Brian:

Thank your for your detailed review. 

Authors:

Any responses? (I personally think at least the first comment deserves a change 
in the document.)

>>  The following considerations are applicable to all use cases:
>> 
>>  o  Clients can be on IPv4-only
>> 
>>  o  Clients can be on IPv6-only
>> 
>>  o  Clients can be on dual-stack
> 
> It isn't clear whether this is intended to include the case where an
> IPv4-only client communicates with an IPv6-only node (or vice versa).
> 
> It also isn't clear about cases in which a mobile client's connectivity
> changes dynamically during a session (e.g. from IPv4 to IPv6). This is
> partly clarified later by F17, but only partly.

I'd suggest expanding the last bullet of Section 3.1 to include various 
translation designs that might be involved in Ipv4-IPv6 connectivity. Eg., 

OLD:
   o  Clients can be on networks with a NAT using any type of Mapping
      and Filtering behaviors (as described in RFC4787).
NEW:
   o  Clients can be on networks with a NAT or IPv4-IPv6 translation devices 
using any type of Mapping
      and Filtering behaviors (as described in RFC4787).


>>  o  Clients can be on networks with a NAT using any type of Mapping
>>     and Filtering behaviors (as described in RFC4787).
> 
> That document is scoped for UDP only. Is that sufficient? As I understand the
> RTCWEB transport drafts, it is aiming at connection-oriented transport.
> (How many NATs support SCTP, for example?)

I thought that any SCTP would be encapsulated within UDP fro that reason.

> 
>> 3.2.  Common requirements
>> 
>>  The requirements retrived from the Simple Video Communication Service
>>  use-case (Section 3.3.1) by default apply to all other use-cases, and
>>  are considred common.  For each individual use-case, only the
>>  additional requirements are listed.
> 
> In fact you duplicate the additional requirements in each use case where they
> occur. That seems like overkill. Also there's at least one mix-up as a result,
> noted below.
> 
>> 3.3.1.2.  Common Requirements
> ...
>> F3      Transmitted streams and data must be rate
>>         controlled (meaning that the browser must, regardless
>>         of application behavior, reduce send rate when
>>         there is congestion).
> 
> I think that needs to be broken into two more atomic requirements.
> Something like
> 
>   F3.1    There must be a mechanism by which the transport layer
>           can signal the occurrence of congestion to the browser.
> 
>   F3.2    Transmitted streams and data must be rate
>           controlled (meaning that the browser must, regardless
>           of application behavior, reduce send rate while
>           there is congestion).
> 
> The change from "when" to "while" is intentional, since the browser
> should allow the rate to increase when there is no congestion.

I agree with the when=>while change, good catch. Not sure personally if the 
breakdown to smaller requirements is necessary.

> 
>>  F11     It must be possible to protect streams and data
>>          from wiretapping [RFC2804].
> 
> I don't see the relevance of the reference (of which I am a co-author),
> which mainly states that the IETF won't consider requirements *for* 
> wiretapping.
> I'm sure you can find a reference that says encryption is a Good Thing.

Agreed. I do not think this is a blocking comment, but I too would like to see 
a difference reference.

> 
>>  F14     The browser must make it possible to set up a
>>          call between two parties without one party
>>          learning the other party's host IP address.
> 
> It is not clear how to interpret that. I assume it's supposed to be a
> restatement of the earlier comment:
> 
>>  The application gives the users the opportunity to stop it from
>>  exposing the host IP address to the application of the other user.
> 
> But -- assuming the implementation model is peer-to-peer communication
> between the two hosts, rather than client1-server-client2 communication --
> I'm afraid I don't see how F14 can be guaranteed, since the peers must be
> aware of each others' IP address. Even if the browser and app hide the
> remote address, a little Wiresharking will reveal it immediately.
> There's not much point stating a requirement that cannot be met.
> 
> I realised at this point in the document that you need to be very
> explicit about whether communication is indeed intended to be peer-to-peer
> or via the server. And assuming it is meant to be peer-to-peer, what
> is the model for the rendez-vous between the peers? What requirements do
> you need to solve the resulting referral problem?
> (http://tools.ietf.org/html/draft-carpenter-referral-ps-02)
> 
> This topic belongs in the Common Requirements.
> 
>> 3.3.7.1.  Description
> ...
>>  The user in the previous use case that starts a trip is behind a
>>  common residential router that supports prioritization of traffic.
> 
> Please talk about differentiated services (RFC 2474 etc.). IP doesn't
> have simple priority. That's exactly why the DART WG was just formed.

I agree that DS would be a more appropriate term, but I don't think the 
document should otherwise expand too much on that space, IMO.

> 
>> 3.3.7.2.  Additional Requirements
>> 
>>  ----------------------------------------------------------------
>>  REQ-ID      DESCRIPTION
>>  ----------------------------------------------------------------
>>  F17     The communication session must survive across a
>>          change of the network interface used by the
>>          session
>>  ----------------------------------------------------------------
>>  F22     The browser must be able to receive streams and
>>          data from multiple peers concurrently.
>>  ----------------------------------------------------------------
> 
> This seems completely messed up. The reader expects requirements for
> QoS at this point. Isn't this "F22" really F24?
> 
>> 3.3.10.2.  Additional Requirements
>> 
>>  ----------------------------------------------------------------
>>  REQ-ID      DESCRIPTION
>>  ----------------------------------------------------------------
>>  F22     The browser should be able to take advantage
>>          of available capabilities (supplied by network
>>          nodes) to prioritize voice, video and data
>>          appropriately.
> 
> Again, please cite differentiated services rather than prioritization.
> Also, you now have two different F22s. This one seems to fit 3.3.7.2 better.
> 
> Below, you also have two F25s. And other duplicates. Wasn't the idea
> just to add *new* requirements when they arose? As F22 shows, the
> duplication is error-prone.
> 
>> 6.  Security Considerations
> 
> I am really surprised that there isn't a sub-section on Privacy
> Considerations. RFC 6973 describes the various types of threat and they
> seem specially relevant here.

Jari

_______________________________________________
Gen-art mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to