailto:saqibj@margallacomm.com] Sent: 20 November 2001 18:16 To: Barry Scott; midcom@ietf.org Subject: RE: [midcom] pre-midcom solutions != VPN IPsec is a IETF standard protocol that can and is being used to create secure communication channels between protected enterprise networks and public networks for specific (e.g. voice, video, storage) or all protocols, which is clearly the goal behind pre-midcom work (i.e. how can media protocols securely traverse private/public network boundries of existing networks). IPsec end-points support crypto-based authentication and optional encryption allowing for the security of the IPsec-based channels to be beyond the capabilities of the proposed drafts. While IPsec has been used for site-to-site and remote access VPN deployment, its use is not limited to VPNs. For example, IP storage folks view IPsec as a critical enabler for use of iSCSI over metro or long-haul networks. I'm not convinced that that there are clear-cut technical advantages of the proposed drafts over tunnel-mode IPsec. Plus, IPR issues are another reason why it would be preferable to look to an existing standard. Saqib Saqib Jang Margalla Communications, Inc. 3301 El Camino Real, Suite 220 Atherton, CA 94027 Ph: 650 298 8462 Fax: 650 368 8198 www.margallacomm.com -----Original Message----- From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of Barry Scott Sent: Tuesday, November 20, 2001 9:27 AM To: midcom@ietf.org Subject: [midcom] pre-midcom solutions != VPN We see VPNs as different from the technology that pre-midcom solutions will require. Pre-midcom goal: the pre-midcom solution allows users in a private network to use voice and video IP terminals to communicate with users outside their private network. It has to allow private to public network transition without compromising security. VPN goal: a VPN allows users at remote locations to use resources within a private network as if they are locally connected. The VPN extends the boundary of the private network to that remote location, but it remains a private network. Tunneling happens to be the technique used to make that extension. No crossing of the boundary from the private network to the public network occurs. VPN technology often incorporates firewall technology to ensure the private boundary remains protected through the extension to the remote location. A VPN is a good choice when you wish to allow a trusted remote user or remote site to be added to your network from outside. Examples: a home worker, a branch office. There may be superficial similarities between VPN and pre-midcom technology, but fundamentally the functionality is diametrically opposed. BArry _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom ------=_NextPart_000_001E_01C171B9.ECF433C0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom solutions !=3D VPN
The=20 focus of the thread is on pre-midcom work (i.e. secure =
media=20 traversal of *existing* firewalls/NATs that may or may = not
have=20 media intelligence) not on the midcom framework, so I think=20
it=20 would be helpful to not lump both aspects = together.
 
1.=20 Implementing IPsec across firewalls should not/does not leave=20 'gaping
holes'=20 within firewalls. From my standpoint, implement a = tunnelling
protocol  that is a widespread standard = and one=20 that has strong
security capabilities makes for much more = simplified=20 enterprise security
policy=20 management.
 
2. I=20 don't see a problem with providers having the choice of=20 deploying
application-aware firewall and NAT services = within the=20 'cloud'. Is
it a=20 pre-midcom goal to prevent SPs from from doing this? As = I
understood it, the goal of the pre-midcom = work was to=20 remove the
compatibility issues that installed = *enterprise*=20 firewalls have with media
protocols.
 
Saqib
 
-----Original Message-----
From: = midcom-admin@ietf.org=20 [mailto:midcom-admin@ietf.org]On Behalf Of Steve = Davies
Sent:=20 Tuesday, November 20, 2001 10:38 AM
To: = 'saqibj@margallacomm.com';=20 midcom@ietf.org
Cc: Barry Scott
Subject: RE: = [midcom]=20 pre-midcom solutions !=3D VPN

Of course tunnels can be used between trusted = parties. But a=20 pre-midcom/midcom solution must support open communications - the = ability for=20 anyone to call anyone else. VPN technology or tunnel-mode IPSEC = (they're=20 equivalent in this context) cannot be used to construct a = pre-midcom/midcom=20 solution. Any attempt will leave gaping holes in the private/public = network=20 boundary. Plugging the hole requires firewalls and NATs that require a = pre-midcom/midcom solution - catch-22!

The catch goes something like this:

To use VPN technology for inter-enterprise = communication, a=20 service provider or communications broker would be required to connect = to=20 every VPN. An application-aware NAT function is required that can map = all=20 private IP addresses to unique IP addresses in a shared address space, = otherwise inter-enterprise calls will fail. This requires a signalling = proxy=20 to NAT the signalling, and an RTP Proxy to NAT the media.  For = security=20 reasons, the service provider or enterprise must also provide a = firewall on=20 every VPN to prevent malicious attacks and unauthorized access from = other=20 enterprises or from the public network. These firewalls will have the = same=20 problems as enterprise firewalls that wish to allow through voice over = IP=20 protocols, without allowing through other undesired = protocols.

Which brings us back to the firewall/NAT problem and = the need=20 for pre-midcom/midcom solution!

Steve

-----Original Message-----
From: Saqib=20 Jang [mailto:saqibj@margallacomm.com]=20
Sent: 20 November 2001 18:16
To:=20 Barry Scott; midcom@ietf.org
Subject: RE: = [midcom]=20 pre-midcom solutions !=3D VPN


IPsec is a IETF standard protocol that can and is = being=20 used
to create secure communication channels = between=20 protected enterprise
networks and public = networks for=20 specific (e.g. voice, video, storage)
or all = protocols, which is clearly the goal behind pre-midcom =
work (i.e. how can media protocols securely traverse
=
private/public network boundries of existing networks). = IPsec
=20
end-points support crypto-based authentication and=20 optional
encryption allowing for the = security of the=20 IPsec-based channels
to be beyond the = capabilities of=20 the proposed drafts.

While IPsec has been used for site-to-site and = remote=20 access
VPN deployment, its use is not = limited to VPNs.=20 For example,
IP storage folks view IPsec as = a critical=20 enabler for use of iSCSI
over metro or = long-haul=20 networks.

I'm not convinced that that there are clear-cut = technical=20 advantages
of the proposed drafts over = tunnel-mode=20 IPsec. Plus, IPR issues are
another reason = why it=20 would be preferable to look to an existing standard.

Saqib

Saqib Jang
Margalla = Communications,=20 Inc.
3301 El Camino Real, Suite 220 =
Atherton, CA 94027
Ph: 650 298 = 8462=20
Fax: 650 368 8198
www.margallacomm.com


-----Original Message-----
From:=20 midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On= Behalf=20 Of
Barry Scott
Sent: Tuesday,=20 November 20, 2001 9:27 AM
To: = midcom@ietf.org=20
Subject: [midcom] pre-midcom solutions !=3D = VPN


We see VPNs as different from the technology that = pre-midcom=20 solutions will
require.

Pre-midcom goal: the pre-midcom solution allows = users in a=20 private network
to use voice and video IP = terminals to=20 communicate with users outside their
private = network.=20 It has to allow private to public network transition
without compromising security.

VPN goal: a VPN allows users at remote locations to = use=20 resources within a
private network as if = they are=20 locally connected. The VPN extends the
boundary of the=20 private network to that remote location, but it remains a =
private network. Tunneling happens to be the technique used = to make=20 that
extension. No crossing of the boundary = from the=20 private network to the
public network = occurs. VPN=20 technology often incorporates firewall technology
to=20 ensure the private boundary remains protected through the extension = to=20
the remote location.

A VPN is a good choice when you wish to allow a = trusted remote=20 user or
remote site to be added to your = network from=20 outside. Examples: a home
worker, a branch=20 office.

There may be superficial similarities between VPN = and=20 pre-midcom technology,
but fundamentally the = functionality is diametrically opposed.

        BArry

_______________________________________________=20
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom =


_______________________________________________=20
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom=20

------=_NextPart_000_001E_01C171B9.ECF433C0-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Tue Nov 20 15:52:00 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05041 for ; Tue, 20 Nov 2001 15:52:00 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA04543 for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 15:52:04 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA04239; Tue, 20 Nov 2001 15:39:00 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA04202 for ; Tue, 20 Nov 2001 15:38:59 -0500 (EST) Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA04115 for ; Tue, 20 Nov 2001 15:38:54 -0500 (EST) Received: from BobP [63.67.143.2] by acmepacket.com (SMTPD32-7.04) id AF5F198101FE; Tue, 20 Nov 2001 15:38:55 -0500 Message-ID: <00f801c17202$de1f9f80$2300000a@acmepacket.com> From: "Bob Penfield" To: "Steve Davies" , "'John LaCour'" , Cc: "'Jonathan Rosenberg'" References: <00533D13955AD411AF3800A0C9B42639172481@ThisAddressDoesNotExist> Subject: Re: [midcom] new I-D on "symmetric STUN" Date: Tue, 20 Nov 2001 15:35:18 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit ----- Original Message ----- From: "Steve Davies" > One of the main reasons FANTOM has out-of-band signalling was to conform to > the spirit of RTP/RTCP by assigning consecutive port pairs to represent the > receive RTP/RTCP addresses at the intermediary. A single method 'Create > Media Flow' does that. Having grabbed a port pair, 2 UDP outbound > connections are needed to the intermediary to receive the respective RTP and > RTCP flows. Hence the Probes. > > TURN cannot conform to the spirit of RTP in this way because the ALLOCATE > method only reserves a single transport address on the intermediary. If it > requested 2 transport addresses, a probe or very similar mechanism would be > required to establish the second outbound UDP connection. Even worse, the > way TURN is specified, there is a good chance that as a TURN server runs out > of resource the associated RTP and RTCP transport addresses could have > different IP addresses. NOT ALLOWED. The ALLOCATE method could be modified to include a "number of ports" attribute to request an allocation of 2 consecutive ports. > > There are many other advantages to using a separate Probe message. One very > good use of probes is to keep NAT bindings assigned, i.e. they are sent at > regular intervals to prevent the NAT from timing out. TURN has no probe or > NAT keep-alive methods which breaks the solution on at least 2 counts. The STUN document does mention that "the application can periodically retransmit the query in order to keep the binding fresh". The client will need to send STUN "Request" type messages to the TURN server to keep the binding alive. The STUN "Request" could be sent to the 2nd allocated port to establish the binding. > In > one case, a terminal may make an ALLOCATE to obtain an address with which to > register with a public SIP proxy. It then sits there waiting to receive > incoming calls. However, without some traffic such as a probe or a NAT keep > alive, the NAT assignment created by the ALLOCATE times out, which means the > terminal won't receive incoming call notifications. Not a real good example, since a terminal will send REGISTER requests to the SIP proxy on a regular basis (This will keep the NAT binding alive if the registration interval is short enough). But you are correct that "keep alives" will be required. > A second case when the > NAT binding may time out is when the remote party is not talking and their > terminal implements silence suppression. > > FANTOM uses probes to ensure this doesn't happen. In FANTOM probes are > designed to be easily recognisable in order to help the implementation of an > efficient forwarding intermediary. Again, STUN explicitly mentions these keep alives and they could be used once the TURN allocation is done. > > * TURN doesn't use a tunnel. FANTOM does. Some think that this implies > FANTOM is a VPN variant. FANTOM is most definitely not, but we'll deal with > that separately. FANTOM uses a tunnel for multiplexing out-of-band call > control and the out-of-band FANTOM client-server protocol into a single > connection. The connection is TCP because we valued reliability and the > life-time is more easily managed by the NAT. It could be UDP but we didn't > feel we needed to re-invent a UDP session with TCP characteristics. > > We envisaged that the client end of FANTOM would be implemented in severals > ways. For example, it could be implemented in a standalone system, serving > many terminals in a single enterprise. In Centrex applications there would > be no local proxy. In this case the FANTOM client would have to handle > multiple simultaneous call setups and cleardowns. We judged a single > persistant tunnel for all call control from the FANTOM client to FANTOM > server was the most efficient use of resources. Isn't this really the same as putting a proxy in the exterprise and having it connect to the proxy in the public network over TCP? Why is FANTOM better than adding a proxy? If FANTOM is present in the terminal, you have a tunnel for every terminal. If you have a FANTOM client, then all the terminals need to send signalling to the FANTOM client. Doesn't that make it a proxy? > > To avoid tunnels, a similar TURN implementation would require the standalone > client to create many UDP connections to the intermediary - one for each > terminal wanting to receive incoming calls. As we remarked above, these UDP > connections need to keep NAT bindings through some sort of NAT-keep-alive > messages. The SEN proposal implemented a similar technique and found it to > be too resource intensive - hence their SIP proposal extensions. For residential and small enterprises, there won't be too many UDP connections. Alternatively, they can use TCP connections. For larger enterprises or networks, for the same cost as a FANTOM client, a proxy could be installed which accepts the UDP connections and connects to the public proxy with TCP (or even a single UDP connection). > > Having a tunnel in FANTOM has further advantages, not least in allowing > out-of-band signalling and control. The benefit here is that the protocol > can be extended to include other functions such as network management > without breaking the architecture. We want FANTOM to be extensible. I don't think there is a need for a tunnel. With STUN/TURN, setup of the media binding occurs inband so there is no need for extra "signalling" to do that. The applications can use TCP or STUN to make signalling connections. With that, there is no need for a tunnel. > > This email is getting quite long so I'll conclude by remarking that I hope > that these explanations indicate that while FANTOM appears more complex > than TURN, there is a reason behind each method FANTOM implements. We > haven't made it complex for complexity's sake. FANTOM may be unfamiliar, but > that's no reason to start from scratch which I fear TURN is. I don't think that TURN is starting from scratch. The basic concepts have been presented in a couple of IDs for several months now. STUN and TURN give us relatively simple tools that can be combined in various ways to solve a number of different problems. Because they are so simple, they will be easy to implement and add into existing products. _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Tue Nov 20 15:53:35 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05178 for ; Tue, 20 Nov 2001 15:53:35 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA04616 for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 15:53:39 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA04583; Tue, 20 Nov 2001 15:52:16 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA04556 for ; Tue, 20 Nov 2001 15:52:15 -0500 (EST) Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05057 for ; Tue, 20 Nov 2001 15:52:09 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fAKKlvE26389; Tue, 20 Nov 2001 12:47:57 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ABZ66771; Tue, 20 Nov 2001 12:47:29 -0800 (PST) Message-Id: <5.1.0.14.0.20011120154728.00a661a0@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Tue, 20 Nov 2001 15:50:12 -0500 To: "Bob Penfield" , "Steve Davies" , "'John LaCour'" , From: Melinda Shore Subject: Re: [midcom] new I-D on "symmetric STUN" Cc: "'Jonathan Rosenberg'" In-Reply-To: <00f801c17202$de1f9f80$2300000a@acmepacket.com> References: <00533D13955AD411AF3800A0C9B42639172481@ThisAddressDoesNotExist> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org I think that this is a good discussion. One thing that might help us make progress towards getting this done quickly would be to start identifying points on which there is agreement and making them explicit/on the record/etc. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Wed Nov 21 00:04:41 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA18564 for ; Wed, 21 Nov 2001 00:04:40 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id AAA15978 for midcom-archive@odin.ietf.org; Wed, 21 Nov 2001 00:04:40 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA15956; Wed, 21 Nov 2001 00:03:15 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA15927 for ; Wed, 21 Nov 2001 00:03:14 -0500 (EST) Received: from mgo.iij.ad.jp (root@mgo.iij.ad.jp [202.232.15.6]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA18556 for ; Wed, 21 Nov 2001 00:03:13 -0500 (EST) Received: from ns.iij.ad.jp (ns.iij.ad.jp [192.168.2.8]) by mgo.iij.ad.jp (8.8.8/MGO1.0) with ESMTP id OAA09900; Wed, 21 Nov 2001 14:02:11 +0900 (JST) Received: from zeus (h188n005.iij.ad.jp [192.168.5.188]) by ns.iij.ad.jp (8.8.5/3.5Wpl7) with ESMTP id OAA01893; Wed, 21 Nov 2001 14:02:11 +0900 (JST) To: bscott@ridgewaysystems.com, midcom@ietf.org Subject: Re: [midcom] pre-midcom solutions != VPN From: Kuniaki Kondo References: <00533D13955AD411AF3800A0C9B426390EC4E8@ThisAddressDoesNotExist> In-Reply-To: <00533D13955AD411AF3800A0C9B426390EC4E8@ThisAddressDoesNotExist> Message-Id: <200111211402.GBI04005.VJLOJBL@iij.ad.jp> X-Mailer: Winbiff [Version 2.34beta3] X-Accept-Language: ja,en Date: Wed, 21 Nov 2001 14:02:11 +0900 Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Hi, "Barry Scott " (Tue, 20 Nov 2001 17:27:25 -0000) wrote: > We see VPNs as different from the technology that pre-midcom solutions will > require. > > Pre-midcom goal: the pre-midcom solution allows users in a private network > to use voice and video IP terminals to communicate with users outside their > private network. It has to allow private to public network transition > without compromising security. > > VPN goal: a VPN allows users at remote locations to use resources within a > private network as if they are locally connected. The VPN extends the > boundary of the private network to that remote location, but it remains a > private network. Tunneling happens to be the technique used to make that > extension. No crossing of the boundary from the private network to the > public network occurs. VPN technology often incorporates firewall technology > to ensure the private boundary remains protected through the extension to > the remote location. > > A VPN is a good choice when you wish to allow a trusted remote user or > remote site to be added to your network from outside. Examples: a home > worker, a branch office. > > There may be superficial similarities between VPN and pre-midcom technology, > but fundamentally the functionality is diametrically opposed. I agree with you. VPN solution might need for enterprise user or some branch office. However, I think that VPN solution is very complex solution for end-users such as home user. I think that end-user needs more simple solution. For example, end-user want to communicate between private network to private network without changing applications or OSes. (Private network means that hosts are placed the network behind NAT.) And, End users need a solution as soon as possible, I think. I mean that enterprise user and home user(end-user) have different requirements for communicating through NATs/FWs. Do we consider to separate those situation? -- Kuniaki Kondo kuniaki@iij.ad.jp _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 22 04:31:48 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA11333 for ; Thu, 22 Nov 2001 04:31:48 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id EAA15917 for midcom-archive@odin.ietf.org; Thu, 22 Nov 2001 04:31:50 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA15488; Thu, 22 Nov 2001 04:22:54 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA15459 for ; Thu, 22 Nov 2001 04:22:53 -0500 (EST) Received: from rhenium (rhenium.btinternet.com [194.73.73.93]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA11228 for ; Thu, 22 Nov 2001 04:22:50 -0500 (EST) Received: from [213.122.105.59] (helo=tkw) by rhenium with smtp (Exim 3.22 #8) id 166q4H-0006hv-00; Thu, 22 Nov 2001 09:22:50 +0000 Message-ID: <002f01c1732a$1cf4a3e0$0200000a@tkw> From: "Pete Cordell" To: "Bob Penfield" , Date: Thu, 22 Nov 2001 07:46:31 -0000 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Content-Transfer-Encoding: 7bit Subject: [midcom] 2 x ALLOCATE == FANTOM Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Bob, You have raised a number of issues here which I think it would be useful to address. I've taken the liberty of breaking them out into a number of separate threads so that they're easier to keep track of. Hope you don't mind. Steve Davies wrote: >> TURN cannot conform to the spirit of RTP in this way because the ALLOCATE >> method only reserves a single transport address on the intermediary. If >> it >> requested 2 transport addresses, a probe or very similar mechanism would >> be >> required to establish the second outbound UDP connection. Even worse, the >> way TURN is specified, there is a good chance that as a TURN server runs >> out >> of resource the associated RTP and RTCP transport addresses could have >> different IP addresses. NOT ALLOWED. To which Bob replied: > The ALLOCATE method could be modified to include a "number of ports" > attribute to request an allocation of 2 consecutive ports. and: > The STUN "Request" could be sent to the 2nd allocated port to > establish the binding. This line of reasoning basically leads to FANTOM (or something similar!) as follows. If you use TURN to allocate two ports in one message, you need a way to associate the second port with the original allocation message. In FANTOM we do this by returning an identifier in the equivalent of the allocate response. We then include that identifier in a probe (equivalent to the STUN request in Bob's suggestion) sent to the server. This allows the server to do the association. With this method, the second port is effectively being set up using out-of-band signalling. Having the second port requiring out-of-band signalling, removes any benefit of having in-band signalling for the first port. We have also found that there are many benefits to having an out-of-band signalling method. For example, we are also able to explicitly close the forwarding operation. The latter is a great comfort to a number of network administrators! We can also see the many benefits that out-of-band signalling allows in many other technology areas, such as the telephony network. The adoption of out-of-band signalling has allowed many new features to be added to such systems in response to customer requirements. Put simply, it allows for extensibility. We suggested TCP for the control channel because that gives us the reliability we need, simplifying the operation of the code. It also means that we could readily reuse things like TLS for security. Pete. ============================================= Pete Cordell Tech-Know-Ware pete@tech-know-ware.com +44 1473 635863 ============================================= _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 22 11:16:06 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA18057 for ; Thu, 22 Nov 2001 11:16:06 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA26474 for midcom-archive@odin.ietf.org; Thu, 22 Nov 2001 11:16:08 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA26369; Thu, 22 Nov 2001 11:08:32 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA26338 for ; Thu, 22 Nov 2001 11:08:30 -0500 (EST) Received: from gadolinium.btinternet.com (gadolinium.btinternet.com [194.73.73.111]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA17913 for ; Thu, 22 Nov 2001 11:08:27 -0500 (EST) Received: from [213.122.21.54] (helo=tkw) by gadolinium.btinternet.com with smtp (Exim 3.22 #8) id 166wOc-0005VU-00; Thu, 22 Nov 2001 16:08:15 +0000 Message-ID: <005e01c1736f$b477d1c0$0200000a@tkw> From: "Pete Cordell" To: "Bob Penfield" , Date: Thu, 22 Nov 2001 16:05:10 -0000 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Content-Transfer-Encoding: 7bit Subject: [midcom] Proxy + Traversal => FANTOM Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Bob, This addresses another of the threads you raised. Steve Davies wrote: >> In this case the FANTOM client would have to handle >> multiple simultaneous call setups and cleardowns. We judged a single >> persistant tunnel for all call control from the FANTOM client to FANTOM >> server was the most efficient use of resources. To which Bob replied: > Isn't this really the same as putting a proxy in the exterprise and having > it connect to the proxy in the public network over TCP? Why is FANTOM > better than adding a proxy? If FANTOM is present in the terminal, you have > a tunnel for every terminal. If you have a FANTOM client, then all the terminals > need to send signalling to the FANTOM client. Doesn't that make it a proxy? The problem is that a proxy on its own is not sufficient to traverse the firewall and NAT combination. What you need is proxy + traversal solution. In our case, proxy + traversal solution => FANTOM (as does client + traversal solution => FANTOM). This is why we multiplex the control channel. We need both the native signalling protocol (e.g. SIP) and the out-of-band traversal control protocol (see previous e-mail for why we have it out-of-band) to pass between the private and public proxies. Muxing them over the same connection reduces the number of rules required in the firewall, and saves resources. As the TCP connection will have already been established to make the call, then there is also no over-head associated with establishing a new TCP connection for the traversal control protocol. Pete. ============================================= Pete Cordell Tech-Know-Ware pete@tech-know-ware.com +44 1473 635863 ============================================= _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 22 11:17:40 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA18081 for ; Thu, 22 Nov 2001 11:17:40 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA26521 for midcom-archive@odin.ietf.org; Thu, 22 Nov 2001 11:17:42 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA26418; Thu, 22 Nov 2001 11:10:23 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA26389 for ; Thu, 22 Nov 2001 11:10:21 -0500 (EST) Received: from carbon.btinternet.com (carbon.btinternet.com [194.73.73.92]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA17928 for ; Thu, 22 Nov 2001 11:10:18 -0500 (EST) Received: from [213.122.21.54] (helo=tkw) by carbon.btinternet.com with smtp (Exim 3.22 #8) id 166wQd-00066D-00; Thu, 22 Nov 2001 16:10:19 +0000 Message-ID: <005f01c1736f$fe8cf7e0$0200000a@tkw> From: "Pete Cordell" To: "Bob Penfield" , Date: Thu, 22 Nov 2001 16:08:55 -0000 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Content-Transfer-Encoding: 7bit Subject: [midcom] Client Vs. Proxy Traversal Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Bob, This thread brings out something else... Steve Davies wrote: >> In this case the FANTOM client would have to handle >> multiple simultaneous call setups and cleardowns. We judged a single >> persistant tunnel for all call control from the FANTOM client to FANTOM >> server was the most efficient use of resources. To which Bob replied: > Isn't this really the same as putting a proxy in the exterprise and having > it connect to the proxy in the public network over TCP? Why is FANTOM > better than adding a proxy? If FANTOM is present in the terminal, you have > a tunnel for every terminal. If you have a FANTOM client, then all the terminals > need to send signalling to the FANTOM client. Doesn't that make it a proxy? By mentioning a proxy you raise an interesting issue. In the enterprise case, FANTOM sits well where an ordinary proxy might sit, that is within the boundary of the firewall installation (hence the name Application Proxy). In this respect it is augmenting the functionality of the firewall installation. This is not a pleasant thought if you only want end-to-end working. However, the firewall has already broken that. What it does mean though is that the firewall is able to allow packets to/from the application proxy to pass through that it might not otherwise allow from clients. It can do this in the knowledge that the Application Proxy is forwarding only one particular protocol, and the Application Proxy can also do all sorts of other stateful inspection exercises in order to check that things are as they should be. It's much like adding an ALG to the firewall and NAT, except that in this case it is located external to them. As such it complements the firewall / NAT functionality, but does not require the firewall / NAT itself to be upgraded. Therefore it can be quickly deployed, and is an ideal approach for a pre-midcom solution. On the other hand, if you deploy TURN or FANTOM on the clients, the administrator has no way of knowing what they will be used for. For a number of environments this will not be acceptable, and won't lead to the deployment of desktop VoIP. Pete. ============================================= Pete Cordell Tech-Know-Ware pete@tech-know-ware.com +44 1473 635863 ============================================= _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 23 11:45:02 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA19217 for ; Fri, 23 Nov 2001 11:45:02 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA03430 for midcom-archive@odin.ietf.org; Fri, 23 Nov 2001 11:45:05 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA03372; Fri, 23 Nov 2001 11:35:55 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA03341 for ; Fri, 23 Nov 2001 11:35:53 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA19128 for ; Fri, 23 Nov 2001 11:35:48 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112316324625792 ; Fri, 23 Nov 2001 16:32:46 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Fri, 23 Nov 2001 16:34:48 -0000 Message-ID: <00533D13955AD411AF3800A0C9B426390EC4FA@ThisAddressDoesNotExist> From: Barry Scott To: "'Saqib Jang'" , midcom@ietf.org Subject: RE: [midcom] pre-midcom solutions != VPN Date: Fri, 23 Nov 2001 16:34:39 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C1743C.BED7D480" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C1743C.BED7D480 Content-Type: text/plain; charset="ISO-8859-1" Saqib, Maybe we are talking at cross purposes. I think that IPsec is used to add authentication and encryption to IP data. Which is a different topic from a VPN routing data between two parts of a private network over a public network. (Or indeed two parts of the public network over a private network). Of course when someone wants a secure VPN solution that solution may use IPsec. IPsec has its own set of problems with NAPT that stop it working today, but I understand that solutions are in development. I wanted to point out that pre-midcom work is different to a traditional VPN, because each end of a VPN shares the same address space, 10.0.0.0/8 for example. Where each end of a pre-midcom is in a different address space, one end in the public internet the other in a 10.0.0.0/8 for example. I cannot see how to use a VPN to make VOIP protocols work between private IP address space and a shared public IP address space. Barry www.ridgewaysystems.com ------_=_NextPart_001_01C1743C.BED7D480 Content-Type: text/html; charset="ISO-8859-1" RE: [midcom] pre-midcom solutions != VPN

Saqib,

Maybe we are talking at cross purposes. I think that IPsec is used to add
authentication and encryption to IP data. Which is a different topic from
a VPN routing data between two parts of a private network over a public
network. (Or indeed two parts of the public network over a private network).

Of course when someone wants a secure VPN solution that solution may use
IPsec. IPsec has its own set of problems with NAPT that stop it working
today, but I understand that solutions are in development.

I wanted to point out that pre-midcom work is different to a traditional
VPN, because each end of a VPN shares the same address space, 10.0.0.0/8
for example. Where each end of a pre-midcom is in a different address
space, one end in the public internet the other in a 10.0.0.0/8 for example.

I cannot see how to use a VPN to make VOIP protocols work between private
IP address space and a shared public IP address space.

        Barry


www.ridgewaysystems.com

------_=_NextPart_001_01C1743C.BED7D480-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 23 15:05:58 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22730 for ; Fri, 23 Nov 2001 15:05:58 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA07586 for midcom-archive@odin.ietf.org; Fri, 23 Nov 2001 15:06:02 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA07526; Fri, 23 Nov 2001 15:04:50 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA07499 for ; Fri, 23 Nov 2001 15:04:49 -0500 (EST) Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22720 for ; Fri, 23 Nov 2001 15:04:44 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fANK4Gl16376; Fri, 23 Nov 2001 12:04:17 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ACA22032; Fri, 23 Nov 2001 12:03:48 -0800 (PST) Message-Id: <5.1.0.14.0.20011123150254.00a5e200@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Fri, 23 Nov 2001 15:06:51 -0500 To: Barry Scott , "'Saqib Jang'" , midcom@ietf.org From: Melinda Shore Subject: RE: [midcom] pre-midcom solutions != VPN In-Reply-To: <00533D13955AD411AF3800A0C9B426390EC4FA@ThisAddressDoesNotE xist> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 04:34 PM 11/23/01 +0000, Barry Scott wrote: >I cannot see how to use a VPN to make VOIP protocols work between private >IP address space and a shared public IP address space. VPNs don't always use separate address spaces. Also, it's not that endpoints on a VPN already all share an address space - it's more typically the case that an address that's routable within the VPN is *loaned* to the endpoint when it joins the VPN. The pre-midcom work is intended address cases that are not currently handled by existing technology. Let's move on, please. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 23 15:06:30 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22748 for ; Fri, 23 Nov 2001 15:06:29 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA07601 for midcom-archive@odin.ietf.org; Fri, 23 Nov 2001 15:06:34 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA07571; Fri, 23 Nov 2001 15:05:55 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA07542 for ; Fri, 23 Nov 2001 15:05:53 -0500 (EST) Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22726 for ; Fri, 23 Nov 2001 15:05:48 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fANK5LE23661 for ; Fri, 23 Nov 2001 12:05:21 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ACA22034; Fri, 23 Nov 2001 12:04:53 -0800 (PST) Message-Id: <5.1.0.14.0.20011123150654.00a69030@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Fri, 23 Nov 2001 15:07:55 -0500 To: midcom@ietf.org From: Melinda Shore Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: [midcom] Last call reminder Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This is a reminder that working group last call for the midcom framework document ends on the 27th. If you haven't yet given the document a good read, please do. Thanks, Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Sun Nov 25 09:21:15 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA20388 for ; Sun, 25 Nov 2001 09:21:15 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id JAA04383 for midcom-archive@odin.ietf.org; Sun, 25 Nov 2001 09:21:18 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA03738; Sun, 25 Nov 2001 08:36:34 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA03710 for ; Sun, 25 Nov 2001 08:36:33 -0500 (EST) Received: from web14107.mail.yahoo.com (web14107.mail.yahoo.com [216.136.172.137]) by ietf.org (8.9.1a/8.9.1a) with SMTP id IAA20075 for ; Sun, 25 Nov 2001 08:36:30 -0500 (EST) Message-ID: <20011125133632.72754.qmail@web14107.mail.yahoo.com> Received: from [209.226.122.26] by web14107.mail.yahoo.com via HTTP; Sun, 25 Nov 2001 05:36:32 PST Date: Sun, 25 Nov 2001 05:36:32 -0800 (PST) From: Mark Taylor To: Jonathan Rosenberg , "'midcom@ietf.org'" In-Reply-To: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Subject: [midcom] STUN/TURN vs Davies (FANTOM) Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org STUN/TURN and the Davies (FANTOM) proposals are marked by different emphaisises in achieving the same objective. STUN/TURN emphasizes simplicity. Davies emphasizes security with its addressing of firewall issues. The other differences between the protocols seem only to be variations on a theme and not consequential to the overall problem. I asked a security specialist about the Davies proposal's firewall claims. He found them to be unconvincing with the observation that many people have inflated ideas about what firewalls can do. If the Davies firewall strategy is, as with this view, ineffective, it only adds complexity and cost without providing real benefit. STUN/TURN will provide the same level of security with a simpler and less costly proposal. Is this view correct? __________________________________________________ Do You Yahoo!? Yahoo! GeoCities - quick and easy web site hosting, just $8.95/month. http://geocities.yahoo.com/ps/info1 _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 06:23:45 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA19884 for ; Mon, 26 Nov 2001 06:23:41 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id GAA04878 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 06:22:47 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id GAA04630; Mon, 26 Nov 2001 06:18:24 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id GAA04599 for ; Mon, 26 Nov 2001 06:18:22 -0500 (EST) Received: from CNRI.Reston.VA.US (localhost [127.0.0.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA19597; Mon, 26 Nov 2001 06:18:19 -0500 (EST) Message-Id: <200111261118.GAA19597@ietf.org> Mime-Version: 1.0 Content-Type: Multipart/Mixed; Boundary="NextPart" To: IETF-Announce: ; Cc: midcom@ietf.org From: Internet-Drafts@ietf.org Reply-to: Internet-Drafts@ietf.org Date: Mon, 26 Nov 2001 06:18:18 -0500 Subject: [midcom] I-D ACTION:draft-ietf-midcom-requirements-04.txt Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org --NextPart A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Middlebox Communication Working Group of the IETF. Title : Middlebox Communications (MIDCOM) Protocol Requirements Author(s) : R. Swale, P. Mart, P. Sijben, S. Brim, M. Shore Filename : draft-ietf-midcom-requirements-04.txt Pages : 10 Date : 21-Nov-01 This document specifies the requirements that the Middlebox Commu- nication (midcom) protocol must satisfy in order to meet the needs of applications wishing to influence middlebox function. These requirements were developed with a specific focus on network address translation and firewall middleboxes. A URL for this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-midcom-requirements-04.txt To remove yourself from the IETF Announcement list, send a message to ietf-announce-request with the word unsubscribe in the body of the message. Internet-Drafts are also available by anonymous FTP. Login with the username "anonymous" and a password of your e-mail address. After logging in, type "cd internet-drafts" and then "get draft-ietf-midcom-requirements-04.txt". A list of Internet-Drafts directories can be found in http://www.ietf.org/shadow.html or ftp://ftp.ietf.org/ietf/1shadow-sites.txt Internet-Drafts can also be obtained by e-mail. Send a message to: mailserv@ietf.org. In the body type: "FILE /internet-drafts/draft-ietf-midcom-requirements-04.txt". NOTE: The mail server at ietf.org can return the document in MIME-encoded form by using the "mpack" utility. To use this feature, insert the command "ENCODING mime" before the "FILE" command. To decode the response(s), you will need "munpack" or a MIME-compliant mail reader. Different MIME-compliant mail readers exhibit different behavior, especially when dealing with "multipart" MIME messages (i.e. documents which have been split up into multiple messages), so check your local documentation on how to manipulate these messages. Below is the data which will enable a MIME compliant mail reader implementation to automatically retrieve the ASCII version of the Internet-Draft. --NextPart Content-Type: Multipart/Alternative; Boundary="OtherAccess" --OtherAccess Content-Type: Message/External-body; access-type="mail-server"; server="mailserv@ietf.org" Content-Type: text/plain Content-ID: <20011121141934.I-D@ietf.org> ENCODING mime FILE /internet-drafts/draft-ietf-midcom-requirements-04.txt --OtherAccess Content-Type: Message/External-body; name="draft-ietf-midcom-requirements-04.txt"; site="ftp.ietf.org"; access-type="anon-ftp"; directory="internet-drafts" Content-Type: text/plain Content-ID: <20011121141934.I-D@ietf.org> --OtherAccess-- --NextPart-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 09:26:08 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA28561 for ; Mon, 26 Nov 2001 09:26:08 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id JAA08843 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 09:26:12 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA08724; Mon, 26 Nov 2001 09:22:18 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA08697 for ; Mon, 26 Nov 2001 09:22:17 -0500 (EST) Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA28309 for ; Mon, 26 Nov 2001 09:22:11 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fAQELdH20002 for ; Mon, 26 Nov 2001 06:21:39 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ACB18920; Mon, 26 Nov 2001 06:20:47 -0800 (PST) Message-Id: <5.1.0.14.0.20011126092248.00a737b0@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Mon, 26 Nov 2001 09:24:22 -0500 To: midcom@ietf.org From: Melinda Shore Subject: Fwd: [midcom] I-D ACTION:draft-ietf-midcom-requirements-04.txt Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org We are starting working group last call for the requirements document today. Last call ends on 10 December (which is also the date of our meeting in Salt Lake City). Melinda >To: IETF-Announce: ; >Cc: midcom@ietf.org >From: Internet-Drafts@ietf.org >Reply-to: Internet-Drafts@ietf.org >Date: Mon, 26 Nov 2001 06:18:18 -0500 >Subject: [midcom] I-D ACTION:draft-ietf-midcom-requirements-04.txt >Sender: midcom-admin@ietf.org >X-Mailman-Version: 1.0 >List-Id: >X-BeenThere: midcom@ietf.org > >A New Internet-Draft is available from the on-line Internet-Drafts directories. >This draft is a work item of the Middlebox Communication Working Group of the IETF. > > Title : Middlebox Communications (MIDCOM) Protocol > Requirements > Author(s) : R. Swale, P. Mart, P. Sijben, S. Brim, M. Shore > Filename : draft-ietf-midcom-requirements-04.txt > Pages : 10 > Date : 21-Nov-01 > >This document specifies the requirements that the Middlebox Commu- >nication (midcom) protocol must satisfy in order to meet the needs >of applications wishing to influence middlebox function. These >requirements were developed with a specific focus on network >address translation and firewall middleboxes. > >A URL for this Internet-Draft is: >http://www.ietf.org/internet-drafts/draft-ietf-midcom-requirements-04.txt > >To remove yourself from the IETF Announcement list, send a message to >ietf-announce-request with the word unsubscribe in the body of the message. > >Internet-Drafts are also available by anonymous FTP. Login with the username >"anonymous" and a password of your e-mail address. After logging in, >type "cd internet-drafts" and then > "get draft-ietf-midcom-requirements-04.txt". > >A list of Internet-Drafts directories can be found in >http://www.ietf.org/shadow.html >or ftp://ftp.ietf.org/ietf/1shadow-sites.txt > > >Internet-Drafts can also be obtained by e-mail. > >Send a message to: > mailserv@ietf.org. >In the body type: > "FILE /internet-drafts/draft-ietf-midcom-requirements-04.txt". > >NOTE: The mail server at ietf.org can return the document in > MIME-encoded form by using the "mpack" utility. To use this > feature, insert the command "ENCODING mime" before the "FILE" > command. To decode the response(s), you will need "munpack" or > a MIME-compliant mail reader. Different MIME-compliant mail readers > exhibit different behavior, especially when dealing with > "multipart" MIME messages (i.e. documents which have been split > up into multiple messages), so check your local documentation on > how to manipulate these messages. > > >Below is the data which will enable a MIME compliant mail reader >implementation to automatically retrieve the ASCII version of the >Internet-Draft. >Content-Type: text/plain >Content-ID: <20011121141934.I-D@ietf.org> > >ENCODING mime >FILE /internet-drafts/draft-ietf-midcom-requirements-04.txt > > _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 10:52:19 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA05533 for ; Mon, 26 Nov 2001 10:52:19 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id KAA12207 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 10:52:22 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA11569; Mon, 26 Nov 2001 10:46:07 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA11538 for ; Mon, 26 Nov 2001 10:46:05 -0500 (EST) Received: from argyre.fr.uu.net (mail.fr.uu.net [194.98.0.9]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA04730 for ; Mon, 26 Nov 2001 10:46:01 -0500 (EST) From: annuaire@annuairefrancais.com Received: from [213.11.39.71] ([213.11.39.71]) by argyre.fr.uu.net (8.9.3/8.8.7) with SMTP id QAA16494 for ; Mon, 26 Nov 2001 16:52:41 +0100 (MET) Message-Id: <200111261552.QAA16494@argyre.fr.uu.net> Mime-Version: 1.0 Content-Type: text/plain;charset="us-ascii" Content-Transfer-Encoding: 7bit Date: Mon, 26 Nov 2001 16:45:01 +0100 To: midcom@ietf.org Content-Transfer-Encoding: 7bit Subject: [midcom] Info : L'Annuaire Francais par Departement facilite vos recherches Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Bonjour, L'annuaire Francais Par departement http://www.annuairefrancais.com integre desormais un moteur de recherche pour affiner vos recherches sur le web. L'inscription reste gratuite et la validation toujours manuelle. L'adresse d'inscription est desormais http://inscrip.annuairefrancais.com Pour toutes suggestions contactez par mail : direction : laurent@annuairefrancais.com validation : validation@annuairefrancais.com publicite : publicite@annuairefrancais.com partenariat : partenariat@annuairefrancais.com INFORMATIONS : retrait de notre liste d'info : http://supressinfo.annuairefrancais.com (L'annuaire francais envoi 2 infos par an) L'annuaire Francais 119 Rue des Pyrenees 75020 PARIS +33 (0)1 43 67 00 74 _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 12:19:52 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA13894 for ; Mon, 26 Nov 2001 12:19:51 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA18572 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 12:19:55 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA14569; Mon, 26 Nov 2001 11:29:18 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA14167 for ; Mon, 26 Nov 2001 11:28:56 -0500 (EST) Received: from relay4.kornet.net ([211.48.62.164]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA08552 for ; Mon, 26 Nov 2001 11:28:47 -0500 (EST) Received: from localhost (61.72.136.249) by relay4.kornet.net; 27 Nov 2001 01:28:38 +0900 Message-ID: <3c026db63c1ecea8@relay4.kornet.net> (added by relay4.kornet.net) Reply-To: salearea3@airtkcketauction.co.kr From: (ÁÖ)Ç×°ø±Ç°æ¸Å To: midcom@ietf.org Mime-Version: 1.0 Content-Type: text/html; charset="ks_c_5601-1987" Date: Tue, 27 Nov 2001 01:34:47 +0900 Subject: [midcom] [±¤°í]°¡Àå Àú·ÅÇÑ Ç×°ø±ÇÀº Ç×°ø±Ç°æ¸Å¸¦ ÀÌ¿ëÇϼ¼¿ä. Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org ¡Ø ÀÌ ¸ÞÀÏÀº °Ô½ÃÆÇ¿¡¼­ ÀÓÀÇ·Î »ÌÀº °ÍÀÌ¿À´Ï,À̸ÞÀÏ Àܴ̿ ¾î¶°ÇÑ °³ÀÎÀÚ·áµµ ¾ËÁö ¸ø

  ¡Ø ÀÌ ¸ÞÀÏÀº °Ô½ÃÆÇ¿¡¼­ ÀÓÀÇ·Î »ÌÀº °ÍÀÌ¿À´Ï,À̸ÞÀÏ Àܴ̿ ¾î¶°ÇÑ °³ÀÎÀÚ·áµµ ¾ËÁö ¸ø
    ÇÕ´Ï´Ù.ÀÓÀÇÀûÀ¸·Î ó¸®ÇÑ ¸ÞÀÏ¿¡ ´ëÇØ¼­´Â ¼ö½Å°ÅºÎÇÏ¿© ÁÖ½Ã¸é ¸ÞÀÏÀ» ¹ß¼ÛÇÏÁö ¾Êµµ·Ï
    ÇϰڽÀ´Ï´Ù.
¢Ñ ¼ö½Å°ÅºÎ

 

_______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 13:03:57 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA16997 for ; Mon, 26 Nov 2001 13:03:57 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id NAA20505 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 13:04:00 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA20445; Mon, 26 Nov 2001 13:02:40 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA20416 for ; Mon, 26 Nov 2001 13:02:38 -0500 (EST) Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA16923 for ; Mon, 26 Nov 2001 13:02:35 -0500 (EST) Received: from imop.cisco.com (imop.cisco.com [171.69.11.44]) by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fAQI1WE08743; Mon, 26 Nov 2001 10:01:32 -0800 (PST) Received: from rmahy-home-nt (ssh-sj1.cisco.com [171.68.225.134]) by imop.cisco.com (Mirapoint) with ESMTP id ACB99690; Mon, 26 Nov 2001 10:01:31 -0800 (PST) Message-Id: <4.2.0.58.20011126093005.023975d0@lint.cisco.com> X-Sender: rmahy@lint.cisco.com (Unverified) X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.0.58 Date: Mon, 26 Nov 2001 09:54:56 -0800 To: midcom@ietf.org From: Rohan Mahy Cc: pete@tech-know-ware.com Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Subject: [midcom] client vs. proxy traversal Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Hi, I have a few comments inline... > * To: "Bob Penfield" , > * Subject: [midcom] Client Vs. Proxy Traversal > * From: "Pete Cordell" > * Date: Thu, 22 Nov 2001 16:08:55 -0000 > * List-Id: > * Sender: midcom-admin@ietf.org > >Bob, > >This thread brings out something else... > >Steve Davies wrote: >>> In this case the FANTOM client would have to handle >>> multiple simultaneous call setups and cleardowns. We judged a single >>> persistant tunnel for all call control from the FANTOM client to FANTOM >>> server was the most efficient use of resources. > >To which Bob replied: >> Isn't this really the same as putting a proxy in the exterprise and having >> it connect to the proxy in the public network over TCP? Why is FANTOM >> better than adding a proxy? If FANTOM is present in the terminal, you have >> a tunnel for every terminal. If you have a FANTOM client, then all the >terminals >> need to send signalling to the FANTOM client. Doesn't that make it a >proxy? > > >By mentioning a proxy you raise an interesting issue. In the enterprise >case, FANTOM sits well where an ordinary proxy might sit, that is within the >boundary of the firewall installation (hence the name Application Proxy). >In this respect it is augmenting the functionality of the firewall >installation. > >This is not a pleasant thought if you only want end-to-end working. >However, the firewall has already broken that. As Melinda stated, our focus for pre-midcom is NAT traversal, not firewall traversal. TURN takes advantantage of the "symmetric UDP" behavior of NATs to allow one end to talk to another without *control* of an intermediary. The fact that many firewalls also exhibit "symmetric UDP" behavior is just an added bonus. >What it does mean though is >that the firewall is able to allow packets to/from the application proxy >to pass through that it might not otherwise allow from clients. If the firewall administrator is willing to do this, it shouldn't be hard to allow symmetric UDP with a timeout. >It can do this in >the knowledge that the Application Proxy is forwarding only one >particular protocol, and the Application Proxy can also do all sorts of >other >stateful inspection exercises in order to check that things are as they >should >be. I think the market will decide if they want this functionality vs. the complexity that it adds. Probably not a single market here. >It's much like adding an ALG to the firewall and NAT, except that in this >case it is located external to them. As such it complements the firewall / >NAT functionality, but does not require the firewall / NAT itself to be >upgraded. Therefore it can be quickly deployed, and is an ideal approach >for a pre-midcom solution. > >On the other hand, if you deploy TURN or FANTOM on the clients, the >administrator has no way of knowing what they will be used for. For a >number of environments this will not be acceptable, and won't lead to the >deployment of desktop VoIP. I disagree. This is not new support that has to be added in most cases. Many firewalls are *already configured* to allow symmetric UDP. Users behind these firewalls take advantage of streaming content and other UDP applications today. Apparently this is OK with the administrators. I believe a TURN-style solution for peer-to-peer RTP would be acceptable to them as well. thanks, -rohan >Pete. > >============================================= >Pete Cordell >Tech-Know-Ware >pete@tech-know-ware.com >+44 1473 635863 >============================================= _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 13:04:30 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA17040 for ; Mon, 26 Nov 2001 13:04:30 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id NAA20522 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 13:04:32 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA20488; Mon, 26 Nov 2001 13:02:45 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA20456 for ; Mon, 26 Nov 2001 13:02:43 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA16924 for ; Mon, 26 Nov 2001 13:02:35 -0500 (EST) Received: from imop.cisco.com (imop.cisco.com [171.69.11.44]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAQI1YI09963; Mon, 26 Nov 2001 10:01:34 -0800 (PST) Received: from rmahy-home-nt (ssh-sj1.cisco.com [171.68.225.134]) by imop.cisco.com (Mirapoint) with ESMTP id ACB99691; Mon, 26 Nov 2001 10:01:33 -0800 (PST) Message-Id: <4.2.0.58.20011126095518.0239aac0@lint.cisco.com> X-Sender: rmahy@lint.cisco.com (Unverified) X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.0.58 Date: Mon, 26 Nov 2001 10:01:54 -0800 To: midcom@ietf.org From: Rohan Mahy Cc: pete@tech-know-ware.com, rohan@cisco.com Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Subject: [midcom] 2x allocate vs FANTOM Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Hi, Comments inline... > * To: "Bob Penfield" , > * Subject: [midcom] 2 x ALLOCATE == FANTOM > * From: "Pete Cordell" > * Date: Thu, 22 Nov 2001 07:46:31 -0000 > * List-Id: > * Sender: midcom-admin@ietf.org > >Steve Davies wrote: >>> TURN cannot conform to the spirit of RTP in this way because the ALLOCATE >>> method only reserves a single transport address on the intermediary. If >>> it >>> requested 2 transport addresses, a probe or very similar mechanism would >>> be >>> required to establish the second outbound UDP connection. Even worse, the >>> way TURN is specified, there is a good chance that as a TURN server runs >>> out >>> of resource the associated RTP and RTCP transport addresses could have >>> different IP addresses. NOT ALLOWED. > >To which Bob replied: >> The ALLOCATE method could be modified to include a "number of ports" >> attribute to request an allocation of 2 consecutive ports. > >and: >> The STUN "Request" could be sent to the 2nd allocated port to >> establish the binding. > >This line of reasoning basically leads to FANTOM (or something similar!) as >follows. > >If you use TURN to allocate two ports in one message, you need a way to >associate the second port with the original allocation message. In FANTOM >we do this by returning an identifier in the equivalent of the allocate >response. We then include that identifier in a probe (equivalent to the >STUN request in Bob's suggestion) sent to the server. This allows the >server to do the association. > >With this method, the second port is effectively being set up using >out-of-band signalling. This is incorrect. A second TURN request would still send traffic from and receive traffic on the same port it uses for an Allocate Request/Response. You would just include an extra identifier in-band. >Having the second port requiring out-of-band signalling, removes any benefit >of having in-band signalling for the first port. see above. >We have also found that >there are many benefits to having an out-of-band signalling method. For >example, we are also able to explicitly close the forwarding operation. The >latter is a great comfort to a number of network administrators! [snip] Understood. This is another classic simplicity vs. functionality tradeoff. thanks, -rohan _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 13:36:05 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA19328 for ; Mon, 26 Nov 2001 13:36:05 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id NAA21782 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 13:36:08 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA21207; Mon, 26 Nov 2001 13:25:48 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA21174 for ; Mon, 26 Nov 2001 13:25:46 -0500 (EST) Received: from localhost.localdomain (dsl081-118-200.dfw1.dsl.speakeasy.net [64.81.118.200]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA18558 for ; Mon, 26 Nov 2001 13:25:42 -0500 (EST) Received: from dynamicsoft.com (rocinante [127.0.0.1]) by localhost.localdomain (8.11.6/8.11.6) with ESMTP id fAQIMYs12700 for ; Mon, 26 Nov 2001 12:22:34 -0600 Message-ID: <3C02886A.2080800@dynamicsoft.com> Date: Mon, 26 Nov 2001 12:22:34 -0600 From: Ben Campbell User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.5+) Gecko/20011115 X-Accept-Language: en-us MIME-Version: 1.0 CC: midcom@ietf.org Subject: Simplicity vs. generality (was Re: [midcom] 2x allocate vs FANTOM) References: <4.2.0.58.20011126095518.0239aac0@lint.cisco.com> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Rohan Mahy wrote: [snip] > > Understood. This is another classic simplicity vs. functionality tradeoff. > And there lies the crux of the problem. If the pre-midcom protocol is expected to have a short lifespan, that is it will eventually be supplanted by the real midcom protocol, then I would expect that we would want to err on the side of simplicity. _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 14:48:27 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA24675 for ; Mon, 26 Nov 2001 14:48:27 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id OAA23963 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 14:48:31 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA23797; Mon, 26 Nov 2001 14:40:54 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA23769 for ; Mon, 26 Nov 2001 14:40:53 -0500 (EST) Received: from mail5.microsoft.com (mail5.microsoft.com [131.107.3.121]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA24181 for ; Mon, 26 Nov 2001 14:40:46 -0500 (EST) Received: from inet-vrs-05.redmond.corp.microsoft.com ([157.54.6.148]) by mail5.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Mon, 26 Nov 2001 11:39:46 -0800 Received: from 157.54.6.150 by inet-vrs-05.redmond.corp.microsoft.com (InterScan E-Mail VirusWall NT); Mon, 26 Nov 2001 11:39:46 -0800 Received: from red-imc-01.redmond.corp.microsoft.com ([157.54.9.102]) by inet-hub-05.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Mon, 26 Nov 2001 11:39:45 -0800 Received: from win-imc-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.84]) by red-imc-01.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Mon, 26 Nov 2001 11:39:45 -0800 Received: from win-msg-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.134]) by win-imc-02.wingroup.windeploy.ntdev.microsoft.com with Microsoft SMTPSVC(6.0.3588.0); Mon, 26 Nov 2001 11:39:04 -0800 X-MimeOLE: Produced By Microsoft Exchange V6.0.6063.0 content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: RE: Simplicity vs. generality (was Re: [midcom] 2x allocate vs FANTOM) Date: Mon, 26 Nov 2001 11:39:04 -0800 Message-ID: Thread-Topic: Simplicity vs. generality (was Re: [midcom] 2x allocate vs FANTOM) Thread-Index: AcF2qDzHcHd9mjPLSHyM8Ng6ltO5GwACDK5w From: "Christian Huitema" To: "Ben Campbell" Cc: X-OriginalArrivalTime: 26 Nov 2001 19:39:04.0991 (UTC) FILETIME=[01D272F0:01C176B2] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by optimus.ietf.org id OAA23770 Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 8bit Part of the design choice in STUN/TURN is really about allowing deployment of applications without requiring changes on the NAT and firewalls, and also as much as possible without incurring cost -- which means, by minimizing the number of additional servers and the amount of traffic routed through these servers. There are several deployment environments that we want to serve, depending on the type of NAT/firewall that is obstructing the communication: 1- "cone" NAT, i.e. NAT mapping is independent of the outside destination, communication with multiple peer is not restricted. 2- "restricted cone" NAT, i.e. NAT mapping is independent of the outside destination, communication is restricted to peers to which traffic has been sent from the inside. 3- "symmetric" NAT, i.e. NAT mapping is dependent of the outside destination, communication is ipso-facto restricted to peers to which traffic has been sent from the inside. 4- "symmetric" firewall, similar to "restricted cone" but without the mapping. 5- "full firewall", i.e. UDP communication is mostly blocked. As Jonathan previously mentioned, we have no intention of solving the 5th case -- if the local admin wanted to allow UDP, it would have done so. STUN solves cases 1, 2 and 4; 1 and 2, combined, cover a very large fraction of the current "residential NAT" installations, probably around 95%. TURN covers case 3, i.e. the remaining 5% of the residential market and a good share of the firewall deployments. There is a very large difference between the cost of running STUN and the cost of running a relay: about 2 transactions per call for STUN, 50 messages per second for the duration of the call for relays, including TURN. As Jonathan pointed out, this is a big difference on the bottom line -- and this is also the reason why "one size fits all" is not a good approach. -- Christian Huitema _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 15:39:55 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA29000 for ; Mon, 26 Nov 2001 15:39:55 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA25754 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 15:39:59 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA25736; Mon, 26 Nov 2001 15:38:38 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA25705 for ; Mon, 26 Nov 2001 15:38:37 -0500 (EST) Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA28901 for ; Mon, 26 Nov 2001 15:38:32 -0500 (EST) Received: from BobP [63.67.143.2] by acmepacket.com (SMTPD32-7.04) id A84B6DD001C0; Mon, 26 Nov 2001 15:38:35 -0500 Message-ID: <005b01c176b9$d4066220$2300000a@acmepacket.com> From: "Bob Penfield" To: "Pyda Srisuresh" , "midcom" Date: Mon, 26 Nov 2001 15:35:03 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400 Content-Transfer-Encoding: 7bit Subject: [midcom] Comments on framework-05 Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Here are my comments (mostly nits) on the framework draft. 1) Section 2: This document should not use RFC 2119 requirements language. The requirements document doesn't. 2) Figure 2 in section 5 does not show the SIP & RTSP data path outside the firewall: +-----------+ | Middlebox | | Policy | | Server |~~~~~~~~~~~~~| +-----------+ \ \ +--------+ \ | SIP |___ \ ________| Proxy | \ Middlebox \ / +--------+.. | +--------------------+ | : | MIDCOM | | | | RTSP +---------+ :..|........| MIDCOM | POLICY | SIP | ____| RTSP |.....|........| PROTOCOL | INTER- | | / | Proxy |___ | | INTERFACE | FACE | | | +---------+ \ \ |--------------------| | | \ \-----| |-----SIP | | \-------| |-----RTSP | | ---| FIREWALL |-->-- +-----------+ /---| |--<-- +-----------+| Data streams // +--------------------+ +-----------+||---------->----// | |end-hosts ||-----------<----- . +-----------+ (RTP, RTSP data, etc.) | . Outside the Within a private domain | private domain 3) section 6.1, 3rd sentence. s/MUST/must/. The framework should not use RFC-2119 requirements language. 4) section 6.2, 1st sentence. s/MUST/must/. The framework should not use RFC-2119 requirements language. 5) In section 6.2 it says: However, it is possible to retain the provisioning on middlebox unchanged, by requiring MIDCOM agents to initiate the session to middlebox. Since we have decided that MIDCOM is client-server with the agent initiating the session, should "by requiring MIDCOM agents to initiate..." be changed to "since MIDCOM agents initiate..."? 6) Since Out-of-Path agents are out-of-scope, there is no need to qualify MIDCOM agents as "In-path". Therefore, all occurrences of "In-path" should be removed from section 7. 7) Figure 3 is not correct. In order to match how it will really work and the timeline flows it should be: ___________ --->| SIP |<-----\ / | Proxy | \ | |_________| | 1| |^ ^| 4| | || || | |8 2||3 7||6 |5 ______________ | || || | ______________ | |<-/ _v|____|v____ \->| | | External | Na | | Nc | SIP Phone | | SIP phone |>------->| Middlebox |>------>| within | | |<-------<|___________|<------<| Pvt. domain| |____________| Nb Nd |____________| and the second paragraph should be revised to: Arrows 1 and 8 in the figure below refer to SIP call setup exchange between the external SIP phone and the SIP proxy. Arrows 4 and 5 refer to SIP call setup exchange between the SIP proxy and the interior SIP phone and are assumed to be traversing the middlebox. Arrows 2,3, 6 and 7 below between the SIP proxy and the middlebox refer to MIDCOM communication. 8) Just for correctness, the 100Trying message should precede communication with the middlebox in all the timeline flows (sections 7.1, 7.2 & 7.3) as follows: SIP Phone SIP Proxy Middlebox SIP Phone (External) (MIDCOM (FIREWALL (private) agent) Service) | | | | | |----INVITE------>| | | | | | | |<---100Trying----| | | | | | | | |+++request to MB+++++>| | | |<+response from MB++++| | | | | | | |--------INVITE---------------------->| | | | | The 100-Trying response will prevent the External SIP Phone from re-transmitting the INVITE request when UDP is used. 9) Section 7.2 & 7.3: The "Modify SDP" for the BYE request and the 200-OK response to the BYE (top of page 24, bottom of page 26 and middle of page 27) should be removed. These messages will not contain SDP. 10) section 9, 3rd para. s/MUST/must/. The framework should not use RFC-2119 requirements language. 11) Several of the items in the REFERENCES section are not explicitly referenced in the document. H.323, RTSP, FTP, and TLS are mentioned, but don't have a [] reference. IETF-STD, NAT-COMP, APPL-ID, RFC 1918, RFC 1700, and REQMTS don't seem to be mentioned at all. Are these just suggested reading or do they need to be referenced in the text? Also, REQMTS should be referenced, but should be the latest copy of the requirements draft instead of Scott's bullet list. 12) The document needs a copyright statement. cheers, (-:bob Robert F. Penfield Chief Software Architect Acme Packet, Inc. 130 New Boston Street Woburn, MA 01801 bpenfield@acmepacket.com _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 17:29:37 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07490 for ; Mon, 26 Nov 2001 17:29:37 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA28885 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 17:29:40 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28501; Mon, 26 Nov 2001 17:23:07 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28468 for ; Mon, 26 Nov 2001 17:23:04 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA07014 for ; Mon, 26 Nov 2001 17:23:00 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112622195116052 ; Mon, 26 Nov 2001 22:19:51 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Mon, 26 Nov 2001 22:22:14 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639E92520@ThisAddressDoesNotExist> From: Steve Davies To: Ben Campbell , midcom@ietf.org Subject: RE: [midcom] pre-midcom - simplicity vs generality Date: Mon, 26 Nov 2001 22:22:06 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C176C8.C7F08510" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C176C8.C7F08510 Content-Type: text/plain; charset="ISO-8859-1" See below: -----Original Message----- From: Ben Campbell [mailto:bcampbell@dynamicsoft.com] Sent: 26 November 2001 18:23 Cc: midcom@ietf.org Subject: Simplicity vs. generality (was Re: [midcom] 2x allocate vs FANTOM) Rohan Mahy wrote: [snip] >> >> Understood. This is another classic simplicity vs. functionality tradeoff. >> Ben Cringle then wrote: > And there lies the crux of the problem. If the pre-midcom protocol is > expected to have a short lifespan, that is it will eventually be > supplanted by the real midcom protocol, then I would expect that we > would want to err on the side of simplicity. FANTOM is not complex. It is unfamiliar. I've already explained that FANTOM and TURN use identical concepts to solve the pre-midcom problem. The methods that are in FANTOM are there for a reason. If you can show otherwise, we'll take them out. TURN is simple because it is unfinished. We have shown that TURN does not handle RTP properly. A new element has to added. A method has to be devised to stop NATs timing out and so on... Not so long ago, SIP claimed to be simple. Look at it now. If the IETF were just starting on a SIP-like protocol and SIP were submitted as it is today, by this reasoning it would be dismissed as too complex. But the reason it is large is to support the functionality it has to support, and the adoption of such a proposal would say a lot of development effort and time to market. The same is true of FANTOM. Steve _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom ------_=_NextPart_001_01C176C8.C7F08510 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom - simplicity vs generality

See below:

-----Original Message-----
From: Ben Campbell [mailto:bcampbell@dynamicsoft.c= om]
Sent: 26 November 2001 18:23
Cc: midcom@ietf.org
Subject: Simplicity vs. generality (was Re: [midcom] = 2x allocate vs
FANTOM)


Rohan Mahy wrote:

[snip]

>>
>> Understood.  This is another classic = simplicity vs. functionality tradeoff.
>>

Ben Cringle then wrote:

> And there lies the crux of the problem. If the = pre-midcom protocol is
> expected to have a short lifespan, that is it = will eventually be
> supplanted by the real midcom protocol, then I = would expect that we
> would want to err on the side of = simplicity.

FANTOM is not complex. It is unfamiliar. I've already = explained that FANTOM and TURN use identical concepts to solve the = pre-midcom problem. The methods that are in FANTOM are there for a = reason. If you can show otherwise, we'll take them out.

TURN is simple because it is unfinished. We have = shown that TURN does not handle RTP properly. A new element has to = added. A method has to be devised to stop NATs timing out and so = on...

Not so long ago, SIP claimed to be simple. Look at it = now. If the IETF were just starting on a SIP-like protocol and SIP were = submitted as it is today, by this reasoning it would be dismissed as = too complex. But the reason it is large is to support the functionality = it has to support, and the adoption of such a proposal would say a lot = of development effort and time to market. The same is true of = FANTOM.

Steve

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C176C8.C7F08510-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 17:29:37 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07460 for ; Mon, 26 Nov 2001 17:29:33 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA28829 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 17:29:36 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28593; Mon, 26 Nov 2001 17:26:20 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28564 for ; Mon, 26 Nov 2001 17:26:18 -0500 (EST) Received: from protactinium.btinternet.com (protactinium.btinternet.com [194.73.73.176]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07198 for ; Mon, 26 Nov 2001 17:26:14 -0500 (EST) Received: from [213.122.126.53] (helo=tkw) by protactinium.btinternet.com with smtp (Exim 3.22 #8) id 168UCe-0002Bx-00; Mon, 26 Nov 2001 22:26:16 +0000 Message-ID: <00f201c176c9$2f3cc3a0$0200000a@tkw> From: "Pete Cordell" To: , "Rohan Mahy" Cc: References: <4.2.0.58.20011126095518.0239aac0@lint.cisco.com> Subject: Re: [midcom] 2x allocate vs FANTOM Date: Mon, 26 Nov 2001 22:02:21 -0000 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit From: Rohan Mahy > >If you use TURN to allocate two ports in one message, you need a way to > >associate the second port with the original allocation message. In FANTOM > >we do this by returning an identifier in the equivalent of the allocate > >response. We then include that identifier in a probe (equivalent to the > >STUN request in Bob's suggestion) sent to the server. This allows the > >server to do the association. > > > >With this method, the second port is effectively being set up using > >out-of-band signalling. > > This is incorrect. A second TURN request would still send traffic from and > receive traffic on the same port it uses for an Allocate > Request/Response. You would just include an extra identifier in-band. > Please be more specific about how this would actually work. If you are not using the FANTOM approach, I can see lots of ways that it won't work, so would like to see how you make it work. > >Having the second port requiring out-of-band signalling, removes any benefit > >of having in-band signalling for the first port. > > see above. > > >We have also found that > >there are many benefits to having an out-of-band signalling method. For > >example, we are also able to explicitly close the forwarding operation. The > >latter is a great comfort to a number of network administrators! > [snip] > > Understood. This is another classic simplicity vs. functionality tradeoff. Please see my response to Ben Campbell's e-mail for my view on this. > > thanks, > -rohan > Pete. ============================================= Pete Cordell Tech-Know-Ware pete@tech-know-ware.com +44 1473 635863 ============================================= _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 17:29:39 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07475 for ; Mon, 26 Nov 2001 17:29:35 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA28866 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 17:29:38 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28464; Mon, 26 Nov 2001 17:23:04 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28436 for ; Mon, 26 Nov 2001 17:23:00 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA07011 for ; Mon, 26 Nov 2001 17:22:56 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112622195100713 ; Mon, 26 Nov 2001 22:19:51 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Mon, 26 Nov 2001 22:22:14 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639E9251F@ThisAddressDoesNotExist> From: Steve Davies To: Rohan Mahy , midcom@ietf.org Cc: pete@tech-know-ware.com Subject: RE: [midcom] 2x allocate vs FANTOM Date: Mon, 26 Nov 2001 22:22:05 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C176C8.C7616470" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C176C8.C7616470 Content-Type: text/plain; charset="ISO-8859-1" Comments also inline... -----Original Message----- From: Rohan Mahy [mailto:rohan@cisco.com] Sent: 26 November 2001 18:02 To: midcom@ietf.org Cc: pete@tech-know-ware.com; rohan@cisco.com Subject: [midcom] 2x allocate vs FANTOM Pete Cordell wrote: [snip] >> If you use TURN to allocate two ports in one message, you need a way to >> associate the second port with the original allocation message. In FANTOM >> we do this by returning an identifier in the equivalent of the allocate >> response. We then include that identifier in a probe (equivalent to the >> STUN request in Bob's suggestion) sent to the server. This allows the >> server to do the association. >> >> With this method, the second port is effectively being set up using >> out-of-band signalling. To which Rohan Mahy replied: >This is incorrect. A second TURN request would still send traffic from and >receive traffic on the same port it uses for an Allocate >Request/Response. You would just include an extra identifier in-band. This sounds remarkably like a FANTOM Probe packet! Steve _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom ------_=_NextPart_001_01C176C8.C7616470 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] 2x allocate vs FANTOM

Comments also inline...

-----Original Message-----
From: Rohan Mahy [mailto:rohan@cisco.com]
Sent: 26 November 2001 18:02
To: midcom@ietf.org
Cc: pete@tech-know-ware.com; rohan@cisco.com
Subject: [midcom] 2x allocate vs FANTOM


Pete Cordell wrote:

[snip]

 >> If you use TURN to allocate two ports = in one message, you need a way to
 >> associate the second port with the = original allocation message.  In FANTOM
 >> we do this by returning an identifier = in the equivalent of the allocate
 >> response.  We then include that = identifier in a probe (equivalent to the
 >> STUN request in Bob's suggestion) = sent to the server.  This allows the
 >> server to do the association.
 >>
 >> With this method, the second port is = effectively being set up using
 >> out-of-band signalling.

To which Rohan Mahy replied:

>This is incorrect.  A second TURN request = would still send traffic from and
>receive traffic on the same port it uses for an = Allocate
>Request/Response.  You would just include = an extra identifier in-band.

This sounds remarkably like a FANTOM Probe packet! =

Steve

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C176C8.C7616470-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 17:29:58 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07577 for ; Mon, 26 Nov 2001 17:29:58 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA28930 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 17:30:01 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28762; Mon, 26 Nov 2001 17:28:31 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28726 for ; Mon, 26 Nov 2001 17:28:29 -0500 (EST) Received: from protactinium.btinternet.com (protactinium.btinternet.com [194.73.73.176]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07374 for ; Mon, 26 Nov 2001 17:28:24 -0500 (EST) Received: from [213.122.126.53] (helo=tkw) by protactinium.btinternet.com with smtp (Exim 3.22 #8) id 168UCf-0002Bx-00; Mon, 26 Nov 2001 22:26:18 +0000 Message-ID: <00f301c176c9$304029e0$0200000a@tkw> From: "Pete Cordell" To: "Ben Campbell" Cc: , References: <4.2.0.58.20011126095518.0239aac0@lint.cisco.com> <3C02886A.2080800@dynamicsoft.com> Subject: Re: Simplicity vs. generality (was Re: [midcom] 2x allocate vs FANTOM) Date: Mon, 26 Nov 2001 22:13:29 -0000 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Ben (and Rohan), I think we are getting overly seduced by this complexity debate. For a start, complexity should never be considered purely in relative terms. If solution A requires 5 minutes to implement and solution B requires 10 minutes to implement, that does not make A better than B even though it is half the complexity of the other. On the other hand, if solution A takes 6 months to implement, and solution B takes 9 months, this is a strong case for implementing solution A, even though B is less than twice as complex as A. We also need to be careful about how we decide how complex something is. In this case the superficial approach of comparing the number of messages is not a good guide. Both proposals will require underlying structure to implement the actual forwarding (receive packet, decide whether to allow it, send it out etc.) that will look much the same for both. Both will require the capability to create such a forwarding instance, link it in with all the other data structures, and how to delete it. And they will both have to learn where to forward data to on the public side. The messaging aspect of this is likely to be only a small percentage of the overall solution. As a finger in the air figure (I hope that's not impolite in the States!) I estimate that both TURN and FANTOM protocols themselves would take about a week or two to implement. When you add on code for configuration, monitoring, and installation, then add documentation, system testing.... And if you are implementing a proxy based solution you will either have to do SIP or H.323.... Well, you'll soon find that the actual FANTOM or TURN parts are pretty miniscule. So I think the relative complexity of FANTOM and TURN is not an issue. In that case I would go for the flexibility, and broader applicability that FANTOM offers. Pete. ============================================= Pete Cordell Tech-Know-Ware pete@tech-know-ware.com +44 1473 635863 ============================================= ----- Original Message ----- From: Ben Campbell Cc: Sent: 26 November 2001 18:22 Subject: Simplicity vs. generality (was Re: [midcom] 2x allocate vs FANTOM) > > > Rohan Mahy wrote: > > [snip] > > > > > Understood. This is another classic simplicity vs. functionality tradeoff. > > > > And there lies the crux of the problem. If the pre-midcom protocol is > expected to have a short lifespan, that is it will eventually be > supplanted by the real midcom protocol, then I would expect that we > would want to err on the side of simplicity. > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 17:29:59 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07573 for ; Mon, 26 Nov 2001 17:29:58 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA28920 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 17:30:01 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28794; Mon, 26 Nov 2001 17:28:34 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28740 for ; Mon, 26 Nov 2001 17:28:30 -0500 (EST) Received: from protactinium.btinternet.com (protactinium.btinternet.com [194.73.73.176]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07377 for ; Mon, 26 Nov 2001 17:28:25 -0500 (EST) Received: from [213.122.126.53] (helo=tkw) by protactinium.btinternet.com with smtp (Exim 3.22 #8) id 168UCh-0002Bx-00; Mon, 26 Nov 2001 22:26:20 +0000 Message-ID: <00f401c176c9$315d80c0$0200000a@tkw> From: "Pete Cordell" To: "Mark Taylor" , "Jonathan Rosenberg" , References: <20011125133632.72754.qmail@web14107.mail.yahoo.com> Subject: Re: [midcom] STUN/TURN vs Davies (FANTOM) Date: Mon, 26 Nov 2001 22:14:22 -0000 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Mark, Thanks for raising the security issues. This is an important subject to us, and one of the main reasons for getting peer review of FANTOM in the IETF. (Mind you, security is not the only reason we think FANTOM has more to offer than TURN - The RTP/RTCP port relationship issue is not security related. On the other hand, being able to explicitly close a media session is.) As for what firewalls can do, all we require from the firewall is a few simple filtering rules. A firewall that doesn't do that is called a router!!! Security is also addressed in a few other ways. It's hard to address the issues your security specialist perceived without concrete examples. I would therefore welcome you enumerating these to further the discussion. We can then decide whether they are already addressed by the protocol, are not important, or the protocol needs modifying. Pete. ============================================= Pete Cordell Tech-Know-Ware pete@tech-know-ware.com +44 1473 635863 ============================================= ----- Original Message ----- From: Mark Taylor To: Jonathan Rosenberg ; Sent: 25 November 2001 13:36 Subject: [midcom] STUN/TURN vs Davies (FANTOM) > STUN/TURN and the Davies (FANTOM) proposals are > marked by different emphaisises in achieving the same > objective. > > STUN/TURN emphasizes simplicity. Davies emphasizes > security with its addressing of firewall issues. The > other differences between the protocols seem only to > be variations on a theme and not consequential to the > overall problem. > > I asked a security specialist about the Davies > proposal's firewall claims. He found them to be > unconvincing with the observation that many people > have inflated ideas about what firewalls can do. > > If the Davies firewall strategy is, as with this view, > ineffective, it only adds complexity and cost without > providing real benefit. STUN/TURN will provide the > same level of security with a simpler and less costly > proposal. > > Is this view correct? > > __________________________________________________ > Do You Yahoo!? > Yahoo! GeoCities - quick and easy web site hosting, just $8.95/month. > http://geocities.yahoo.com/ps/info1 > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 17:33:22 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07825 for ; Mon, 26 Nov 2001 17:33:22 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA29400 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 17:33:26 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28683; Mon, 26 Nov 2001 17:26:28 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28604 for ; Mon, 26 Nov 2001 17:26:23 -0500 (EST) Received: from protactinium.btinternet.com (protactinium.btinternet.com [194.73.73.176]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07206 for ; Mon, 26 Nov 2001 17:26:18 -0500 (EST) Received: from [213.122.126.53] (helo=tkw) by protactinium.btinternet.com with smtp (Exim 3.22 #8) id 168UCj-0002Bx-00; Mon, 26 Nov 2001 22:26:21 +0000 Message-ID: <00f501c176c9$323f5540$0200000a@tkw> From: "Pete Cordell" To: , "Rohan Mahy" References: <4.2.0.58.20011126093005.023975d0@lint.cisco.com> Subject: Re: [midcom] client vs. proxy traversal Date: Mon, 26 Nov 2001 22:21:42 -0000 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2314.1300 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Rohan, comments in-line... From: Rohan Mahy > > As Melinda stated, our focus for pre-midcom is NAT traversal, not firewall > traversal. TURN takes advantantage of the "symmetric UDP" behavior of NATs > to allow one end to talk to another without *control* of an intermediary. > Surely the TURN server is an intermediary which is being controlled by the TURN protocol! And I still think we're wasting our time if we don't consider firewalls as well! > The fact that many firewalls also exhibit "symmetric UDP" behavior is just > an added bonus. > > >What it does mean though is > >that the firewall is able to allow packets to/from the application proxy > >to pass through that it might not otherwise allow from clients. > > If the firewall administrator is willing to do this, it shouldn't be hard > to allow symmetric UDP with a timeout. > That is the crux of the matter - what the administrator is prepared to allow. There is a wide range of firewall policy around the place. Some will not even allow web browsing, restrict it to certain times, or insist it goes via a particular proxy. This is all part of the power that administrators wield! A solution that does not allow an administrator to wield their power over other protocols will not be as successul as one that does. Or put another way, the IETF should minimise the impact on the policies an administrator can implement on their firewall when endorsing a solution in this space. It is therefore important to consider outbound as well as inbound connections. > >It can do this in > >the knowledge that the Application Proxy is forwarding only one > >particular protocol, and the Application Proxy can also do all sorts of > >other > >stateful inspection exercises in order to check that things are as they > >should > >be. > > I think the market will decide if they want this functionality vs. the > complexity that it adds. Probably not a single market here. > I have a different take on the complexity issue which I shall address elsewhere (since some Ben Campbell has kindly started up a suitable thread). > >It's much like adding an ALG to the firewall and NAT, except that in this > >case it is located external to them. As such it complements the firewall / > >NAT functionality, but does not require the firewall / NAT itself to be > >upgraded. Therefore it can be quickly deployed, and is an ideal approach > >for a pre-midcom solution. > > > >On the other hand, if you deploy TURN or FANTOM on the clients, the > >administrator has no way of knowing what they will be used for. For a > >number of environments this will not be acceptable, and won't lead to the > >deployment of desktop VoIP. > > I disagree. This is not new support that has to be added in most > cases. Many firewalls are *already configured* to allow symmetric > UDP. Users behind these firewalls take advantage of streaming content and > other UDP applications today. Apparently this is OK with the > administrators. I believe a TURN-style solution for peer-to-peer RTP would > be acceptable to them as well. > We might have to agree to disagree on that!!! > thanks, > -rohan > Pete. ============================================= Pete Cordell Tech-Know-Ware pete@tech-know-ware.com +44 1473 635863 ============================================= _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 19:36:54 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA16323 for ; Mon, 26 Nov 2001 19:36:52 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id TAA02488 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 19:36:55 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA02456; Mon, 26 Nov 2001 19:34:39 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA02425 for ; Mon, 26 Nov 2001 19:34:37 -0500 (EST) Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA16195 for ; Mon, 26 Nov 2001 19:34:33 -0500 (EST) Received: from imop.cisco.com (imop.cisco.com [171.69.11.44]) by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fAR0XtH05824; Mon, 26 Nov 2001 16:33:59 -0800 (PST) Received: from rmahy-home-nt (ssh-sj1.cisco.com [171.68.225.134]) by imop.cisco.com (Mirapoint) with ESMTP id ACC04966; Mon, 26 Nov 2001 16:33:49 -0800 (PST) Message-Id: <4.2.0.58.20011126160322.01ed2350@lint.cisco.com> X-Sender: rmahy@imop.cisco.com (Unverified) X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.0.58 Date: Mon, 26 Nov 2001 16:14:31 -0800 To: "Pete Cordell" From: Rohan Mahy Subject: Re: [midcom] client vs. proxy traversal Cc: In-Reply-To: <00f501c176c9$323f5540$0200000a@tkw> References: <4.2.0.58.20011126093005.023975d0@lint.cisco.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 02:21 PM 11/26/01 , Pete Cordell wrote: >Rohan, > >comments in-line... > >From: Rohan Mahy > > > > As Melinda stated, our focus for pre-midcom is NAT traversal, not firewall > > traversal. TURN takes advantantage of the "symmetric UDP" behavior of >NATs > > to allow one end to talk to another without *control* of an intermediary. > > > >Surely the TURN server is an intermediary which is being controlled by the >TURN protocol! My point is that the end systems are in control. The TURN server does not control the endpoints. Perhaps I should rephrase my previous sentence. "... to allow one end to talk to another without control *BY* an intermediary." >And I still think we're wasting our time if we don't consider firewalls as >well! Feel free to take this issue up with the Area Directors then. > > The fact that many firewalls also exhibit "symmetric UDP" behavior is just > > an added bonus. > > > > >What it does mean though is > > >that the firewall is able to allow packets to/from the application proxy > > >to pass through that it might not otherwise allow from clients. > > > > If the firewall administrator is willing to do this, it shouldn't be hard > > to allow symmetric UDP with a timeout. > > > >That is the crux of the matter - what the administrator is prepared to >allow. There is a wide range of firewall policy around the place. Some >will not even allow web browsing, restrict it to certain times, or insist it >goes via a particular proxy. This is all part of the power that >administrators wield! A solution that does not allow an administrator to >wield their power over other protocols will not be as successul as one that >does. IMO the level of complexity and control that you are describing, while a siutable candidate for a midcom-style protocol, is not the goal of the pre-midcom protocol. thanks, -rohan >Or put another way, the IETF should minimise the impact on the policies an >administrator can implement on their firewall when endorsing a solution in >this space. > >It is therefore important to consider outbound as well as inbound >connections. > > > >It can do this in > > >the knowledge that the Application Proxy is forwarding only one > > >particular protocol, and the Application Proxy can also do all sorts of > > >other > > >stateful inspection exercises in order to check that things are as they > > >should > > >be. > > > > I think the market will decide if they want this functionality vs. the > > complexity that it adds. Probably not a single market here. > > > >I have a different take on the complexity issue which I shall address >elsewhere (since some Ben Campbell has kindly started up a suitable thread). > > > >It's much like adding an ALG to the firewall and NAT, except that in >this > > >case it is located external to them. As such it complements the >firewall / > > >NAT functionality, but does not require the firewall / NAT itself to be > > >upgraded. Therefore it can be quickly deployed, and is an ideal >approach > > >for a pre-midcom solution. > > > > > >On the other hand, if you deploy TURN or FANTOM on the clients, the > > >administrator has no way of knowing what they will be used for. For a > > >number of environments this will not be acceptable, and won't lead to >the > > >deployment of desktop VoIP. > > > > I disagree. This is not new support that has to be added in most > > cases. Many firewalls are *already configured* to allow symmetric > > UDP. Users behind these firewalls take advantage of streaming content and > > other UDP applications today. Apparently this is OK with the > > administrators. I believe a TURN-style solution for peer-to-peer RTP >would > > be acceptable to them as well. > > > >We might have to agree to disagree on that!!! > > > thanks, > > -rohan > > > >Pete. > >============================================= >Pete Cordell >Tech-Know-Ware >pete@tech-know-ware.com >+44 1473 635863 >============================================= > > _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Mon Nov 26 21:24:52 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA20066 for ; Mon, 26 Nov 2001 21:24:52 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id VAA05437 for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 21:24:56 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA05389; Mon, 26 Nov 2001 21:23:00 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA05362 for ; Mon, 26 Nov 2001 21:22:58 -0500 (EST) Received: from localhost.localdomain (dsl081-118-200.dfw1.dsl.speakeasy.net [64.81.118.200]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA20022 for ; Mon, 26 Nov 2001 21:22:53 -0500 (EST) Received: from dynamicsoft.com (rocinante [127.0.0.1]) by localhost.localdomain (8.11.6/8.11.6) with ESMTP id fAR2JPs13380; Mon, 26 Nov 2001 20:19:26 -0600 Message-ID: <3C02F82D.109@dynamicsoft.com> Date: Mon, 26 Nov 2001 20:19:25 -0600 From: Ben Campbell User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.5+) Gecko/20011115 X-Accept-Language: en-us MIME-Version: 1.0 To: Steve Davies CC: midcom@ietf.org Subject: Re: [midcom] pre-midcom - simplicity vs generality References: <00533D13955AD411AF3800A0C9B42639E92520@ThisAddressDoesNotExist> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Ben Cringle? :-) But to the meat of the matter--My apologies;I was being flip and did not exactly express what I was attempting to express. I was not arguing about the relative complexity of two different ways of accomplishing "A". Rather, I was arguing about the complexity of accomplishing A, B, and C, when perhaps only A is required. It seems to me that the primary argument in favor of FANTOM is that it does more than STUN/TURN. But it seems we do not have consensus on how much is enough. The argument that FANTOM is only a little more complex, and also does B and C, is not useful if the requirements are limited to A. If we were talking about the midcom protocol itself, then it might make sense to add more generality than explicitly required, if it were cheap to do so. But for a protocol designed to solve a problem that should in itself go away eventually (otherwise we have failed at midcom), I think it makes less sense. As for the primary in STUN/TURN you mention in this note: Bob Penfield pointed out that the original STUN draft does address NAT binding keep-alives, and the RTCP issue can be fixed with a very minor addition to TURN. I have seen firewall traversal, explict closure of forwarding, and extensibility listed as advantages of FANTOM. I have not seen any general agreement that they are requirements for the pre-midcom protocol. Steve Davies wrote: > See below: > > -----Original Message----- > From: Ben Campbell [mailto:bcampbell@dynamicsoft.com] > Sent: 26 November 2001 18:23 > Cc: midcom@ietf.org > Subject: Simplicity vs. generality (was Re: [midcom] 2x allocate vs > FANTOM) > > > Rohan Mahy wrote: > > [snip] > > >> > >> Understood. This is another classic simplicity vs. functionality > tradeoff. > >> > > Ben Cringle then wrote: > > > And there lies the crux of the problem. If the pre-midcom protocol is > > expected to have a short lifespan, that is it will eventually be > > supplanted by the real midcom protocol, then I would expect that we > > would want to err on the side of simplicity. > > FANTOM is not complex. It is unfamiliar. I've already explained that > FANTOM and TURN use identical concepts to solve the pre-midcom problem. > The methods that are in FANTOM are there for a reason. If you can show > otherwise, we'll take them out. > > TURN is simple because it is unfinished. We have shown that TURN does > not handle RTP properly. A new element has to added. A method has to be > devised to stop NATs timing out and so on... > > Not so long ago, SIP claimed to be simple. Look at it now. If the IETF > were just starting on a SIP-like protocol and SIP were submitted as it > is today, by this reasoning it would be dismissed as too complex. But > the reason it is large is to support the functionality it has to > support, and the adoption of such a proposal would say a lot of > development effort and time to market. The same is true of FANTOM. > > Steve > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom > _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 27 06:17:01 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA19600 for ; Tue, 27 Nov 2001 06:17:01 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id GAA27346 for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 06:17:02 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id GAA27284; Tue, 27 Nov 2001 06:15:08 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id GAA27255 for ; Tue, 27 Nov 2001 06:15:06 -0500 (EST) Received: from malmo.trab.se (malmo.kicore.net [131.115.48.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA19525 for ; Tue, 27 Nov 2001 06:15:02 -0500 (EST) Received: from trab-hermes.haninge.trab.se (trab-hermes.haninge.trab.se [131.115.158.15]) by malmo.trab.se (8.10.1/TRAB-primary-2) with ESMTP id fARBDBA25194 for ; Tue, 27 Nov 2001 12:13:11 +0100 (MET) Received: by trab-hermes.haninge.trab.se with Internet Mail Service (5.5.2650.21) id ; Tue, 27 Nov 2001 12:15:03 +0100 Message-ID: <778DFE9B4E3BD111A74E08002BA3DC0D04D8C666@trab-hermes.haninge.trab.se> From: =?ISO-8859-1?Q?Morgan_St=E5hl?= To: "'midcom@ietf.org'" Date: Tue, 27 Nov 2001 12:15:02 +0100 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2650.21) Content-Type: text/plain; charset="ISO-8859-1" Subject: [midcom] Midcom questions Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Hi, I'm a computer science student from Sweden, and I had some questions about midcom that I was hoping someone could answer or redirect me to places where I could find answers. I was wondering about the midcom protocol for the communication between the middlebox and the midcom agent. When will we see a draft for this protocol, and how much is the protocol suppose to able to control the middlebox, will the protocol be able to perform some configuration of the middlebox or will it just be able to run services on the middlebox? (I got the feeling from the architecture that the protocol needs to be able to configure the middlebox functionality to for example permit RTP flow through a firewall) Is there any beta products (firewalls or NATs) who implements the midcom protocol, and thus can be "configured" by an agent? The reason I ask is because we're working on a project which will produce a GUI for the user to configure his NAT firewall through, to use midcoms protocol for configure the firewall would please our tutor :). Grateful for any response Regards Morgan ----------------------------------- I'm an pathological liar and can't be held responsible for anything I write _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 27 06:56:38 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA21341 for ; Tue, 27 Nov 2001 06:56:38 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id GAA28643 for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 06:56:39 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id GAA28515; Tue, 27 Nov 2001 06:50:07 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id GAA28485 for ; Tue, 27 Nov 2001 06:50:05 -0500 (EST) Received: from znsgs0ja.europe.nortel.com (h69s129a211n47.user.nortelnetworks.com [47.211.129.69]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA21007 for ; Tue, 27 Nov 2001 06:49:54 -0500 (EST) Received: from qnsgs000.nortel.com (znsgs016 [47.255.64.31]) by znsgs0ja.europe.nortel.com (8.11.0/8.11.0) with ESMTP id fARBnCB23528 for ; Tue, 27 Nov 2001 11:49:12 GMT Received: from zwcwc012.europe.nortel.com by znsgs016; Tue, 27 Nov 2001 11:49:06 +0000 Received: by zwcwc012.europe.nortel.com with Internet Mail Service (5.5.2653.19) id ; Tue, 27 Nov 2001 11:48:02 -0000 Message-ID: From: "Cedric Aoun" To: "Midcom IETF (E-mail)" , "Suresh (E-mail)" Date: Tue, 27 Nov 2001 11:47:53 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C17739.59485B80" Subject: [midcom] comments on Framework 05 draft Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C17739.59485B80 Content-Type: text/plain; charset="iso-8859-1" Hi Here are some comments on the draft, not yet discussed on the list. Most of them are minor comments. I tried to avoid overlapping with Bob's comments. section 1, page 2 line 34: "Nonetheless, the middlebox framework". need to replace middlebox with MIDCOM. section 1, page 3 line 29: "Section 4 describes the nature of MID COM protocol" typo error. should be MIDCOM section 3, page 9 in figure 1: "session-descriptor". It should be replaced by ruleset? section 3, page 9 and 10: "A session may be uniquely described by the tuple of (SessionDirection, SourceAddress, DestinationAddress, Protocol, SourcePort, DestinationPort).... a session-state may be created by the firewall function, but terminated by the NAT function, when a session timer expires. " This is from the "pre-ruleset era", it should be taken out section 6.2, page 16 line 44: "However, it is possible to retain the provisioning on middlebox unchanged, by requiring MIDCOM agents to initiate the session to middlebox." I think it should be something like: The Middlebox provisioning could remain unchanged if the middlebox gets it's Midcom agents' policies from a policy server. section 7.0, page 17 line 11 "we consider SIP application (Refer [SIP])to illustrate the operation of MIDCOM protocol". Typo error forgot the "the" should be "the MIDCOM protocol" section 7.0, page 17 line 13: "Middlebox is assumed", typo error should be : The middlebox. section 7.2 and 7.3, all section. NAT session descriptors, SIP session descriptors mentioned several times. Terminology should be consistent with section 2. the ruleset terminology should be used instead. Thanks Cedric Cedric Aoun Nortel Networks France mailto:cedric.aoun@nortelnetworks.com ------_=_NextPart_001_01C17739.59485B80 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable comments on Framework 05 draft

Hi
Here are some comments on the draft, = not yet discussed on the list. Most of them are minor comments.
 I tried to avoid overlapping = with Bob's comments.

section 1, page 2 line 34: = "Nonetheless, the middlebox = framework".
need to replace middlebox with = MIDCOM.

section 1, page 3 line 29: = "Section 4 describes the nature of MID COM protocol"
typo error. should be MIDCOM

section 3, page 9 in figure 1:
"session-descriptor". It = should be replaced by ruleset?

section 3, page 9 and 10:
"A session may be uniquely = described by the tuple of (SessionDirection,
   SourceAddress, = DestinationAddress, Protocol, SourcePort,
   = DestinationPort).... a session-state may be created by the firewall = function, but
   terminated by the NAT = function, when a session timer expires. "
This is from the "pre-ruleset = era", it should be taken out

section 6.2, page 16 line 44:
"However, it is possible = to retain the provisioning on middlebox unchanged, by requiring = MIDCOM
   agents to initiate the = session to middlebox."
I think it should be something like: = The Middlebox provisioning could remain unchanged if the middlebox gets = it's Midcom  agents' policies from a policy server.

section 7.0, page 17 line = 11  "we consider = SIP application (Refer [SIP])to = illustrate the operation of MIDCOM protocol". Typo error forgot the "the" should be = "the MIDCOM protocol"

section 7.0, page 17 line 13: = "Middlebox is = assumed", typo error should = be : The middlebox.

section 7.2 and 7.3, all = section.
NAT session descriptors, SIP session = descriptors mentioned several times. Terminology should be consistent = with section 2.

the ruleset terminology should be used = instead.

Thanks
Cedric
  


Cedric Aoun
Nortel Networks
France
mailto:cedric.aoun@nortel= networks.com


------_=_NextPart_001_01C17739.59485B80-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 27 13:22:44 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA15214 for ; Tue, 27 Nov 2001 13:22:44 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id NAA11138 for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 13:22:45 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA11111; Tue, 27 Nov 2001 13:20:40 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA11080 for ; Tue, 27 Nov 2001 13:20:33 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id NAA15071 for ; Tue, 27 Nov 2001 13:20:30 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112718172329200 ; Tue, 27 Nov 2001 18:17:23 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Tue, 27 Nov 2001 18:19:36 -0000 Message-ID: <00533D13955AD411AF3800A0C9B426391724A5@ThisAddressDoesNotExist> From: Steve Davies To: "'jdrosen@dynamicsoft.com'" , "'rohan@cisco.com'" , "'Christian Huitema'", "'jweinberger@dynamicsoft.com'" Cc: midcom@ietf.org Subject: [midcom] pre-midcom - How does TURN work? Date: Tue, 27 Nov 2001 18:19:28 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C17770.0D2B0450" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C17770.0D2B0450 Content-Type: text/plain; charset="ISO-8859-1" Jonathan, Joel, Christian and Rohan, Please explain how you expect the following to work within TURN: * How does a client register with a central registrar behind the TURN server. The ALLOCATE method obtains a public transport address to represent the client, but how does the registration request get forwarded from the TURN server to the central registrar? * When a call exists between 2 clients that are behind 2 different TURN servers, there appears to be a media deadlock. It appears from the description, that both TURN servers are waiting for the other to send them media before each of them knows where to send media to. Is this interpretation correct? * What is your solution for RTP port pairing? * How do you expect to prevent NATs from timing out on both the 'in-bound signaling' connection and for media in the presence of silence suppression? It would also really be nice to see the detail of a proper call flow - SIP or H.323 will suffice. Until we see how TURN is expected to work it is difficult to make a like-for-like comparison with FANTOM and have a proper debate on the pros and cons of various methods. Thanks. Steve ------_=_NextPart_001_01C17770.0D2B0450 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable [midcom] pre-midcom - How does TURN work?

Jonathan, Joel, Christian and Rohan,

Please explain how you expect the following to work = within TURN:

* How does a client register with a central registrar = behind the TURN server. The ALLOCATE method obtains a public transport = address to represent the client, but how does the registration request = get forwarded from the TURN server to the central registrar?

* When a call exists between 2 clients that are = behind 2 different TURN servers, there appears to be a media deadlock. = It appears from the description, that both TURN servers are waiting for = the other to send them media before each of them knows where to send = media to. Is this interpretation correct?

* What is your solution for RTP port pairing?

* How do you expect to prevent NATs from timing out = on both the 'in-bound signaling' connection and for media in the = presence of silence suppression?

It would also really be nice to see the detail of a = proper call flow - SIP or H.323 will suffice. Until we see how TURN is = expected to work it is difficult to make a like-for-like comparison = with FANTOM and have a proper debate on the pros and cons of various = methods.

Thanks.

Steve

------_=_NextPart_001_01C17770.0D2B0450-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 27 15:00:51 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22291 for ; Tue, 27 Nov 2001 15:00:51 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA14406 for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 15:00:53 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA14010; Tue, 27 Nov 2001 14:51:10 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA13981 for ; Tue, 27 Nov 2001 14:51:07 -0500 (EST) Received: from radvpost.us.radvision.com ([38.150.216.6]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA21724 for ; Tue, 27 Nov 2001 14:51:04 -0500 (EST) Received: by RADVPOST with Internet Mail Service (5.5.2650.21) id ; Tue, 27 Nov 2001 14:49:58 -0500 Message-ID: <0D5BBF5D638DD4119E3400508BD949459ED6CA@RADVPOST> From: Orit Levin To: "'Christian Huitema'" , Ben Campbell Cc: midcom@ietf.org Date: Tue, 27 Nov 2001 14:49:57 -0500 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2650.21) Content-Type: text/plain; charset="iso-8859-1" Subject: [midcom] The pre-MidCom Agenda (was: Simplicity vs. generality) Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org I definitely think that for different cases different solutions should be used. Also, I like very much the idea of having different servers being deployed and the ability to discover them using the SRV records. Because of the complexity and the variety of both the problems and the solutions, not all of the evolving solutions (i.e. various SIP/SDP extensions, RTP modifications, etc.) would comply with the pre-MidCom agenda. In my mind, a candidate for the "temporary" and easy deployable pre-MidCom protocol shall comply with the following: 1. It shall be application independent. - I don't think it is a controversial topic for the MidCom WG. 2. It should be self-contained, i.e. it should require MINIMAL additional efforts from the application if at all! This point is crucial for any pre-MidCom efforts. How any standard solution, requiring additions and special application behavior, can be considered as "quickly deployed" and "intermediate"? The point is that the "media intermediate" technique has became the candidate for the pre-midcom technique NOT because it can solve all the problems (although not in the most efficient way), but because it can solve (many of) the problem(s) in the simplest and a self-contained way. TURN is a good candidate for solving the NAT problem but it should be able to stay on its own without requiring any application special behavior such as SIP/SDP extensions, SIP refreshes, RTP/RTCP changes, etc. Orit Levin Chief Architect RADVISION Inc. TEL: +1.201.529.4300 x 230 FAX: +1.201.529.3516 -----Original Message----- From: Christian Huitema [mailto:huitema@windows.microsoft.com] Sent: Monday, November 26, 2001 2:39 PM To: Ben Campbell Cc: midcom@ietf.org Subject: RE: Simplicity vs. generality (was Re: [midcom] 2x allocate vs FANTOM) Part of the design choice in STUN/TURN is really about allowing deployment of applications without requiring changes on the NAT and firewalls, and also as much as possible without incurring cost -- which means, by minimizing the number of additional servers and the amount of traffic routed through these servers. There are several deployment environments that we want to serve, depending on the type of NAT/firewall that is obstructing the communication: 1- "cone" NAT, i.e. NAT mapping is independent of the outside destination, communication with multiple peer is not restricted. 2- "restricted cone" NAT, i.e. NAT mapping is independent of the outside destination, communication is restricted to peers to which traffic has been sent from the inside. 3- "symmetric" NAT, i.e. NAT mapping is dependent of the outside destination, communication is ipso-facto restricted to peers to which traffic has been sent from the inside. 4- "symmetric" firewall, similar to "restricted cone" but without the mapping. 5- "full firewall", i.e. UDP communication is mostly blocked. As Jonathan previously mentioned, we have no intention of solving the 5th case -- if the local admin wanted to allow UDP, it would have done so. STUN solves cases 1, 2 and 4; 1 and 2, combined, cover a very large fraction of the current "residential NAT" installations, probably around 95%. TURN covers case 3, i.e. the remaining 5% of the residential market and a good share of the firewall deployments. There is a very large difference between the cost of running STUN and the cost of running a relay: about 2 transactions per call for STUN, 50 messages per second for the duration of the call for relays, including TURN. As Jonathan pointed out, this is a big difference on the bottom line -- and this is also the reason why "one size fits all" is not a good approach. -- Christian Huitema _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 27 17:36:58 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA28042 for ; Tue, 27 Nov 2001 17:36:53 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA19833 for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 17:36:55 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA19742; Tue, 27 Nov 2001 17:34:37 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA19713 for ; Tue, 27 Nov 2001 17:34:35 -0500 (EST) Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA27975 for ; Tue, 27 Nov 2001 17:34:32 -0500 (EST) Received: from smtprch1.nortel.com (erchg0j.us.nortel.com [47.113.64.103]) by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id QAA15737 for ; Tue, 27 Nov 2001 16:34:04 -0600 (CST) Received: from zrchb200.us.nortel.com by smtprch1.nortel.com; Tue, 27 Nov 2001 16:29:18 -0600 Received: by zrchb200.us.nortel.com with Internet Mail Service (5.5.2653.19) id ; Tue, 27 Nov 2001 16:32:41 -0600 Message-ID: <933FADF5E673D411B8A30002A5608A0E06F318@zrc2c012.us.nortel.com> From: "Sanjoy Sen" To: "'Steve Davies'" , "'John LaCour'" , "'midcom@ietf.org'" Cc: "'Jonathan Rosenberg'" Subject: RE: [midcom] new I-D on "symmetric STUN" Date: Tue, 27 Nov 2001 16:32:41 -0600 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C17793.6CB7D790" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C17793.6CB7D790 Content-Type: text/plain; charset="iso-8859-1" Steve et. al., I'm catching up with the discussions after a period out of office. Some comments/questions on FANTOM. My apologies if they have already been discussed. 1) Your App. Proxy is also an RTP Proxy. So for a simple two party call where both are behind NAPT, the media need to traverse at least 3 RTP proxies. Is this correct? 2) Not sure what you gain by making the media go through the App. Proxy? For example, in our proposal, we have the terminal send the empty RTP packets (equivalent to your probes) directly to the Media intermediary in the SP network to establish the media binds. 3) For SIP services, your AP and PEA both will house a SIP Proxy function, RTP Proxy function, as well as your control protocol+ RTP/RTCP probes. What is the implication of putting all these functions in one box from capacity, fault-tolerance and security p.o.v. ? For example, the AP will be doing refreshes for all NAT binds for all RTP sessions on behalf of all terminals. 4) Are you planning on using a standard protocol as this control protocol? In Sen proposal, we've used an existing device control protocol. The sen proposal essentially needs no new protocol development. 5) Your requirement for always allowing traffic from some "well-known" address/port of PEA to the AP in the private network is a big concern. This is typically NOT done in traditional enterprise FW. Such a FW will typically close the pin-hole after sometime, hence the need for signaling path refreshes (using PING or REGISTER) both in our scheme and Jonathan's. Thanks, Sanjoy -----Original Message----- From: Steve Davies [mailto:sdavies@ridgewaysystems.com] Sent: Tuesday, November 20, 2001 11:18 AM To: 'John LaCour'; 'midcom@ietf.org' Cc: 'Jonathan Rosenberg' Subject: RE: [midcom] new I-D on "symmetric STUN" John, You are quite right. This email didn't help move the debate forward much. I'm afraid I got a little frustrated with the politics. Nevertheless, I stick by my statements so let me give you a couple of examples of the flaws I see. * FANTOM uses an out-of-band signalling method 'Create Media Flow' to assign transport addresses on the remote server/public intemediary. It then sends outbound UDP Probes (with a session identifier) to create the dynamic NAT assignment and to complete the mapping between the resultant random source port the probe came from, and the transport addresses the Create Media Flow method assigned, and the call. The first probe effectively creates an outbound UDP connection down which media may flow in either direction for that call. Please note that media is NOT tunneled in FANTOM. TURN tries to simplify this approach by combining the 'probe' (the method to create the dynamic NAT assignment) with an in-band signalling method to assign transport addresses on the public intermediary. This is the ALLOCATE method in TURN. One of the main reasons FANTOM has out-of-band signalling was to conform to the spirit of RTP/RTCP by assigning consecutive port pairs to represent the receive RTP/RTCP addresses at the intermediary. A single method 'Create Media Flow' does that. Having grabbed a port pair, 2 UDP outbound connections are needed to the intermediary to receive the respective RTP and RTCP flows. Hence the Probes. TURN cannot conform to the spirit of RTP in this way because the ALLOCATE method only reserves a single transport address on the intermediary. If it requested 2 transport addresses, a probe or very similar mechanism would be required to establish the second outbound UDP connection. Even worse, the way TURN is specified, there is a good chance that as a TURN server runs out of resource the associated RTP and RTCP transport addresses could have different IP addresses. NOT ALLOWED. There are many other advantages to using a separate Probe message. One very good use of probes is to keep NAT bindings assigned, i.e. they are sent at regular intervals to prevent the NAT from timing out. TURN has no probe or NAT keep-alive methods which breaks the solution on at least 2 counts. In one case, a terminal may make an ALLOCATE to obtain an address with which to register with a public SIP proxy. It then sits there waiting to receive incoming calls. However, without some traffic such as a probe or a NAT keep alive, the NAT assignment created by the ALLOCATE times out, which means the terminal won't receive incoming call notifications. A second case when the NAT binding may time out is when the remote party is not talking and their terminal implements silence suppression. FANTOM uses probes to ensure this doesn't happen. In FANTOM probes are designed to be easily recognisable in order to help the implementation of an efficient forwarding intermediary. * TURN doesn't use a tunnel. FANTOM does. Some think that this implies FANTOM is a VPN variant. FANTOM is most definitely not, but we'll deal with that separately. FANTOM uses a tunnel for multiplexing out-of-band call control and the out-of-band FANTOM client-server protocol into a single connection. The connection is TCP because we valued reliability and the life-time is more easily managed by the NAT. It could be UDP but we didn't feel we needed to re-invent a UDP session with TCP characteristics. We envisaged that the client end of FANTOM would be implemented in severals ways. For example, it could be implemented in a standalone system, serving many terminals in a single enterprise. In Centrex applications there would be no local proxy. In this case the FANTOM client would have to handle multiple simultaneous call setups and cleardowns. We judged a single persistant tunnel for all call control from the FANTOM client to FANTOM server was the most efficient use of resources. To avoid tunnels, a similar TURN implementation would require the standalone client to create many UDP connections to the intermediary - one for each terminal wanting to receive incoming calls. As we remarked above, these UDP connections need to keep NAT bindings through some sort of NAT-keep-alive messages. The SEN proposal implemented a similar technique and found it to be too resource intensive - hence their SIP proposal extensions. Having a tunnel in FANTOM has further advantages, not least in allowing out-of-band signalling and control. The benefit here is that the protocol can be extended to include other functions such as network management without breaking the architecture. We want FANTOM to be extensible. This email is getting quite long so I'll conclude by remarking that I hope that these explanations indicate that while FANTOM appears more complex than TURN, there is a reason behind each method FANTOM implements. We haven't made it complex for complexity's sake. FANTOM may be unfamiliar, but that's no reason to start from scratch which I fear TURN is. Steve -----Original Message----- From: John LaCour [ mailto:jlacour@netscreen.com ] Sent: 15 November 2001 21:58 To: 'Steve Davies'; 'Jonathan Rosenberg'; 'midcom@ietf.org' Subject: RE: [midcom] new I-D on "symmetric STUN" Steve, You may or may not be correct, but this message does next to nothing to help any of us evaluate the merits of either proposal. Just because something was created earlier or even implemented doesn't make it inherently better. Rather than try to strong-arm us, you really need to enumerate the many flaws and how your proposal addresses them. If you want to be completely forthcoming coming you should also discuss the weaknesses of your own proposal and why you've made those trade-offs. In fairness to you and Jonathan, I haven't done a thorough review of either proposal yet. This message should not be misconstrued as supporting either proposal. Rather I'm trying to encourage you to tell us something useful. -John -----Original Message----- From: Steve Davies [ mailto:sdavies@ridgewaysystems.com ] Sent: Thursday, November 15, 2001 1:42 PM To: 'Jonathan Rosenberg'; 'midcom@ietf.org' Subject: RE: [midcom] new I-D on "symmetric STUN" Interesting TURN of events or should I say 'U TURN'. Puns aside, this proposal says nothing that hasn't already been proposed. While I am pleased to see TURN uses IDENTICAL concepts to the Davies proposal, it contains many flaws (too numerous to go into here). Fix those flaws and you end up with the Davies proposal. Not only does TURN come a month after the deadline set in Melinda's rules of engagement, but the development of such a new and immature proposal is by definition not in the best interests of a pre-midcom solution. If we agree on the concepts and Jonathan et al are interested in a quick solution, then surely it makes sense to jointly work on the most mature incarnation of those concepts. Why re-invent the wheel? Steve ------_=_NextPart_001_01C17793.6CB7D790 Content-Type: text/html; charset="iso-8859-1" RE: [midcom] new I-D on "symmetric STUN"
Steve et. al.,
 
   I'm catching up with the discussions after a period out of office. Some comments/questions on FANTOM. My apologies if they have already been discussed.
 
1) Your App. Proxy is also an RTP Proxy. So for a simple two party call where both are behind NAPT, the media need to traverse at least 3 RTP proxies. Is this correct?
 
2) Not sure what you gain by making the media go through the App. Proxy? For example, in our proposal, we have the terminal send the empty RTP packets (equivalent to your probes) directly to the Media intermediary in the SP network to establish the media binds.
 
3) For SIP services, your AP and PEA both will house a SIP Proxy function, RTP Proxy function, as well as your control protocol+ RTP/RTCP probes. What is the implication of putting all these functions in one box from capacity, fault-tolerance and security p.o.v. ? For example, the AP will be doing refreshes for all NAT binds for all RTP sessions on behalf of all terminals.
 
4) Are you planning on using a standard protocol as this control protocol? In Sen proposal, we've used an existing device control protocol. The sen proposal essentially needs no new protocol development.
 
5) Your requirement for always allowing traffic from some "well-known" address/port of PEA to the AP in the private network is a big concern. This is typically NOT done in traditional enterprise FW. Such a FW will typically close the pin-hole after sometime, hence the need for signaling path refreshes (using PING or REGISTER) both in our scheme and Jonathan's.
 
 
Thanks,
Sanjoy
 
-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: Tuesday, November 20, 2001 11:18 AM
To: 'John LaCour'; 'midcom@ietf.org'
Cc: 'Jonathan Rosenberg'
Subject: RE: [midcom] new I-D on "symmetric STUN"

John,

You are quite right. This email didn't help move the debate forward much. I'm afraid I got a little frustrated with the politics. Nevertheless, I stick by my statements so let me give you a couple of examples of the flaws I see.

* FANTOM uses an out-of-band signalling method 'Create Media Flow' to assign transport addresses on the remote server/public intemediary. It then sends outbound UDP Probes (with a session identifier) to create the dynamic NAT assignment and to complete the mapping between the resultant random source port the probe came from, and the transport addresses the Create Media Flow method assigned, and the call. The first probe effectively creates an outbound UDP connection down which media may flow in either direction for that call. Please note that media is NOT tunneled in FANTOM.

TURN tries to simplify this approach by combining the 'probe' (the method to create the dynamic NAT assignment) with an in-band signalling method to assign transport addresses on the public intermediary. This is the ALLOCATE method in TURN.

One of the main reasons FANTOM has out-of-band signalling was to conform to the spirit of RTP/RTCP by assigning consecutive port pairs to represent the receive RTP/RTCP addresses at the intermediary. A single method 'Create Media Flow' does that. Having grabbed a port pair, 2 UDP outbound connections are needed to the intermediary to receive the respective RTP and RTCP flows. Hence the Probes.

TURN cannot conform to the spirit of RTP in this way because the ALLOCATE method only reserves a single transport address on the intermediary. If it requested 2 transport addresses, a probe or very similar mechanism would be required to establish the second outbound UDP connection. Even worse, the way TURN is specified, there is a good chance that as a TURN server runs out of resource the associated RTP and RTCP transport addresses could have different IP addresses. NOT ALLOWED.

There are many other advantages to using a separate Probe message. One very good use of probes is to keep NAT bindings assigned, i.e. they are sent at regular intervals to prevent the NAT from timing out. TURN has no probe or NAT keep-alive methods which breaks the solution on at least 2 counts. In one case, a terminal may make an ALLOCATE to obtain an address with which to register with a public SIP proxy. It then sits there waiting to receive incoming calls. However, without some traffic such as a probe or a NAT keep alive, the NAT assignment created by the ALLOCATE times out, which means the terminal won't receive incoming call notifications. A second case when the NAT binding may time out is when the remote party is not talking and their terminal implements silence suppression.

FANTOM uses probes to ensure this doesn't happen. In FANTOM probes are designed to be easily recognisable in order to help the implementation of an efficient forwarding intermediary.

* TURN doesn't use a tunnel. FANTOM does. Some think that this implies FANTOM is a VPN variant. FANTOM is most definitely not, but we'll deal with that separately. FANTOM uses a tunnel for multiplexing out-of-band call control and the out-of-band FANTOM client-server protocol into a single connection. The connection is TCP because we valued reliability and the life-time is more easily managed by the NAT. It could be UDP but we didn't feel we needed to re-invent a UDP session with TCP characteristics.

We envisaged that the client end of FANTOM would be implemented in severals ways. For example, it could be implemented in a standalone system, serving many terminals in a single enterprise. In Centrex applications there would be no local proxy. In this case the FANTOM client would have to handle multiple simultaneous call setups and cleardowns. We judged a single persistant tunnel for all call control from the FANTOM client to FANTOM server was the most efficient use of resources.

To avoid tunnels, a similar TURN implementation would require the standalone client to create many UDP connections to the intermediary - one for each terminal wanting to receive incoming calls. As we remarked above, these UDP connections need to keep NAT bindings through some sort of NAT-keep-alive messages. The SEN proposal implemented a similar technique and found it to be too resource intensive - hence their SIP proposal extensions.

Having a tunnel in FANTOM has further advantages, not least in allowing out-of-band signalling and control. The benefit here is that the protocol can be extended to include other functions such as network management without breaking the architecture. We want FANTOM to be extensible.

This email is getting quite long so I'll conclude by remarking that I hope that these explanations indicate that while  FANTOM appears more complex than TURN, there is a reason behind each method FANTOM implements. We haven't made it complex for complexity's sake. FANTOM may be unfamiliar, but that's no reason to start from scratch which I fear TURN is.

Steve

-----Original Message-----
From: John LaCour [mailto:jlacour@netscreen.com]
Sent: 15 November 2001 21:58
To: 'Steve Davies'; 'Jonathan Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric STUN"


Steve,
 
You may or may not be correct, but this message does next to nothing
to help any of us evaluate the merits of either proposal.
 
Just because something was created earlier or even implemented doesn't
make it inherently better.
 
Rather than try to strong-arm us, you really need to enumerate the many
flaws and how your proposal addresses them.  If you want to be
completely forthcoming coming you should also discuss the weaknesses
of your own proposal and why you've made those trade-offs.
 
In fairness to you and Jonathan, I haven't done a thorough review of
either proposal yet.  This message should not be misconstrued
as  supporting either proposal.  Rather I'm trying to encourage
you to tell us something useful.
 
-John
-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: Thursday, November 15, 2001 1:42 PM
To: 'Jonathan Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric STUN"


Interesting TURN of events or should I say 'U TURN'.
Puns aside, this proposal says nothing that hasn't already been proposed. While I am pleased to see TURN uses IDENTICAL concepts to the Davies proposal, it contains many flaws (too numerous to go into here). Fix those flaws and you end up with the Davies proposal. Not only does TURN come a month after the deadline set in Melinda's rules of engagement, but the development of such a new and immature proposal is by definition not in the best interests of a pre-midcom solution. If we agree on the concepts and Jonathan et al are interested in a quick solution, then surely it makes sense to jointly work on the most mature incarnation of those concepts. Why re-invent the wheel?

Steve

------_=_NextPart_001_01C17793.6CB7D790-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 27 18:55:48 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA00107 for ; Tue, 27 Nov 2001 18:55:48 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id SAA21508 for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 18:55:23 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA21423; Tue, 27 Nov 2001 18:48:50 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA21345 for ; Tue, 27 Nov 2001 18:48:47 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA29878 for ; Tue, 27 Nov 2001 18:48:45 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112723453902985 ; Tue, 27 Nov 2001 23:45:39 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Tue, 27 Nov 2001 23:47:48 -0000 Message-ID: <00533D13955AD411AF3800A0C9B42639E92549@ThisAddressDoesNotExist> From: Steve Davies To: "'jdrosen@dynamicsoft.com'" , "'rohan@cisco.com'" , "'Christian Huitema'", "'jweinberger@dynamicsoft.com'" Cc: midcom@ietf.org Subject: RE: [midcom] pre-midcom - How does TURN work? Date: Tue, 27 Nov 2001 23:47:38 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C1779D.E5956AB0" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C1779D.E5956AB0 Content-Type: text/plain; charset="ISO-8859-1" All, By way of clarification of the first question, when I say 'behind' I mean the central registrar is on the public side of the TURN Server, viz: TURN Client<->NAT<->TURN Server<->Central Registrar<->etc. So the client must go through TURN to get to the registrar - a typical managed service deployment. Hopefully the other questions are clear. Steve -----Original Message----- From: Steve Davies [mailto:sdavies@ridgewaysystems.com] Sent: 27 November 2001 18:19 To: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; 'Christian Huitema'; 'jweinberger@dynamicsoft.com' Cc: midcom@ietf.org Subject: [midcom] pre-midcom - How does TURN work? Jonathan, Joel, Christian and Rohan, Please explain how you expect the following to work within TURN: * How does a client register with a central registrar behind the TURN server. The ALLOCATE method obtains a public transport address to represent the client, but how does the registration request get forwarded from the TURN server to the central registrar? * When a call exists between 2 clients that are behind 2 different TURN servers, there appears to be a media deadlock. It appears from the description, that both TURN servers are waiting for the other to send them media before each of them knows where to send media to. Is this interpretation correct? * What is your solution for RTP port pairing? * How do you expect to prevent NATs from timing out on both the 'in-bound signaling' connection and for media in the presence of silence suppression? It would also really be nice to see the detail of a proper call flow - SIP or H.323 will suffice. Until we see how TURN is expected to work it is difficult to make a like-for-like comparison with FANTOM and have a proper debate on the pros and cons of various methods. Thanks. Steve ------_=_NextPart_001_01C1779D.E5956AB0 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom - How does TURN work?

All,

By way of clarification of the first question, when I = say 'behind' I mean the central registrar is on the public side of the = TURN Server, viz: TURN Client<->NAT<->TURN = Server<->Central Registrar<->etc. So the client must go = through TURN to get to the registrar - a typical managed service = deployment.

Hopefully the other questions are clear.

Steve


-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysyste= ms.com]
Sent: 27 November 2001 18:19
To: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; = 'Christian Huitema'; 'jweinberger@dynamicsoft.com'
Cc: midcom@ietf.org
Subject: [midcom] pre-midcom - How does TURN = work?


Jonathan, Joel, Christian and Rohan,
Please explain how you expect the following to work = within TURN:
* How does a client register with a central = registrar behind the TURN server. The ALLOCATE method obtains a public = transport address to represent the client, but how does the = registration request get forwarded from the TURN server to the central = registrar?

* When a call exists between 2 clients that are = behind 2 different TURN servers, there appears to be a media deadlock. = It appears from the description, that both TURN servers are waiting for = the other to send them media before each of them knows where to send = media to. Is this interpretation correct?

* What is your solution for RTP port pairing?
* How do you expect to prevent NATs from timing out = on both the 'in-bound signaling' connection and for media in the = presence of silence suppression?

It would also really be nice to see the detail of a = proper call flow - SIP or H.323 will suffice. Until we see how TURN is = expected to work it is difficult to make a like-for-like comparison = with FANTOM and have a proper debate on the pros and cons of various = methods.

Thanks.
Steve

------_=_NextPart_001_01C1779D.E5956AB0-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 27 20:27:23 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA02165 for ; Tue, 27 Nov 2001 20:27:23 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id UAA24005 for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 20:27:25 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id UAA23954; Tue, 27 Nov 2001 20:26:13 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id UAA23925 for ; Tue, 27 Nov 2001 20:26:11 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA02128 for ; Tue, 27 Nov 2001 20:26:09 -0500 (EST) Received: from imop.cisco.com (imop.cisco.com [171.69.11.44]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAS1NRc14825; Tue, 27 Nov 2001 17:23:27 -0800 (PST) Received: from imop.cisco.com (localhost.cisco.com [127.0.0.1]) by imop.cisco.com (Mirapoint) with SMTP id ACC17422 (AUTH rmahy); Tue, 27 Nov 2001 17:23:27 -0800 (PST) Message-Id: <200111280123.ACC17422@imop.cisco.com> Received: from 128.107.142.121 by imop.cisco.com with HTTP/1.1; Tue, 27 Nov 2001 17:27:31 -0800 Date: Tue, 27 Nov 2001 17:27:31 -0800 From: Rohan Mahy Subject: RE: [midcom] pre-midcom - How does TURN work? To: Steve Davies Cc: "'jdrosen@dynamicsoft.com'" , "'rohan@cisco.com'" , "'Christian Huitema'" , "'jweinberger@dynamicsoft.com'" , midcom@ietf.org X-Mailer: Mirapoint Webmail Direct 2.9.1.3 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit ---- Original message ---- >Date: Tue, 27 Nov 2001 23:47:38 -0000 >From: Steve Davies >Subject: RE: [midcom] pre-midcom - How does TURN work? >To: "'jdrosen@dynamicsoft.com'" , "'rohan@cisco.com'" , "'Christian Huitema'", "'jweinberger@dynamicsoft.com'" >Cc: midcom@ietf.org > >All, > >By way of clarification of the first question, when I say 'behind' I mean >the central registrar is on the public side of the TURN Server, viz: TURN >Client<->NAT<->TURN Server<->Central Registrar<->etc. So the client must go >through TURN to get to the registrar - a typical managed service deployment. > >Hopefully the other questions are clear. > >Steve > > >-----Original Message----- >From: Steve Davies [mailto:sdavies@ridgewaysystems.com] >Sent: 27 November 2001 18:19 >To: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; 'Christian Huitema'; >'jweinberger@dynamicsoft.com' >Cc: midcom@ietf.org >Subject: [midcom] pre-midcom - How does TURN work? > > >Jonathan, Joel, Christian and Rohan, >Please explain how you expect the following to work within TURN: >* How does a client register with a central registrar behind the TURN >server. The ALLOCATE method obtains a public transport address to represent >the client, but how does the registration request get forwarded from the >TURN server to the central registrar? There is no need to use TURN to communicate with a SIP Server. SIP over TCP or TLS works fine as specified in bis. SIP over UDP must use the rport Via parameter specified in draft-ietf-sip-nat-00.txt MGCP and H.323 both use TCP, so they are likewise OK for signaling. >* When a call exists between 2 clients that are behind 2 different TURN >servers, there appears to be a media deadlock. It appears from the >description, that both TURN servers are waiting for the other to send them >media before each of them knows where to send media to. Is this >interpretation correct? A user originating an INVITE using a TURN server should represent that they can use symmetric RTP in passive mode. When a user behind a symmetric NAT receives an INVITE offering this, it does not use TURN, it instead sends its media to the addresses advertised in SDP (the sender's TURN server). >* What is your solution for RTP port pairing? This is an area where we need to write a concrete proposal. We had some discussions about this when STUN/TURN where part of the same proposal, but we never closed on a syntax. Basically the approach would involve including a parameter in the first Allocate request to hold the next address for a short period of time. The second request would contain some information from the previous request (for example the next expected MAPPED-ADDRESS parameter). >* How do you expect to prevent NATs from timing out on both the 'in-bound signaling' connection either use TCP/TLS, or send a sacrifice packet periodically to keep the mapping fresh. This sacrifice could be an OPTIONS with max-forwards of 0, a PING as in the Nortel proposal, etc. >and for media in the presence of silence suppression? endpoints should send empty RTP packets periodically if no RTP is sent. likewise with RTCP announcements. >It would also really be nice to see the detail of a proper call flow - SIP >or H.323 will suffice. Until we see how TURN is expected to work it is >difficult to make a like-for-like comparison with FANTOM and have a proper >debate on the pros and cons of various methods. >Thanks. >Steve Agreed. thanks, -rohan _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 27 21:29:55 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA03216 for ; Tue, 27 Nov 2001 21:29:54 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id VAA25469 for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 21:27:21 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA25338; Tue, 27 Nov 2001 21:16:12 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA25307 for ; Tue, 27 Nov 2001 21:16:10 -0500 (EST) Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA03043 for ; Tue, 27 Nov 2001 21:16:07 -0500 (EST) Received: from smtprch2.nortel.com (erchg0k.us.nortel.com [47.113.64.104]) by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id UAA26397 for ; Tue, 27 Nov 2001 20:15:39 -0600 (CST) Received: from zsc4c000.us.nortel.com by smtprch2.nortel.com; Tue, 27 Nov 2001 20:08:25 -0600 Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19) id ; Tue, 27 Nov 2001 18:14:12 -0800 Message-ID: <2F1FC1DEA077D5119FAD00508BCFD6D201190E99@zsc3c030.us.nortel.com> From: "Francois Audet" To: "'Rohan Mahy'" , "'Steve Davies'" Cc: "'jdrosen@dynamicsoft.com'" , "'Christian Huitema'" , "'jweinberger@dynamicsoft.com'" , "'midcom@ietf.org'" Subject: RE: [midcom] pre-midcom - How does TURN work? Date: Tue, 27 Nov 2001 18:14:14 -0800 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C177B2.60074DE0" X-Orig: Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C177B2.60074DE0 Content-Type: text/plain; charset="iso-8859-1" > MGCP and H.323 both use TCP, so they are likewise OK for > signaling. Unfortunately, H.323 explicitely specifies TCP ports (as well as the IP address) to be used for signalling. Also, to make things worst, the H.245 TCP channel is specified dynamically (IP address and port) in H.225.0 at every call. Either end can specify it, so it makes NAT traversal pretty difficult. Unless you use H.245 tunnelling. ------_=_NextPart_001_01C177B2.60074DE0 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom - How does TURN work?

> MGCP and H.323 both use TCP, so they are = likewise OK for
> signaling.

Unfortunately, H.323 explicitely specifies TCP ports = (as well as the IP address)
to be used for signalling.

Also, to make things worst, the H.245 TCP channel is = specified dynamically (IP address and port) in H.225.0 at every call. = Either end can specify it, so

it makes NAT traversal pretty difficult. Unless you = use H.245 tunnelling.

------_=_NextPart_001_01C177B2.60074DE0-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 27 21:40:48 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA04340 for ; Tue, 27 Nov 2001 21:40:43 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id VAA25956 for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 21:40:46 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA25937; Tue, 27 Nov 2001 21:39:23 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA25906 for ; Tue, 27 Nov 2001 21:39:21 -0500 (EST) Received: from pop.mainstreet.net (smtp.mainstreet.net [207.5.0.46]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA04327 for ; Tue, 27 Nov 2001 21:39:18 -0500 (EST) Received: from vip (saqibj.mainstreet.net [207.5.1.168]) by pop.mainstreet.net (8.11.3/8.11.3) with SMTP id fAS2d9P75815; Tue, 27 Nov 2001 18:39:09 -0800 (PST) Reply-To: From: "Saqib Jang" To: "Melinda Shore" , "Barry Scott" , Subject: RE: [midcom] pre-midcom solutions != VPN Date: Tue, 27 Nov 2001 18:47:13 -0800 Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0) Importance: Normal X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300 In-Reply-To: <5.1.0.14.0.20011123150254.00a5e200@localhost> Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit Without belaboring the point, let me only say that I think it is very important to have a discussion & consensus on whether the costs of developing & deploying a new protocol (especially another symmetric protocol) outweighs its benefits. Has such a discussion taken place and is there a consensus on this issue? Saqib -----Original Message----- From: Melinda Shore [mailto:mshore@cisco.com] Sent: Friday, November 23, 2001 12:07 PM To: Barry Scott; 'Saqib Jang'; midcom@ietf.org Subject: RE: [midcom] pre-midcom solutions != VPN At 04:34 PM 11/23/01 +0000, Barry Scott wrote: >I cannot see how to use a VPN to make VOIP protocols work between private >IP address space and a shared public IP address space. VPNs don't always use separate address spaces. Also, it's not that endpoints on a VPN already all share an address space - it's more typically the case that an address that's routable within the VPN is *loaned* to the endpoint when it joins the VPN. The pre-midcom work is intended address cases that are not currently handled by existing technology. Let's move on, please. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Tue Nov 27 21:58:17 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA04514 for ; Tue, 27 Nov 2001 21:58:17 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id VAA26200 for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 21:58:19 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA26185; Tue, 27 Nov 2001 21:57:30 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA26142 for ; Tue, 27 Nov 2001 21:57:26 -0500 (EST) Received: from mgo.iij.ad.jp (root@mgo.iij.ad.jp [202.232.15.6]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA04499 for ; Tue, 27 Nov 2001 21:57:22 -0500 (EST) Received: from ns.iij.ad.jp (ns.iij.ad.jp [192.168.2.8]) by mgo.iij.ad.jp (8.8.8/MGO1.0) with ESMTP id LAA06582; Wed, 28 Nov 2001 11:55:07 +0900 (JST) Received: from zeus (h188n005.iij.ad.jp [192.168.5.188]) by ns.iij.ad.jp (8.8.5/3.5Wpl7) with ESMTP id LAA22111; Wed, 28 Nov 2001 11:55:06 +0900 (JST) To: midcom@ietf.org Cc: nats@ml.canonet.ne.jp, nats@bugest.net From: Kuniaki Kondo Message-Id: <200111281155.DCG19336.BLLVJJO@iij.ad.jp> X-Mailer: Winbiff [Version 2.34beta3] X-Accept-Language: ja,en Date: Wed, 28 Nov 2001 11:55:06 +0900 Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Subject: [midcom] STUN/TURN and NATS Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Hi, I summarize what is difference NATS, my draft, and STUN/TURN which has discussed on this list. First of all, Midcom approach such as STUN/TURN would traverse NAT/FW without changing NAT box or FW software. However, NATS approach is different. NATS would traverse them with changing NAT box software, but it does not need to change end host such as PCs. Furthermore, Target of NATS is residential user or SOHO user who uses very simple network topology. I considered differences stand on this conditions. Most differences between STUN/TURN and NATS is that STUN/TURN needs a server, but NATS does not need it. And, STUN/TURN needs to support this protocol on clients such as PCs, but NATS does not need to support it. However, If end users want to use all NATS features, then end hosts might support NATS. However, this is NOT mandatory. It means that residential users can support NATS to upgrade firmware of NAT box or SOHO router, and other equipments such as PCs does not need to change anything. Furthermore, In the STUN/TURN approach, connections have to through server. Therefore, it might make collecting traffic if ISP uses those protocol. Especially, If VoIP or MoIP use those midcom protocol, VoIP or MoIP make over some 10Kbps traffic, totally those traffic might reach some hundreds mega bps at ISP which have many thousands of residential users. For improve those situation, STUN/TURN protocol supports multi-server topology. However, ISPs probably do not desire to put those servers because those servers might make slow down performance to transfer packets. Furthermore, residential user especially game user or VoIP user worry about delay. They might hate that there are servers to transfer those traffic on the network. Certainly, those topology are acceptable for enterprise user. On this perspective, I believe that we should consider a method which does not need servers like NATS not only which needs servers like STUN/TURN. Finally, NATS is in developing phase, and some test codes have already worked. And, some products decided that it will implement NATS. Thanks. -- Kuniaki Kondo kuniaki@iij.ad.jp _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Wed Nov 28 03:08:40 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA25876 for ; Wed, 28 Nov 2001 03:08:40 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id DAA13895 for midcom-archive@odin.ietf.org; Wed, 28 Nov 2001 03:08:42 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA13864; Wed, 28 Nov 2001 03:07:30 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA13826 for ; Wed, 28 Nov 2001 03:07:28 -0500 (EST) Received: from mail.bigsale.com ([203.248.138.4]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA25862 for ; Wed, 28 Nov 2001 03:07:23 -0500 (EST) Received: from ssle ([211.171.1.156]) by mail.bigsale.com (8.9.3/8.9.3) with SMTP id BAA08766 for ; Thu, 29 Nov 2001 01:35:13 +0900 Message-Id: <200111281635.BAA08766@mail.bigsale.com> From: admin To: midcom@ietf.org X-Mailer: Microsoft Outlook Express 5.00.2615.200 Reply-To: admin@bojimolca.com Date: Wed, 28 Nov 2001 17:07:31 +0900 Mime-Version: 1.0 Content-Type: text/html; charset=ks_c_5601-1987 Subject: [midcom] [±ä±Þ°øÁö] µåµð¾î ¿ÀǵǾú½À´Ï´Ù. Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org È­Á¦ÀÇ H¾çºñµð¿À

º¸Áö¸ôÄ«´åÄÄ

  È­Á¦ÀÇ H¾çºñµð¿À.¿©´ë»ýÀÇ ÇÏ·ç......

  ÆäƼ½¬.¸ôÄ«.XXXÀϺ» µ¿¿µ»ó,¼½½º¾ß»ç..

¡¡

¡¡

_______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Wed Nov 28 09:00:50 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA07783 for ; Wed, 28 Nov 2001 09:00:50 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id JAA25437 for midcom-archive@odin.ietf.org; Wed, 28 Nov 2001 09:00:54 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA25012; Wed, 28 Nov 2001 08:56:42 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA24985 for ; Wed, 28 Nov 2001 08:56:40 -0500 (EST) Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA07493 for ; Wed, 28 Nov 2001 08:56:35 -0500 (EST) Received: from BobP [63.67.143.2] by acmepacket.com (SMTPD32-7.04) id AD165AE50038; Wed, 28 Nov 2001 08:56:38 -0500 Message-ID: <004f01c17813$69cae1a0$2300000a@acmepacket.com> From: "Bob Penfield" To: "Rohan Mahy" , "Steve Davies" Cc: References: <200111280123.ACC17422@imop.cisco.com> Subject: Re: [midcom] pre-midcom - How does TURN work? Date: Wed, 28 Nov 2001 08:48:50 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.50.4133.2400 X-Mimeole: Produced By Microsoft MimeOLE V5.50.4133.2400 Content-Transfer-Encoding: 7bit Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 7bit > >* When a call exists between 2 clients that are behind 2 > different TURN > >servers, there appears to be a media deadlock. It appears > from the > >description, that both TURN servers are waiting for the other > to send them > >media before each of them knows where to send media to. Is this > >interpretation correct? > > A user originating an INVITE using a TURN server should > represent that they can use symmetric RTP in passive mode. > When a user behind a symmetric NAT receives an INVITE offering > this, it does not use TURN, it instead sends its media to the > addresses advertised in SDP (the sender's TURN server). > Why would you need to use passive RTP at all? A client uses TURN to allocate an address on an RTP relay. It puts that allocated address in its SDP. As long as the client sent the TURN request out the UDP port it wants to receive RTP on, the TURN relay will send any packets arriving at the allocated address to the client's RTP port. The client initiated the outbound "connection" with the TURN request, therefore the firewall/NAT will allow packets back from the TURN port. The packets outbound from the client don't need to go through the relay (do they?). I don't see any deadlock at all. I don't even see a need for passive RTP or symmetric RTP. Endpoints can send the RTP to the address advertised in the SDP. If that address is one allocated on a TURN relay, it will be forwarded to the real endpoint. Am I missing something? _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Wed Nov 28 10:53:15 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA15630 for ; Wed, 28 Nov 2001 10:53:14 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id KAA28854 for midcom-archive@odin.ietf.org; Wed, 28 Nov 2001 10:53:20 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA28776; Wed, 28 Nov 2001 10:47:04 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA28749 for ; Wed, 28 Nov 2001 10:47:02 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA15316 for ; Wed, 28 Nov 2001 10:46:56 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fASFkUc08817 for ; Wed, 28 Nov 2001 07:46:30 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ACB86941; Wed, 28 Nov 2001 07:45:33 -0800 (PST) Message-Id: <5.1.0.14.0.20011128103011.00a568d0@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Wed, 28 Nov 2001 10:49:09 -0500 To: midcom@ietf.org From: Melinda Shore Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Subject: [midcom] Update Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org 1) We've completed working group last call on the framework draft without finding any serious problems, so the document is going to be handed over for IESG review. Many thanks to Suresh and the other authors. 2) The requirements document is also in working group last call. WG last call ends on Monday, 10 December. 3) The pre-midcom discussion has generally been not that productive. I think that perhaps it might be more useful if people who are not authors on any of the proposed protocols could start identifying issues they feel need to be addressed. One which will bear some consideration is whether or not the document which contains encumbered technology is sufficiently superior to the other proposals to be able to be considered a candidate under IETF guidelines. 4) We're going to be discussing rechartering at the upcoming IETF meeting. The new charter would be focused on protocol development. Presumably, following the patterns in other working groups such as AAA, there would be an effort to produce a document discussing the suitability of various existing protocols and drawing comparisons among them, followed by a decision to select one as a base protocol, followed by actual protocol development. I would very much hate to see the working group sidetracked by pre-midcom discussions. 5) I'm throwing a monkey wrench into (4) by asking the working group to consider not following the model described in the framework and requirements drafts. In draft-shore-friendly-midcom-00.txt I describe a framework for middlebox communication that solves the topology- related problems that have plagued us since the outset, that provides a better model for inter-domain operation, that can work with multicast, that makes use of the existing IP routing infrastructure, that has better security properties, and that I feel is more architecturally sound. My intent here is not to sandbag the working group but to try to make sure that we don't allow procedural rigidity to prevent us from doing the right thing technically. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Wed Nov 28 17:28:17 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA19351 for ; Wed, 28 Nov 2001 17:28:17 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA12845 for midcom-archive@odin.ietf.org; Wed, 28 Nov 2001 17:28:22 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA12733; Wed, 28 Nov 2001 17:16:23 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA12703 for ; Wed, 28 Nov 2001 17:16:21 -0500 (EST) Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA18260 for ; Wed, 28 Nov 2001 17:16:16 -0500 (EST) Received: from smtprch1.nortel.com (erchg0j.us.nortel.com [47.113.64.103]) by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id QAA08334 for ; Wed, 28 Nov 2001 16:15:42 -0600 (CST) Received: from zrchb200.us.nortel.com by smtprch1.nortel.com; Wed, 28 Nov 2001 16:05:50 -0600 Received: by zrchb200.us.nortel.com with Internet Mail Service (5.5.2653.19) id ; Wed, 28 Nov 2001 16:09:15 -0600 Message-ID: <933FADF5E673D411B8A30002A5608A0E06F31B@zrc2c012.us.nortel.com> From: "Sanjoy Sen" To: midcom@ietf.org Cc: "Sanjoy Sen" Date: Wed, 28 Nov 2001 16:09:16 -0600 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C17859.51E1A790" Subject: [midcom] some points regarding the Sen proposal Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C17859.51E1A790 Content-Type: text/plain; charset="iso-8859-1" All, I would like to highlight a few important differences between the Sen proposal and TURN, FANTOM on the use of the Intermediary-based solution: 1) New protocol development vs NO new protocol development: An average common practise may go either way, but the cost/complexity issues for a solution deemed to be near-term need to be clearly analysed. There're two fundamental requirements here: 1) establish a bind on the Intermediary and let the endpoint know about it, and 2) establish & keep refreshing the NAT bind, or settle on a permanently open bind. Both TURN, FANTOM rely on a new protocol to capture and transfer the Intermediary binds. Sen proposal piggy-backs the bind information on the existing application signaling (this is what makes the Sen proposal appear SIP specific, but the same principle is applicable to any other signaling protocol - this will be illustrated in the next version of the draft). No new protocol is required. For refreshing the binds, both the Sen and TURN/STUN proposals rely on "sacrifice" packets - they leverage on existing application signaling packets and silence RTP packets (this would work even in the face of silence suppression as comfort noise packets are almost always generated in existing codecs; if not, empty RTP packets are used). Again, advantage is that no new protocol development required. FANTOM either keeps the bind open or rely on new probe packets. 2) Use of symmetric RTP: Sen proposal uses symmetric RTP configuration - which simply means the client sends and receives RTP packets in the same port. This is a trivial configuration done in most clients and saves a lot of unwarranted overhead such as maintaining too many binds (for a single media session, you need 4), refreshing each of them independently etc. 3) The Sen proposal does not impose any restriction on the Enterprise NAT/FW policy. 4) From complexity perspective, the Sen proposal is equivalent to TURN with the additional vantage that no new protocol development required. Both Sen and TURN uses a single Intermediary, while FANTOM uses two signaling & media proxies. The Sen (and FANTOM?) proposal is primarily targetted towards the needs of Large/Medium Enterprises and Carriers where media/signaling route-pinning provides advantages in terms of QoS, billing, security etc. STUN/TURN offers much more flexibility and economy for residential, SOHO, SME markets. 5) The use of an existing device control protocol in the Sen proposal between the signaling Proxy and the Media Proxy makes it closest to a future Midcom protocol. Regards, Sanjoy ------_=_NextPart_001_01C17859.51E1A790 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable some points regarding the Sen proposal

All,

   I would like to highlight a few = important differences between the Sen proposal and TURN, FANTOM on the = use of the Intermediary-based solution:

1) New protocol development vs NO new protocol = development:
An average common practise may go either way, but = the cost/complexity issues for a solution deemed to be near-term need = to be clearly analysed. There're two fundamental requirements here: 1) = establish a bind on the Intermediary and let the endpoint know about = it, and 2) establish & keep refreshing the NAT bind, or settle on a = permanently open bind.

Both TURN, FANTOM rely on a new protocol to capture = and transfer the Intermediary binds. Sen proposal piggy-backs the bind = information on the existing application signaling (this is what makes = the Sen proposal appear SIP specific, but the same principle is = applicable to any other signaling protocol - this will be illustrated = in the next version of the draft). No new protocol is required. =

For refreshing the binds, both the Sen and TURN/STUN = proposals rely on "sacrifice" packets - they leverage on = existing application signaling packets and silence RTP packets (this = would work even in the face of silence suppression as comfort noise = packets are almost always generated in existing codecs; if not, empty = RTP packets are used). Again, advantage is that no new protocol = development required. FANTOM either keeps the bind open or rely on new = probe packets.

2) Use of symmetric RTP:
Sen proposal uses symmetric RTP configuration - = which simply means the client sends and receives RTP packets in the = same port. This is a trivial configuration done in most clients and = saves a lot of unwarranted overhead such as maintaining too many binds = (for a single media session, you need 4), refreshing each of them = independently etc.

3) The Sen proposal does not impose any restriction = on the Enterprise NAT/FW policy.

4) From complexity perspective, the Sen proposal is = equivalent to TURN with the additional vantage that no new protocol = development required. Both Sen and TURN uses a single Intermediary, = while FANTOM uses two signaling & media proxies. The Sen (and = FANTOM?) proposal is primarily targetted towards the needs of = Large/Medium Enterprises and Carriers where media/signaling = route-pinning provides advantages in terms of QoS, billing, security = etc. STUN/TURN offers much more flexibility and economy for = residential, SOHO, SME markets.

5) The use of an existing device control protocol in = the Sen proposal between the signaling Proxy and the Media Proxy makes = it closest to a future Midcom protocol.

Regards,
Sanjoy
 

------_=_NextPart_001_01C17859.51E1A790-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Wed Nov 28 19:32:24 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA29425 for ; Wed, 28 Nov 2001 19:32:24 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id TAA15600 for midcom-archive@odin.ietf.org; Wed, 28 Nov 2001 19:32:24 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA15563; Wed, 28 Nov 2001 19:30:58 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA15534 for ; Wed, 28 Nov 2001 19:30:55 -0500 (EST) Received: from mail2.microsoft.com (mail2.microsoft.com [131.107.3.124]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA29276 for ; Wed, 28 Nov 2001 19:30:52 -0500 (EST) Received: from INET-VRS-02.redmond.corp.microsoft.com ([157.54.8.110]) by mail2.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Wed, 28 Nov 2001 16:29:49 -0800 Received: from 157.54.5.25 by INET-VRS-02.redmond.corp.microsoft.com (InterScan E-Mail VirusWall NT); Wed, 28 Nov 2001 16:29:50 -0800 Received: from red-imc-04.redmond.corp.microsoft.com ([157.54.2.168]) by inet-hub-03.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Wed, 28 Nov 2001 16:29:49 -0800 Received: from win-imc-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.84]) by red-imc-04.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Wed, 28 Nov 2001 16:29:49 -0800 Received: from win-msg-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.134]) by win-imc-02.wingroup.windeploy.ntdev.microsoft.com with Microsoft SMTPSVC(6.0.3588.0); Wed, 28 Nov 2001 16:29:09 -0800 X-MimeOLE: Produced By Microsoft Exchange V6.0.6063.0 content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Date: Wed, 28 Nov 2001 16:28:52 -0800 Message-ID: Thread-Topic: FYI: UPNP Internet Gateway Device Thread-Index: AcF4WrEwl88DGJCwQAyM/t703B+zbQAEbUlQ From: "Christian Huitema" To: X-OriginalArrivalTime: 29 Nov 2001 00:29:09.0255 (UTC) FILETIME=[DC65E170:01C1786C] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by optimus.ietf.org id TAA15535 Subject: [midcom] FYI: UPNP Internet Gateway Device Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 8bit The UPNP Forum has just published on its web site the recently approved "Internet Gateway Device" control protocol. Specs can be obtained at: http://upnp.org/resources/standards.asp The UPNP standard specifies how a station in a home network can open ports and obtain mapping through a "residential gateway." There is information about support by various companies in the forum's main page, http://upnp.org/ -- Christian Huitema _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Thu Nov 29 10:28:53 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA12564 for ; Thu, 29 Nov 2001 10:28:52 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id KAA16559 for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 10:28:56 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA16529; Thu, 29 Nov 2001 10:27:33 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA16502 for ; Thu, 29 Nov 2001 10:27:31 -0500 (EST) Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA12333 for ; Thu, 29 Nov 2001 10:27:27 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fATFOx005085; Thu, 29 Nov 2001 07:26:39 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ACC20966; Thu, 29 Nov 2001 07:24:09 -0800 (PST) Message-Id: <5.1.0.14.0.20011129102554.00a66ec0@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Thu, 29 Nov 2001 10:27:47 -0500 To: "Christian Huitema" , From: Melinda Shore Subject: Re: [midcom] FYI: UPNP Internet Gateway Device In-Reply-To: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 04:28 PM 11/28/01 -0800, Christian Huitema wrote: >The UPNP Forum has just published on its web site the recently approved >"Internet Gateway Device" control protocol. Specs can be obtained at: People interested in actually playing with it on XP or ME should pick up a security patch from Microsoft. Details at: http://www.securityfocus.com/archive/1/224297 Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 29 12:23:15 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23665 for ; Thu, 29 Nov 2001 12:23:15 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id MAA21471 for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 12:23:17 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA21419; Thu, 29 Nov 2001 12:21:14 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA21394 for ; Thu, 29 Nov 2001 12:21:12 -0500 (EST) Received: from mail1.microsoft.com (mail1.microsoft.com [131.107.3.125]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23515 for ; Thu, 29 Nov 2001 12:21:08 -0500 (EST) Received: from inet-vrs-01.redmond.corp.microsoft.com ([157.54.8.27]) by mail1.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Thu, 29 Nov 2001 09:19:55 -0800 Received: from 157.54.8.109 by inet-vrs-01.redmond.corp.microsoft.com (InterScan E-Mail VirusWall NT); Thu, 29 Nov 2001 09:19:55 -0800 Received: from red-imc-02.redmond.corp.microsoft.com ([157.54.9.107]) by inet-hub-02.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Thu, 29 Nov 2001 09:19:55 -0800 Received: from win-imc-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.84]) by red-imc-02.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966); Thu, 29 Nov 2001 09:19:49 -0800 Received: from win-msg-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.134]) by win-imc-02.wingroup.windeploy.ntdev.microsoft.com with Microsoft SMTPSVC(6.0.3588.0); Thu, 29 Nov 2001 09:19:07 -0800 X-MimeOLE: Produced By Microsoft Exchange V6.0.6063.0 content-class: urn:content-classes:message MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Subject: RE: [midcom] FYI: UPNP Internet Gateway Device Date: Thu, 29 Nov 2001 09:19:06 -0800 Message-ID: Thread-Topic: [midcom] FYI: UPNP Internet Gateway Device Thread-Index: AcF46jA0+IdR3S/TSoKtpnH4EyC30AADuyLw From: "Christian Huitema" To: "Melinda Shore" , X-OriginalArrivalTime: 29 Nov 2001 17:19:07.0360 (UTC) FILETIME=[F3AEE600:01C178F9] Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by optimus.ietf.org id MAA21395 Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Content-Transfer-Encoding: 8bit > At 04:28 PM 11/28/01 -0800, Christian Huitema wrote: > >The UPNP Forum has just published on its web site the recently > approved > >"Internet Gateway Device" control protocol. Specs can be obtained at: > > > People interested in actually playing with it on XP or ME should pick > up a security patch from Microsoft. Details at: > http://www.securityfocus.com/archive/1/224297 Melinda, I was careful to only point at the documentation, not specific products. UPNP Internet Gateway is indeed supported by Windows XP, and is used in services such as DirectPlay, Remote assistance or Messenger. It allows for example Messenger users to set up a direct multi-media call, even if both caller and responders are behind a NAT -- if both NAT support the service. The bug that you mention is not directly related to the Internet Gateway device, but rather to the generic UPNP code -- and it is certainly not related to the specification of the service. In any case, the patch is automatically installed through Windows Update when you install XP, and can be downloaded through Windows Update at any time. -- Christian Huitema _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 29 14:53:26 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA06715 for ; Thu, 29 Nov 2001 14:53:25 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id OAA26831 for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 14:53:27 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA26748; Thu, 29 Nov 2001 14:51:34 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA26717 for ; Thu, 29 Nov 2001 14:51:32 -0500 (EST) Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA06546 for ; Thu, 29 Nov 2001 14:51:29 -0500 (EST) Received: from smtprch1.nortel.com (erchg0j.us.nortel.com [47.113.64.103]) by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id NAA10609 for ; Thu, 29 Nov 2001 13:50:59 -0600 (CST) Received: from zrchb200.us.nortel.com by smtprch1.nortel.com; Thu, 29 Nov 2001 13:45:54 -0600 Received: by zrchb200.us.nortel.com with Internet Mail Service (5.5.2653.19) id ; Thu, 29 Nov 2001 13:49:24 -0600 Message-ID: <933FADF5E673D411B8A30002A5608A0E06F320@zrc2c012.us.nortel.com> From: "Sanjoy Sen" To: "'Melinda Shore'" , midcom@ietf.org Subject: RE: [midcom] Update Date: Thu, 29 Nov 2001 13:49:21 -0600 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C1790E.F0BEBE60" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C1790E.F0BEBE60 Content-Type: text/plain; charset="iso-8859-1" Melinda, Regarding your point # 4) below, we had previously submitted two applicability drafts - one on COPS and the other on MEGACO - discussing the suitability of these for Midcom (at that time, they're beyond the scope of the Charter). The -00 versions of these drafts could be found at http://search.ietf.org/internet-drafts/draft-sct-midcom-megaco-00.txt http://search.ietf.org/internet-drafts/draft-aoun-midcom-cops-00.txt and will be soon updated reflecting the latest requirements/framework drafts and some offline discussions. These drafts had already began doing some of the legwork that you mentioned and should also be considered in the context of the re-chartering. Regards, Sanjoy > -----Original Message----- > From: Melinda Shore [mailto:mshore@cisco.com] > Sent: Wednesday, November 28, 2001 9:49 AM > To: midcom@ietf.org > Subject: [midcom] Update > > > 1) We've completed working group last call on the framework draft > without finding any serious problems, so the document is going to > be handed over for IESG review. Many thanks to Suresh and the > other authors. > 2) The requirements document is also in working group last call. > WG last call ends on Monday, 10 December. > 3) The pre-midcom discussion has generally been not that productive. > I think that perhaps it might be more useful if people who are not > authors on any of the proposed protocols could start identifying > issues they feel need to be addressed. One which will bear some > consideration is whether or not the document which contains > encumbered technology is sufficiently superior to the > other proposals > to be able to be considered a candidate under IETF guidelines. > 4) We're going to be discussing rechartering at the upcoming IETF > meeting. The new charter would be focused on protocol development. > Presumably, following the patterns in other working groups such as > AAA, there would be an effort to produce a document discussing > the suitability of various existing protocols and drawing > comparisons > among them, followed by a decision to select one as a base > protocol, > followed by actual protocol development. I would very much hate to > see the working group sidetracked by pre-midcom discussions. > 5) I'm throwing a monkey wrench into (4) by asking the > working group to > consider not following the model described in the framework and > requirements drafts. In > draft-shore-friendly-midcom-00.txt I describe > a framework for middlebox communication that solves the topology- > related problems that have plagued us since the outset, that > provides a better model for inter-domain operation, that can work > with multicast, that makes use of the existing IP routing > infrastructure, > that has better security properties, and that I feel is more > architecturally sound. My intent here is not to sandbag > the working > group but to try to make sure that we don't allow > procedural rigidity > to prevent us from doing the right thing technically. > > Melinda > > > _______________________________________________ > midcom mailing list > midcom@ietf.org > http://www1.ietf.org/mailman/listinfo/midcom > ------_=_NextPart_001_01C1790E.F0BEBE60 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] Update

Melinda,

    Regarding your point # 4) below, = we had previously submitted two applicability drafts - one on COPS and = the other on MEGACO - discussing the suitability of these for Midcom = (at that time, they're beyond the scope of the Charter). The -00 = versions of these drafts could be found at

http://search.ietf.org/internet-drafts/draft-sct-midco= m-megaco-00.txt
http://search.ietf.org/internet-drafts/draft-aoun-midc= om-cops-00.txt

and will be soon updated reflecting the latest = requirements/framework drafts and some offline discussions.

These drafts had already began doing some of the = legwork that you mentioned and should also be considered in the context = of the re-chartering.

Regards,
Sanjoy
 

> -----Original Message-----
> From: Melinda Shore [mailto:mshore@cisco.com]
> Sent: Wednesday, November 28, 2001 9:49 = AM
> To: midcom@ietf.org
> Subject: [midcom] Update
>
>
> 1) We've completed working group last call on = the framework draft
>    without finding any serious = problems, so the document is going to
>    be handed over for IESG = review.  Many thanks to Suresh and the
>    other authors.
> 2) The requirements document is also in working = group last call. 
>    WG last call ends on Monday, = 10 December.
> 3) The pre-midcom discussion has generally been = not that productive.
>    I think that perhaps it might = be more useful if people who are not
>    authors on any of the = proposed protocols could start identifying
>    issues they feel need to be = addressed.  One which will bear some
>    consideration is whether or = not the document which contains
>    encumbered technology is = sufficiently superior to the
> other proposals
>    to be able to be considered a = candidate under IETF guidelines.
> 4) We're going to be discussing rechartering at = the upcoming IETF
>    meeting.  The new = charter would be focused on protocol development.
>    Presumably, following the = patterns in other working groups such as
>    AAA, there would be an effort = to produce a document discussing
>    the suitability of various = existing protocols and drawing
> comparisons
>    among them, followed by a = decision to select one as a base
> protocol,
>    followed by actual protocol = development.  I would very much hate to
>    see the working group = sidetracked by pre-midcom discussions.
> 5) I'm throwing a monkey wrench into (4) by = asking the
> working group to
>    consider not following the = model described in the framework and
>    requirements drafts.  In =
> draft-shore-friendly-midcom-00.txt I = describe
>    a framework for middlebox = communication that solves the topology-
>    related problems that have = plagued us since the outset, that
>    provides a better model for = inter-domain operation, that can work
>    with multicast, that makes = use of the existing IP routing
> infrastructure,
>    that has better security = properties, and that I feel is more
>    architecturally sound.  = My intent here is not to sandbag
> the working
>    group but to try to make sure = that we don't allow
> procedural rigidity
>    to prevent us from doing the = right thing technically. 
>
> Melinda
>
>
> = _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
>

------_=_NextPart_001_01C1790E.F0BEBE60-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 29 15:03:41 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA07439 for ; Thu, 29 Nov 2001 15:03:41 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA27388 for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 15:03:43 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA27364; Thu, 29 Nov 2001 15:02:24 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA27335 for ; Thu, 29 Nov 2001 15:02:22 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA07337 for ; Thu, 29 Nov 2001 15:02:19 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fATK1pc11042; Thu, 29 Nov 2001 12:01:51 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ACC30396; Thu, 29 Nov 2001 12:00:54 -0800 (PST) Message-Id: <5.1.0.14.0.20011129150346.00a27140@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Thu, 29 Nov 2001 15:04:28 -0500 To: "Sanjoy Sen" , midcom@ietf.org From: Melinda Shore Subject: RE: [midcom] Update In-Reply-To: <933FADF5E673D411B8A30002A5608A0E06F320@zrc2c012.us.nortel. com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 01:49 PM 11/29/01 -0600, Sanjoy Sen wrote: >These drafts had already began doing some of the legwork that you mentioned and should also be considered in the context of the re-chartering. We will not be discussing protocol selection in Salt Lake City. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 29 15:30:33 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA09311 for ; Thu, 29 Nov 2001 15:30:29 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id PAA28095 for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 15:30:31 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA27875; Thu, 29 Nov 2001 15:29:12 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA27848 for ; Thu, 29 Nov 2001 15:29:11 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA09178 for ; Thu, 29 Nov 2001 15:29:07 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fATKSdc06056; Thu, 29 Nov 2001 12:28:39 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ACC31422; Thu, 29 Nov 2001 12:27:42 -0800 (PST) Message-Id: <5.1.0.14.0.20011129152453.00a4e8e0@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Thu, 29 Nov 2001 15:31:13 -0500 To: "Sanjoy Sen" , midcom@ietf.org From: Melinda Shore Subject: RE: [midcom] Update In-Reply-To: <5.1.0.14.0.20011129150346.00a27140@localhost> References: <933FADF5E673D411B8A30002A5608A0E06F320@zrc2c012.us.nortel. com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 03:04 PM 11/29/01 -0500, Melinda Shore wrote: >At 01:49 PM 11/29/01 -0600, Sanjoy Sen wrote: >>These drafts had already began doing some of the legwork that you mentioned and should also be considered in the context of the re-chartering. >We will not be discussing protocol selection in Salt Lake City. Sorry - running on pretty much no sleep. What I meant to say is that we will not be doing protocol selection as part of the rechartering process. The rechartering discussion is to discuss the rechartering process itself, to identify what work will need to be done and when, to begin to clearly define deliverables, etc. We also need to discuss whether or not the alternative framework I'm proposing is more technically sound than the current framework. One of the ADs will be chairing that discussion in the Salt Lake City meeting. Presumably the work that you and others have already done in discussing the applicability of various protocols will be incorporated into a protocols evaluation document if we do go forward with the current framework. It's just not in scope yet and not relevant to the rechartering process discussion. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 29 16:10:55 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA12486 for ; Thu, 29 Nov 2001 16:10:55 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id QAA29129 for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 16:10:57 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA29065; Thu, 29 Nov 2001 16:03:30 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA29036 for ; Thu, 29 Nov 2001 16:03:28 -0500 (EST) Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA11820 for ; Thu, 29 Nov 2001 16:03:24 -0500 (EST) Received: from smtprch2.nortel.com (erchg0k.us.nortel.com [47.113.64.104]) by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id PAA08948 for ; Thu, 29 Nov 2001 15:02:56 -0600 (CST) Received: from zrchb200.us.nortel.com by smtprch2.nortel.com; Thu, 29 Nov 2001 14:55:50 -0600 Received: by zrchb200.us.nortel.com with Internet Mail Service (5.5.2653.19) id ; Thu, 29 Nov 2001 15:01:36 -0600 Message-ID: <933FADF5E673D411B8A30002A5608A0E06F322@zrc2c012.us.nortel.com> From: "Sanjoy Sen" To: "'Melinda Shore'" , midcom@ietf.org Subject: RE: [midcom] Update Date: Thu, 29 Nov 2001 15:01:35 -0600 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C17919.07E13EB0" X-Orig: Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C17919.07E13EB0 Content-Type: text/plain; charset="iso-8859-1" > -----Original Message----- > From: Melinda Shore [mailto:mshore@cisco.com] > Sent: Thursday, November 29, 2001 2:31 PM > To: Sen, Sanjoy [NGB:B692:EXCH]; midcom@ietf.org > Subject: RE: [midcom] Update > > > At 03:04 PM 11/29/01 -0500, Melinda Shore wrote: > >At 01:49 PM 11/29/01 -0600, Sanjoy Sen wrote: > >>These drafts had already began doing some of the legwork > that you mentioned and should also be considered in the > context of the re-chartering. > >We will not be discussing protocol selection in Salt Lake City. > > Sorry - running on pretty much no sleep. That's OK. Being a brand new dad myself, I share the same state:) > We also need to discuss whether or not the > alternative framework I'm proposing is more technically sound > than the current framework. One of the ADs will be chairing > that discussion in the Salt Lake City meeting. Can you do that? I mean, can you present an alternate framework when the original framework draft has completed its last call? I guess you can, because that's what you're doing. What I'm not sure about is how can we even compare the merits/demerits of these two frameworks within the short timeframe of the meeting and reach a conclusion. Also, what bothers me is that while the original framework is pretty much stable, the new one proposed by you is pretty much an idea. What would be some of the comparison metrics? This looks like another new Charter work-item to me! Regards, Sanjoy ------_=_NextPart_001_01C17919.07E13EB0 Content-Type: text/html; charset="iso-8859-1" RE: [midcom] Update

> -----Original Message-----
> From: Melinda Shore [mailto:mshore@cisco.com]
> Sent: Thursday, November 29, 2001 2:31 PM
> To: Sen, Sanjoy [NGB:B692:EXCH]; midcom@ietf.org
> Subject: RE: [midcom] Update
>
>
> At 03:04 PM 11/29/01 -0500, Melinda Shore wrote:
> >At 01:49 PM 11/29/01 -0600, Sanjoy Sen wrote:
> >>These drafts had already began doing some of the legwork
> that you mentioned and should also be considered in the
> context of the re-chartering.
> >We will not be discussing protocol selection in Salt Lake City.
>
> Sorry - running on pretty much no sleep. 

That's OK. Being a brand new dad myself, I share the same state:)

> We also need to discuss whether or not the
> alternative framework I'm proposing is more technically sound
> than the current framework.  One of the ADs will be chairing
> that discussion in the Salt Lake City meeting. 

Can you do that? I mean, can you present an alternate framework when
the original framework draft has completed its last call? I guess you can,
because that's what you're doing. What I'm not sure about is how can we even compare
the merits/demerits of these two frameworks within the short timeframe of the
meeting and reach a conclusion. Also, what bothers me is that while the original
framework is pretty much stable, the new one proposed by you is pretty much an idea.
What would be some of the comparison metrics? This looks like another new Charter
work-item to me!

Regards,
Sanjoy
 

------_=_NextPart_001_01C17919.07E13EB0-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@ns.ietf.org Thu Nov 29 17:31:45 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA17966 for ; Thu, 29 Nov 2001 17:31:45 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id RAA01897 for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 17:31:48 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA01399; Thu, 29 Nov 2001 17:27:31 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA01370 for ; Thu, 29 Nov 2001 17:27:29 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA17672 for ; Thu, 29 Nov 2001 17:27:25 -0500 (EST) Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fATMQuc28431; Thu, 29 Nov 2001 14:26:57 -0800 (PST) Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166]) by mira-sjc5-4.cisco.com (Mirapoint) with ESMTP id ACC36150; Thu, 29 Nov 2001 14:25:59 -0800 (PST) Message-Id: <5.1.0.14.0.20011129171844.00a4bb40@localhost> X-Sender: mshore@localhost X-Mailer: QUALCOMM Windows Eudora Version 5.1 Date: Thu, 29 Nov 2001 17:29:25 -0500 To: "Sanjoy Sen" , midcom@ietf.org From: Melinda Shore Subject: RE: [midcom] Update In-Reply-To: <933FADF5E673D411B8A30002A5608A0E06F322@zrc2c012.us.nortel. com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org At 03:01 PM 11/29/01 -0600, Sanjoy Sen wrote: >> We also need to discuss whether or not the >> alternative framework I'm proposing is more technically sound >> than the current framework. One of the ADs will be chairing >> that discussion in the Salt Lake City meeting. > >Can you do that? I mean, can you present an alternate framework when >the original framework draft has completed its last call? I guess you can, >because that's what you're doing. What I'm not sure about is how can we even compare >the merits/demerits of these two frameworks within the short timeframe of the >meeting and reach a conclusion. Also, what bothers me is that while the original >framework is pretty much stable, the new one proposed by you is pretty much an idea. >What would be some of the comparison metrics? This looks like another new Charter >work-item to me! I've been trying to be sensitive to the possibility that I'm using my position as chair to promote a fringe agenda. At the same time I recently realized that if I were not chairing the working group I'd be raising a major fuss in the working group and probably with the IESG about the working group making a bad technical decision when what I feel is better technology is available. The topology discussion and the topology drafts convinced me that we're facing a very serious problem that cannot be solved in the current midcom framework. Our job is to make the network function better and I don't think that's what we're accomplishing with the work we've produced. I did want to get the current framework and requirements finished up, however. I think that we need to be able to move ahead quickly if we do decide to stick with it, and we absolutely need clear documentation describing the current framework for evaluation by the IESG and IAB as part of the rechartering process in any event. I realize that this is an extremely sensitive issue. I've discussed it with our area directors, and I hope that if you have serious objections to looking at a proposed alternative to the existing framework you'll raise it here and with them. Melinda _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 30 09:57:52 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA14117 for ; Fri, 30 Nov 2001 09:57:52 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id JAA05890 for midcom-archive@odin.ietf.org; Fri, 30 Nov 2001 09:57:55 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA05675; Fri, 30 Nov 2001 09:50:51 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA05646 for ; Fri, 30 Nov 2001 09:50:50 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA13708 for ; Fri, 30 Nov 2001 09:50:46 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001113014472628528 ; Fri, 30 Nov 2001 14:47:26 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Fri, 30 Nov 2001 14:50:07 -0000 Message-ID: <00533D13955AD411AF3800A0C9B426391724C4@ThisAddressDoesNotExist> From: Steve Davies To: "'Sanjoy Sen'" , "'midcom@ietf.org'" Subject: RE: [midcom] new I-D on "symmetric STUN" Date: Fri, 30 Nov 2001 14:49:56 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C179AE.470820F0" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C179AE.470820F0 Content-Type: text/plain; charset="ISO-8859-1" Sanjoy, Thanks for the questions. Answers in-line.... -----Original Message----- From: Sanjoy Sen [mailto:sanjoy@nortelnetworks.com] Sent: 27 November 2001 22:33 To: 'Steve Davies'; 'John LaCour'; 'midcom@ietf.org' Cc: 'Jonathan Rosenberg' Subject: RE: [midcom] new I-D on "symmetric STUN" [snip] > 1) Your App. Proxy is also an RTP Proxy. So for a simple two party call where both are behind NAPT, > the media need to traverse at least 3 RTP proxies. Is this correct? Ans: The FANTOM client, like the TURN client, may be implemented on the UA, in which case only the external RTP proxy is traversed, as in your proposal. The FANTOM client may also be implemented as a standalone system or be co-resident in an IP-PBX or IAD. In this case you are correct. Why? See 2 below. > 2) Not sure what you gain by making the media go through the App. Proxy? For example, in our proposal, > we have the terminal send the empty RTP packets (equivalent to your probes) directly to the Media > intermediary in the SP network to establish the media binds. Ans: The reason FANTOM is specified in this way is because we felt a pre-midcom solution should require ABSOLUTELY NO changes (protocol or behavioural) to enterprise endpoints and should work with existing systems. FANTOM places NO pre-requisite for symmetric bi-directional, continual RTP. The FANTOM client is responsible for making outbound UDP connection and the NAT keep-alives, so the UA can implement uni-directional RTP or silence suppression if it wishes. A major benefit of the FANTOM client (whether co-resident or standalone) is that we can minimise the pin-holes required in the firewall to just a few - our optimal solution is just 3 - one TCP and 2 UDP. With FANTOM, a FW admnistrator can restrict external UDP to just symmetric UDP to/from the FANTOM server's 2 UDP ports. With your proposal, the firewall administrator has to work on IP addresses of the RTP proxies, which means that as the service scales, the administrator is continually adding extra IP addresses to the FW access list. The more work the FW administrator does the greater the chances of error. The extra hops that FANTOM requires in the enterprise is insignificant in latency and bandwidth particularly in a switched Ethernet configuration. > 3) For SIP services, your AP and PEA both will house a SIP Proxy function, RTP Proxy function, as well > as your control protocol+ RTP/RTCP probes. What is the implication of putting all these functions in > one box from capacity, fault-tolerance and security p.o.v. ? Ans: Only the AP has a SIP or H.323 or MGCP (or...) proxy function. Those who have attended any of my presentations (VON, SIP Summit etc.) will have deduced that the functions readily break out and can reside on different processors so that a distributed fault tolerant architecture can be implemented if required. > For example, the AP will be doing refreshes for all NAT binds for all RTP sessions on behalf of all terminals. Ans: Yes FANTOM is tuned to the network infrastructure obviating the need for applications to know about it. We have designed the FANTOM probe to be very distinguishable from media making a silicon or efficient software implementations possible. > 4) Are you planning on using a standard protocol as this control protocol? In Sen proposal, we've used > an existing device control protocol. The sen proposal essentially needs no new protocol development. Ans: Do you mean between the FANTOM client and the FANTOM server or between the signalling proxy and the RTP proxy? FANTOM is the control protocol between client and server. Like you, our philosophy is to use existing methods where appropriate. But we don't based a solution on having to change a protocol or terminal behaviour to make it work. That's too hard a sell. > 5) Your requirement for always allowing traffic from some "well-known" address/port of PEA to the AP > in the private network is a big concern. This is typically NOT done in traditional enterprise FW. Ans: On the contrary it is (a) common practice - that's what well know ports are for, and (b) of huge benefit - our server element may be deployed in an enterprise DMZ for a non-service provider solution. Neither yours nor TURN can be - it must always be in the public Internet. > Such a FW will typically close the pin-hole after sometime, hence the need for signaling path refreshes > using PING or REGISTER) both in our scheme and Jonathan's. Ans: This is the reason we mux the signalling with the control channel. It removes the need to do lots of refreshes for multiple paths. Again FANTOM takes care of it on behalf of the terminal. Steve > Thanks, > Sanjoy ------_=_NextPart_001_01C179AE.470820F0 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] new I-D on "symmetric STUN"

Sanjoy,

Thanks for the questions. Answers in-line....

-----Original Message-----
From: Sanjoy Sen [mailto:sanjoy@nortelnetworks.c= om]
Sent: 27 November 2001 22:33
To: 'Steve Davies'; 'John LaCour'; = 'midcom@ietf.org'
Cc: 'Jonathan Rosenberg'
Subject: RE: [midcom] new I-D on "symmetric = STUN"


[snip]
 
> 1) Your App. Proxy is also an RTP Proxy. So for = a simple two party call where both are behind NAPT,
> the media need to traverse at least 3 RTP = proxies. Is this correct?

Ans: The FANTOM client, like the TURN client, may be = implemented on the UA, in which case only the external RTP proxy is = traversed, as in your proposal. The FANTOM client may also be = implemented as a standalone system or be co-resident in an IP-PBX or = IAD. In this case you are correct. Why? See 2 below. 

 
> 2) Not sure what you gain by making the media = go through the App. Proxy? For example, in our proposal,
> we have the terminal send the empty RTP packets = (equivalent to your probes) directly to the Media
> intermediary in the SP network to establish the = media binds.

Ans: The reason FANTOM is specified in this way is = because we felt a pre-midcom solution should require ABSOLUTELY NO = changes (protocol or behavioural) to enterprise endpoints and should = work with existing systems. FANTOM places NO pre-requisite for = symmetric bi-directional, continual RTP. The FANTOM client is = responsible for making outbound UDP connection and the NAT keep-alives, = so the UA can implement uni-directional RTP or silence suppression if = it wishes. A major benefit of the FANTOM client (whether co-resident or = standalone) is that we can minimise the pin-holes required in the = firewall to just a few - our optimal solution is just 3 - one TCP and 2 = UDP. With FANTOM, a FW admnistrator can restrict external UDP to just = symmetric UDP to/from the FANTOM server's 2 UDP ports. With your = proposal, the firewall administrator has to work on IP addresses of the = RTP proxies, which means that as the service scales, the administrator = is continually adding  extra IP addresses to the FW access list. = The more work the FW administrator does the greater the chances of = error.

The extra hops that FANTOM requires in the enterprise = is insignificant in latency and bandwidth particularly in a switched = Ethernet configuration.

 
> 3) For SIP services, your AP and PEA both will = house a SIP Proxy function, RTP Proxy function, as well
> as your control protocol+ RTP/RTCP probes. What = is the implication of putting all these functions in
> one box from capacity, fault-tolerance and = security p.o.v. ?

Ans: Only the AP has a SIP or H.323 or MGCP (or...) = proxy function. Those who have attended any of my presentations (VON, = SIP Summit etc.) will have deduced that the functions readily break out = and can reside on different processors so that a distributed fault = tolerant architecture can be implemented if required.

 
> For example, the AP will be doing refreshes for = all NAT binds for all RTP sessions on behalf of all terminals.

Ans: Yes FANTOM is tuned to the network = infrastructure obviating the need for applications to know about it. We = have designed the FANTOM probe to be very distinguishable from media = making a silicon or efficient software implementations = possible.

> 4) Are you planning on using a standard protocol = as this control protocol? In Sen proposal, we've used
> an existing device control protocol. The sen = proposal essentially needs no new protocol development.

Ans: Do you mean between the FANTOM client and the = FANTOM server or between the signalling proxy and the RTP proxy? FANTOM = is the control protocol between client and server. Like you, our = philosophy is to use existing methods where appropriate. But we don't = based a solution on having to change a protocol or terminal behaviour = to make it work. That's too hard a sell.

 
> 5) Your requirement for always allowing traffic = from some "well-known" address/port of PEA to the AP
> in the private network is a big concern. This = is typically NOT done in traditional enterprise FW.

Ans: On the contrary it is (a) common practice - = that's what well know ports are for, and (b) of huge benefit - our = server element may be deployed in an enterprise DMZ for a non-service = provider solution. Neither yours nor TURN can be - it must always be in = the public Internet.

 
> Such a FW will typically close the pin-hole = after sometime, hence the need for signaling path refreshes
> using PING or REGISTER) both in our scheme and = Jonathan's.

Ans: This is the reason we mux the signalling with = the control channel. It removes the need to do lots of refreshes for = multiple paths. Again FANTOM takes care of it on behalf of the = terminal.

Steve
 
> Thanks,
> Sanjoy

------_=_NextPart_001_01C179AE.470820F0-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 30 09:58:13 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA14142 for ; Fri, 30 Nov 2001 09:58:13 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id JAA05919 for midcom-archive@odin.ietf.org; Fri, 30 Nov 2001 09:58:16 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA05618; Fri, 30 Nov 2001 09:49:25 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA05546 for ; Fri, 30 Nov 2001 09:49:22 -0500 (EST) Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178]) by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA13631 for ; Fri, 30 Nov 2001 09:49:18 -0500 (EST) Received: from ridgeway.ridgeway-sys.com ([10.1.1.1]) by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001113014455622626 ; Fri, 30 Nov 2001 14:45:56 GMT Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19) id ; Fri, 30 Nov 2001 14:48:37 -0000 Message-ID: <00533D13955AD411AF3800A0C9B426391724C3@ThisAddressDoesNotExist> From: Steve Davies To: "'Rohan Mahy'" , midcom@ietf.org Cc: "'jdrosen@dynamicsoft.com'" , "'Christian Huitema'" , "'jweinberger@dynamicsoft.com'" Subject: RE: [midcom] pre-midcom - How does TURN work? Date: Fri, 30 Nov 2001 14:48:32 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C179AE.14DEF130" Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C179AE.14DEF130 Content-Type: text/plain; charset="ISO-8859-1" Rohan, Thanks for this clarification. This is what I supposed, but I couldn't deduce it from the text of TURN. In fact, I had falsely assumed that in comparing TURN with FANTOM I could take TURN in isolation. From your reply, am I now correct in infering that for your solution to work the following steps would need to be implemented: * a UA would implement STUN to determine what type of NAT it is behind * if it is behind a symmetric NAT then it would implement TCP signaling instead of UDP * furthermore the TCP connection is a permanent connection to a SIP Proxy * if it is behind a symmetric NAT the UA would to be programmed with the NAT timeout interval * A public SIP proxy (to which the permanent TCP connection is made) has to be in the call signalling path (no direct UA to UA calls) * The public SIP proxy must also use TCP signalling and ignore any tranport address registered by the UA * The UA must implement symmetric passive RTP and signal the capability in SIP. When the UA makes a call, it must authenticate itself with a TURN server and then ALLOCATE a couple of transport addresses on that TURN server. The addresses returned are sent to the destination UA. The orginating UA has to wait to receive RTP/RTCP packets via the TURN server before it can transmit (because its TURN server's routing table isn't complete) and then it must ignore the transport addresses sent by the destination UA, instead transmitting media (RTP and RTCP) via its TURN server. When the UA receives a call, it must transmit media first before it can be received and it must transmit to the orginating's TURN server - not via its own TURN server. * Both UAs must either turn off silence supression (bandwith wasteful)or periodically send NAT keep-alives * Call clearing must be via the public SIP proxy Steve -----Original Message----- From: Rohan Mahy [mailto:rohan@cisco.com] Sent: 28 November 2001 01:28 To: Steve Davies Cc: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; 'Christian Huitema'; 'jweinberger@dynamicsoft.com'; midcom@ietf.org Subject: RE: [midcom] pre-midcom - How does TURN work? ---- Original message ---- >Date: Tue, 27 Nov 2001 23:47:38 -0000 >From: Steve Davies >Subject: RE: [midcom] pre-midcom - How does TURN work? >To: "'jdrosen@dynamicsoft.com'" , "'rohan@cisco.com'" , "'Christian Huitema'", "'jweinberger@dynamicsoft.com'" >Cc: midcom@ietf.org > >All, > >By way of clarification of the first question, when I say 'behind' I mean >the central registrar is on the public side of the TURN Server, viz: TURN >Client<->NAT<->TURN Server<->Central Registrar<->etc. So the client must go >through TURN to get to the registrar - a typical managed service deployment. > >Hopefully the other questions are clear. > >Steve > > >-----Original Message----- >From: Steve Davies [mailto:sdavies@ridgewaysystems.com] >Sent: 27 November 2001 18:19 >To: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; 'Christian Huitema'; >'jweinberger@dynamicsoft.com' >Cc: midcom@ietf.org >Subject: [midcom] pre-midcom - How does TURN work? > > >Jonathan, Joel, Christian and Rohan, >Please explain how you expect the following to work within TURN: >* How does a client register with a central registrar behind the TURN >server. The ALLOCATE method obtains a public transport address to represent >the client, but how does the registration request get forwarded from the >TURN server to the central registrar? There is no need to use TURN to communicate with a SIP Server. SIP over TCP or TLS works fine as specified in bis. SIP over UDP must use the rport Via parameter specified in draft-ietf-sip-nat-00.txt MGCP and H.323 both use TCP, so they are likewise OK for signaling. >* When a call exists between 2 clients that are behind 2 different TURN >servers, there appears to be a media deadlock. It appears from the >description, that both TURN servers are waiting for the other to send them >media before each of them knows where to send media to. Is this >interpretation correct? A user originating an INVITE using a TURN server should represent that they can use symmetric RTP in passive mode. When a user behind a symmetric NAT receives an INVITE offering this, it does not use TURN, it instead sends its media to the addresses advertised in SDP (the sender's TURN server). >* What is your solution for RTP port pairing? This is an area where we need to write a concrete proposal. We had some discussions about this when STUN/TURN where part of the same proposal, but we never closed on a syntax. Basically the approach would involve including a parameter in the first Allocate request to hold the next address for a short period of time. The second request would contain some information from the previous request (for example the next expected MAPPED-ADDRESS parameter). >* How do you expect to prevent NATs from timing out on both the 'in-bound signaling' connection either use TCP/TLS, or send a sacrifice packet periodically to keep the mapping fresh. This sacrifice could be an OPTIONS with max-forwards of 0, a PING as in the Nortel proposal, etc. >and for media in the presence of silence suppression? endpoints should send empty RTP packets periodically if no RTP is sent. likewise with RTCP announcements. >It would also really be nice to see the detail of a proper call flow - SIP >or H.323 will suffice. Until we see how TURN is expected to work it is >difficult to make a like-for-like comparison with FANTOM and have a proper >debate on the pros and cons of various methods. >Thanks. >Steve Agreed. thanks, -rohan ------_=_NextPart_001_01C179AE.14DEF130 Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable RE: [midcom] pre-midcom - How does TURN work?

Rohan,

Thanks for this clarification. This is what I = supposed, but I couldn't deduce it from the text of TURN. In fact, I = had falsely assumed that in comparing TURN with FANTOM I could take = TURN in isolation. From your reply, am I now correct in infering that = for your solution to work the following steps would need to be = implemented:

* a UA would implement STUN to determine what type of = NAT it is behind
* if it is behind a symmetric NAT then it would = implement TCP signaling instead of UDP
* furthermore the TCP connection is a permanent = connection to a SIP Proxy
* if it is behind a symmetric NAT the UA would to be = programmed with the NAT timeout interval
* A public SIP proxy (to which the permanent TCP = connection is made) has to be in the call signalling path (no direct UA = to UA calls)

* The public SIP proxy must also use TCP signalling = and ignore any tranport address registered by the UA
* The UA must implement symmetric passive RTP and = signal the capability in SIP. When the UA makes a call, it must = authenticate itself with a TURN server and then ALLOCATE a couple of = transport addresses on that TURN server. The addresses returned are = sent to the destination UA. The orginating UA has to wait to receive = RTP/RTCP packets via the TURN server before it can transmit (because = its TURN server's routing table isn't complete) and then it must ignore = the transport addresses sent by the destination UA, instead = transmitting media (RTP and RTCP) via its TURN server. When the UA = receives a call, it must transmit media first before it can be received = and it must transmit to the orginating's TURN server - not via its own = TURN server.

* Both UAs must either turn off silence supression = (bandwith wasteful)or periodically send NAT keep-alives
* Call clearing must be via the public SIP proxy =

Steve

-----Original Message-----
From: Rohan Mahy [mailto:rohan@cisco.com]
Sent: 28 November 2001 01:28
To: Steve Davies
Cc: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; = 'Christian Huitema';
'jweinberger@dynamicsoft.com'; = midcom@ietf.org
Subject: RE: [midcom] pre-midcom - How does TURN = work?




---- Original message ----
>Date: Tue, 27 Nov 2001 23:47:38 -0000
>From: Steve Davies = <sdavies@ridgewaysystems.com> 
>Subject: RE: [midcom] pre-midcom - How does TURN = work? 
>To: "'jdrosen@dynamicsoft.com'" = <jdrosen@dynamicsoft.com>,
"'rohan@cisco.com'" = <rohan@cisco.com>, "'Christian
Huitema'"<huitema@windows.microsoft.com>,
"'jweinberger@dynamicsoft.com'" = <jweinberger@dynamicsoft.com>
>Cc: midcom@ietf.org
>
>All,
>
>By way of clarification of the first question, = when I say
'behind' I mean
>the central registrar is on the public side of = the TURN
Server, viz: TURN
>Client<->NAT<->TURN = Server<->Central Registrar<->etc. So the
client must go
>through TURN to get to the registrar - a typical = managed
service deployment.
>
>Hopefully the other questions are clear.
>
>Steve
>
>
>-----Original Message-----
>From: Steve Davies [mailto:sdavies@ridgewaysyste= ms.com]
>Sent: 27 November 2001 18:19
>To: 'jdrosen@dynamicsoft.com'; = 'rohan@cisco.com'; 'Christian
Huitema';
>'jweinberger@dynamicsoft.com'
>Cc: midcom@ietf.org
>Subject: [midcom] pre-midcom - How does TURN = work?
>
>
>Jonathan, Joel, Christian and Rohan,
>Please explain how you expect the following to = work within TURN:
>* How does a client register with a central = registrar behind
the TURN
>server. The ALLOCATE method obtains a public = transport
address to represent
>the client, but how does the registration = request get
forwarded from the
>TURN server to the central registrar?

There is no need to use TURN to communicate with a = SIP Server.
 SIP over TCP or TLS works fine as specified in = bis.  SIP over
UDP  must use the rport Via parameter specified = in
draft-ietf-sip-nat-00.txt

MGCP and H.323 both use TCP, so they are likewise OK = for
signaling.

>* When a call exists between 2 clients that are = behind 2
different TURN
>servers, there appears to be a media deadlock. = It appears
from the
>description, that both TURN servers are waiting = for the other
to send them
>media before each of them knows where to send = media to. Is this
>interpretation correct?

A user originating an INVITE using a TURN server = should
represent that they can use symmetric RTP in passive = mode.
When a user behind a symmetric NAT receives an = INVITE offering
this, it does not use TURN, it instead sends its = media to the
addresses advertised in SDP (the sender's TURN = server).

>* What is your solution for RTP port = pairing?

This is an area where we need to write a concrete = proposal.
We had some discussions about this when STUN/TURN = where part
of the same proposal, but we never closed on a = syntax.
Basically the approach would involve including a = parameter in
the first Allocate request to hold the next address = for a
short period of time.  The second request would = contain some
information from the previous request (for example = the next
expected MAPPED-ADDRESS parameter).
 
>* How do you expect to prevent NATs from timing = out on both
the 'in-bound signaling' connection

either use TCP/TLS, or send a sacrifice packet = periodically to
keep the mapping fresh.  This sacrifice could = be an OPTIONS
with max-forwards of 0, a PING as in the Nortel = proposal, etc.

>and for media in the presence of silence = suppression?

endpoints should send empty RTP packets periodically = if no RTP
is  sent.  likewise with RTCP = announcements.
 
>It would also really be nice to see the detail = of a proper
call flow - SIP
>or H.323 will suffice. Until we see how TURN is = expected to
work it is
>difficult to make a like-for-like comparison = with FANTOM and
have a proper
>debate on the pros and cons of various = methods.
>Thanks.
>Steve

Agreed.

thanks,
-rohan

------_=_NextPart_001_01C179AE.14DEF130-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 30 11:35:38 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA19860 for ; Fri, 30 Nov 2001 11:35:38 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA10240 for midcom-archive@odin.ietf.org; Fri, 30 Nov 2001 11:35:42 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA09453; Fri, 30 Nov 2001 11:22:51 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA09424 for ; Fri, 30 Nov 2001 11:22:50 -0500 (EST) Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA19123 for ; Fri, 30 Nov 2001 11:22:45 -0500 (EST) Received: from imop.cisco.com (imop.cisco.com [171.69.11.44]) by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAUGM3c07191; Fri, 30 Nov 2001 08:22:03 -0800 (PST) Received: from rmahy-home-nt (ssh-sj1.cisco.com [171.68.225.134]) by imop.cisco.com (Mirapoint) with ESMTP id ACC49997; Fri, 30 Nov 2001 08:22:01 -0800 (PST) Message-Id: <4.2.0.58.20011130081112.01f9ad50@lint.cisco.com> X-Sender: rmahy@imop.cisco.com (Unverified) X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.0.58 Date: Fri, 30 Nov 2001 08:22:27 -0800 To: Steve Davies From: Rohan Mahy Subject: RE: [midcom] pre-midcom - How does TURN work? Cc: midcom@ietf.org, "'jdrosen@dynamicsoft.com'" , "'Christian Huitema'" , "'jweinberger@dynamicsoft.com'" In-Reply-To: <00533D13955AD411AF3800A0C9B426391724C3@ThisAddressDoesNotE xist> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org Steve, Some clarifications below... At 06:48 AM 11/30/01 , Steve Davies wrote: >Rohan, > >Thanks for this clarification. This is what I supposed, but I couldn't >deduce it from the text of TURN. In fact, I had falsely assumed that in >comparing TURN with FANTOM I could take TURN in isolation. From your >reply, am I now correct in infering that for your solution to work the >following steps would need to be implemented: > >* a UA would implement STUN to determine what type of NAT it is behind yes >* if it is behind a symmetric NAT then it would implement TCP signaling >instead of UDP >* furthermore the TCP connection is a permanent connection to a SIP Proxy no, either the client must use TCP, or UDP with the rport parameter and keep this mapping alive. >* if it is behind a symmetric NAT the UA would to be programmed with the >NAT timeout interval fyi: this can be detected through STUN. in the TCP signaling case, you only need to keep your RTP/RTCP bindings fresh (much less of a burden). >* A public SIP proxy (to which the permanent TCP connection is made) has >to be in the call signalling path (no direct UA to UA calls) no, the public SIP proxy merely provide a publicly accesible point for receiving requests. outbound requests MAY go direct as long as the target SIP UA is not itself behind a (different) NAT. >* The public SIP proxy must also use TCP signalling and ignore any >tranport address registered by the UA no, see above. the connection to the proxy can be TCP or persistent UDP. >* The UA must implement symmetric passive RTP and signal the capability in >SIP. When the UA makes a call, it must authenticate itself with a TURN >server and then ALLOCATE a couple of transport addresses on that TURN >server. The addresses returned are sent to the destination UA. The >orginating UA has to wait to receive RTP/RTCP packets via the TURN server >before it can transmit (because its TURN server's routing table isn't >complete) and then it must ignore the transport addresses sent by the >destination UA, instead transmitting media (RTP and RTCP) via its TURN >server. When the UA receives a call, it must transmit media first before >it can be received and it must transmit to the orginating's TURN server - >not via its own TURN server. in the case of a symmetric NAT this is true. In the case of the other types of NATs you can send RTP/RTCP directly. >* Both UAs must either turn off silence supression (bandwith wasteful)or >periodically send NAT keep-alives In practice it is sufficient to send an empty RTP packet periodically if vad is on. >* Call clearing must be via the public SIP proxy same comment applies as above on direct signaling thanks, -rohan >Steve > >-----Original Message----- >From: Rohan Mahy [mailto:rohan@cisco.com] >Sent: 28 November 2001 01:28 >To: Steve Davies >Cc: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; 'Christian Huitema'; >'jweinberger@dynamicsoft.com'; midcom@ietf.org >Subject: RE: [midcom] pre-midcom - How does TURN work? > > > >---- Original message ---- > >Date: Tue, 27 Nov 2001 23:47:38 -0000 > >From: Steve Davies > >Subject: RE: [midcom] pre-midcom - How does TURN work? > >To: "'jdrosen@dynamicsoft.com'" , >"'rohan@cisco.com'" , "'Christian >Huitema'", >"'jweinberger@dynamicsoft.com'" > >Cc: midcom@ietf.org > > > >All, > > > >By way of clarification of the first question, when I say >'behind' I mean > >the central registrar is on the public side of the TURN >Server, viz: TURN > >Client<->NAT<->TURN Server<->Central Registrar<->etc. So the >client must go > >through TURN to get to the registrar - a typical managed >service deployment. > > > >Hopefully the other questions are clear. > > > >Steve > > > > > >-----Original Message----- > >From: Steve Davies > [mailto:sdavies@ridgewaysystems.com] > >Sent: 27 November 2001 18:19 > >To: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; 'Christian >Huitema'; > >'jweinberger@dynamicsoft.com' > >Cc: midcom@ietf.org > >Subject: [midcom] pre-midcom - How does TURN work? > > > > > >Jonathan, Joel, Christian and Rohan, > >Please explain how you expect the following to work within TURN: > >* How does a client register with a central registrar behind >the TURN > >server. The ALLOCATE method obtains a public transport >address to represent > >the client, but how does the registration request get >forwarded from the > >TURN server to the central registrar? > >There is no need to use TURN to communicate with a SIP Server. > SIP over TCP or TLS works fine as specified in bis. SIP over >UDP must use the rport Via parameter specified in >draft-ietf-sip-nat-00.txt > >MGCP and H.323 both use TCP, so they are likewise OK for >signaling. > > >* When a call exists between 2 clients that are behind 2 >different TURN > >servers, there appears to be a media deadlock. It appears >from the > >description, that both TURN servers are waiting for the other >to send them > >media before each of them knows where to send media to. Is this > >interpretation correct? > >A user originating an INVITE using a TURN server should >represent that they can use symmetric RTP in passive mode. >When a user behind a symmetric NAT receives an INVITE offering >this, it does not use TURN, it instead sends its media to the >addresses advertised in SDP (the sender's TURN server). > > >* What is your solution for RTP port pairing? > >This is an area where we need to write a concrete proposal. >We had some discussions about this when STUN/TURN where part >of the same proposal, but we never closed on a syntax. >Basically the approach would involve including a parameter in >the first Allocate request to hold the next address for a >short period of time. The second request would contain some >information from the previous request (for example the next >expected MAPPED-ADDRESS parameter). > > >* How do you expect to prevent NATs from timing out on both >the 'in-bound signaling' connection > >either use TCP/TLS, or send a sacrifice packet periodically to >keep the mapping fresh. This sacrifice could be an OPTIONS >with max-forwards of 0, a PING as in the Nortel proposal, etc. > > >and for media in the presence of silence suppression? > >endpoints should send empty RTP packets periodically if no RTP >is sent. likewise with RTCP announcements. > > >It would also really be nice to see the detail of a proper >call flow - SIP > >or H.323 will suffice. Until we see how TURN is expected to >work it is > >difficult to make a like-for-like comparison with FANTOM and >have a proper > >debate on the pros and cons of various methods. > >Thanks. > >Steve > >Agreed. > >thanks, >-rohan _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom From daemon@optimus.ietf.org Fri Nov 30 11:58:54 2001 Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA21254 for ; Fri, 30 Nov 2001 11:58:54 -0500 (EST) Received: (from daemon@localhost) by optimus.ietf.org (8.9.1a/8.9.1) id LAA11081 for midcom-archive@odin.ietf.org; Fri, 30 Nov 2001 11:58:59 -0500 (EST) Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA10967; Fri, 30 Nov 2001 11:54:50 -0500 (EST) Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA10936 for ; Fri, 30 Nov 2001 11:54:48 -0500 (EST) Received: from znsgs0ja.europe.nortel.com (znsgs0ja.nortelnetworks.com [47.165.25.40]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA21057 for ; Fri, 30 Nov 2001 11:54:42 -0500 (EST) Received: from qnsgs000.nortel.com (znsgs016 [47.255.64.31]) by znsgs0ja.europe.nortel.com (8.11.0/8.11.0) with ESMTP id fAUGsGu17151 for ; Fri, 30 Nov 2001 16:54:16 GMT Received: from zwcwc012.europe.nortel.com by znsgs016; Fri, 30 Nov 2001 16:53:53 +0000 Received: by zwcwc012.europe.nortel.com with Internet Mail Service (5.5.2653.19) id ; Fri, 30 Nov 2001 16:52:45 -0000 Message-ID: From: "Cedric Aoun" To: "'Steve Davies'" Cc: "Midcom IETF (E-mail)" Date: Fri, 30 Nov 2001 16:52:48 -0000 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2653.19) Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01C179BF.710AEB60" Subject: [midcom] FANTOM comments Sender: midcom-admin@ietf.org Errors-To: midcom-admin@ietf.org X-Mailman-Version: 1.0 Precedence: bulk List-Id: X-BeenThere: midcom@ietf.org This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. ------_=_NextPart_001_01C179BF.710AEB60 Content-Type: text/plain; charset="iso-8859-1" Hi Steve, I have some comments on the FANTOM draft, I'm still way behind my mails so sorry if my comments have already been posted. -The FANTOM solution requires 2 devices (the AP and the PEA) one in the private network and another one in the Service Provider (or DMZ of the enterprise depending on the nature of the service).The AP hosts an application proxy, a media proxy and the FANTOM client, the PEA hosts a media proxy as well as a FANTOM server. Just by looking at the media proxy role, it requires that the host machine has a forwarding rate to meet VoIP's periodicity, assume 10 ms packetisation rate is used you have 100 pps in and a 100 out, in total you will need to relay 200 pps for every single call. This type of platform doesn't come for free if you have a hundred or more calls, we are not talking of a standard workstation. In addition the PEA will require much more processing since it will need to handle calls from other private networks. I'm assuming that you have a sort of architecture where the FANTOM server could be used by several FANTOM clients (I'm talking about channel ids or tunnel ids that you might need to use combined with association ids...). I understand that you have used the AP to avoid modifying the end host but at what cost. Since the end host has already an application client, why don't use the application with certain extension to get the binds and refresh them as well as workaround the problem where the signaling is sent to an address included in the signaling message? -One thing that I found weird is the usage of tunneling by using tcp multiplexing, it's a VPN reinvention type of thing. What is the gain? I understand that the driver was to reduce the number of pinholes to be opened to allow the signaling to path through the packet filter. BUT this gain is really small compared to the number of pinholes required for the media flows, therefore I do not see the point for the tunneling. I'm sure that you are aware of the risks of tunneling, the firewall doesn't have the capability to snif in the payload of the TCP segments to determine the type of protocols that are transported in the multiplexed channels. THIS is a BIG HOLE in the corporate security -The protocol between the AP and the PEA looks really complex and will need at lot of work to get standardized, personally I would prefer building a much simpler solution with existing protocols. -I think that the transition solution to move towards Midcom should be based on a mix of using reflectors (such as defined in STUN) in residential and SMEs where full cone NATs are predominant, a media intermediary (instead of 2 in your solution) could be used to solve the symmetric NATs that are mostly deployed in corporate and in service provider networks. Hope I understood your solution. Cedric Cedric Aoun Nortel Networks France mailto:cedric.aoun@nortelnetworks.com ------_=_NextPart_001_01C179BF.710AEB60 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable FANTOM comments

Hi Steve,
I have some comments on the FANTOM = draft, I'm still way behind my mails so sorry if my comments have = already been posted.

-The FANTOM solution requires 2 = devices (the AP and the PEA) one in the private network and another one = in the Service Provider (or DMZ of the enterprise depending on the = nature of the service).The AP hosts an application proxy, a media proxy = and the FANTOM client, the PEA hosts a media proxy as well as a FANTOM = server. Just by looking at the media proxy role, it requires that the = host machine has a forwarding rate to meet VoIP's periodicity, assume = 10 ms packetisation rate is used you have 100 pps in and a 100 out, in = total you will need to relay 200 pps for every single call.

This type of platform doesn't come for = free if you have a hundred or more calls, we are not talking of a = standard workstation.

In addition the PEA will require much = more processing since it will need to handle calls from other private = networks.
I'm assuming that you have a sort of = architecture where the FANTOM server could be used by several FANTOM = clients (I'm talking about channel ids or tunnel ids that you might = need to use combined with association ids...). I understand that you = have used the AP to avoid modifying the end host but at what cost. =

Since the end host has already an = application client, why don't use the application with certain = extension to get the binds and refresh them as well as workaround the = problem where the signaling is sent to an address included in the = signaling message?

-One thing that I found weird is the = usage of tunneling by using tcp multiplexing, it's a VPN reinvention = type of thing. What is the gain? I understand that the driver was to = reduce the number of pinholes to be opened to allow the signaling to = path through the packet filter. BUT this gain is really small compared = to the number of pinholes required for the media flows, therefore I do = not see the point for the tunneling. I'm sure that you are aware of the = risks of tunneling, the firewall doesn't have the capability to snif in = the payload of the TCP segments to determine the type of protocols that = are transported in the multiplexed channels.

THIS is a BIG HOLE in the corporate = security

-The protocol between the AP and the = PEA looks really complex and will need at lot of work to get = standardized, personally I would prefer building a much simpler = solution with existing protocols.

-I think that the transition solution = to move towards Midcom should be based on a mix of using reflectors = (such as defined in STUN) in residential and SMEs where full cone NATs = are predominant, a media intermediary (instead of 2 in your solution) = could be used to solve the symmetric NATs that are mostly deployed in = corporate and in service provider networks.

Hope I understood your = solution.
Cedric

Cedric Aoun
Nortel Networks
France
mailto:cedric.aoun@nortel= networks.com


------_=_NextPart_001_01C179BF.710AEB60-- _______________________________________________ midcom mailing list midcom@ietf.org http://www1.ietf.org/mailman/listinfo/midcom