On Oct 26, 2009, at 3:32 , Song Haibin wrote:
Hi,
I have not finished the review, but I have several questions on this
document.
1). I am not sure how the TRUN usage defined in this document will
work
well. Who will be responsible for calculating the turnDensity and how?
The idea was to specify the minimal simple thing and allow for much
more advanced things to be developed in the future. Right now, the
operator of the DHT would specify the turnDensity - they could
presumable measure by probing the overlay. Keep in mind the two
interesting values for overlays are no one is a TURN server and
everyone is a TURN server.
How
to update the TURN server information in the overlay when some TURN
servers
leave the overlay suddenly, to avoid getting the "old" information?
The data times out and goes away and and this is part of the reason
for finding a bunch.
2). In section 4.1.1 "Storage Permissions" said "RELOAD addresses
this issue
by only allowing any given node to store data at
a small number of locations in the overlay, with those locations
being
determined by the node's certificate." This rule will limit the
applications
that the protocol could support. E.g, for streaming or file-sharing
applications, it is very practical to put the resource providers'
address
information under the same Resource ID which is the hash of the
content
name, despite the node ID or username information contained in the
certificate of the resource provider.
Sure, but without this rules peers are would have to store an
unlimited amount of data on behalf of others. A key premise of this
work since before the WG was charter was that the protocol should be
possible to use in a way where one could deploy a overlay for some
application usage and not have it become used for file sharing. Note
that if the overlay wants to allow kinds that have no authorization
rules and allow anyone to write anywhere, there is nothing the spec
that forbids that. It's up to the usage. So if someone wants to make a
file-sharing usage, well storing the whole file in the DHT is probably
not the best design but one could certainly make a usage that did
exactly that.
3). How do you prevent "via list" being modified by the intermediate
peers?
This is very important because it is related to whether you can get
a right
returen path for your response.
Well we can't really secure this in any practical way, or more
importantly, we can prevent the intermediate peers from misrouting
the request. The misroute of the response is no more serious than the
misroute of the request. It's a pretty fundamental limitation of an
overlay system like this. However, the overlay security of the system
does not depend on stopping this. This can be used to DOS the systems
but not much else. Keep in mind, the same is true of IP that is
running over.
4). In section 5.4.2.4.2., RouteQuery response should at least
include a
next hop peer infomation if you want to use this message for the
iterative
routing.
Agree this is needed but it is somewhat DHT specific. I forget the
details but I think it was Salman who pointed out that for some
unstructured overlays, you would need something other than the next
hop. Because of that, we made the answer DHT specific. For the Chord
DHT specified here, 100% agree with you we need the next hop and the
message to return that is defined in Section 9.8
5). I'm not sure about the necessity of access control policies in
section
6.3. I think it will make sense only when these access control
policies are
generic to all usages that will be built on top of RELOAD. Other
than that,
I would suggest to remove this section and define these policies in
each
usage document. Comment 2 is also related to this topic.
Clearly many usage documents can share many of the basic policies so I
think it make more sense to define at least the ones needed for the
charter of this WG in the base draft.
Thanks!
Haibin
Thanks for reviewing it - much appreciated.
Cullen <in my individual contributor role>
-----Original Message-----
From: [email protected] [mailto:[email protected]]
On Behalf Of Brian Rosen
Sent: Saturday, October 24, 2009 2:55 AM
To: Cullen Jennings; P2PSIP WG
Subject: Re: [P2PSIP] New version of draft-ietf-p2psip-base
<as chair>
If you think the draft is missing something big, or has some
other serious shortcoming that makes it inappropriate to hold
a WGLC, please speak up now.
We'll give everyone a few days to look over this version, and
then decide if we will start it.
If you had signed up to review NOW would be the time to do it,
on this version. That was NOW, and not "soon", please.
Brian
On 10/23/09 2:38 PM, "Cullen Jennings" <[email protected]> wrote:
We just submitted a new version of the base draft at
http://www.ietf.org/id/draft-ietf-p2psip-base-05.txt
(there is a new version of the sip-usage as well).
The major changes are mostly a very long and excruciating editorial
pass to try and improve the grammar.
At this point, I don't know of any significant issues that
need to be
resolved. I think the draft is ready for WGLC.
I'm sure that during WGLC some major issues will come up, some
important decisions will be made about what needs to be
mandatory and
such, and we will find several small inconsistencies and
typos in the
draft as well as things that need a clearer explanation. This will
take some time and I expect multiple more revisions for this draft
before it is published, however, I do think this is the
right time to
start WGLC. Lets get the issues on the table and then we can start
resolving them.
Thanks,
Cullen <in my individual contributor role>
_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip
_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip
_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip