On Dec 6, 2010, at 5:12 PM, Marc Petit-Huguenin <[email protected]> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> More questions, comments and nits:
> 
> A.13. Section 5.3.1.1 "...ResourceIds are variable length, up to 255 bytes 
> (2048
> bits)..."
> 
> Because Destination has a length field defined as an uint8 that effectively
> limits the size of DestinationData to 255 bytes, and because ResourceId is
> prefixed by one byte indicating the length, the ResourceId length is limited 
> to
> 254 bytes, or 2032 bits.

2040 bits.

> 
> A.14. Section 5.3.2  "uint32 length;"
> 
> I can assume that this length covers the Header, MessageContents and 
> Signature,
> but I would guess that this was useful when Message was sent without
> FramingHeader over TCP (same than for the relo_token used to disambiguate STUN
> packets).  Now that this is useless, can't this length been only Header and
> MessageContents, so it is possible to find the boundary between 
> MessageContents
> and Signature without having to parse MessageContents at all?
> 
> A.15. Section 5.3.4 "HashAlgorithm hash_alg;"
> 
> What are the algorithms that should be supported?
> Is the hash only used to identify the certificate in 
> SecurityBlock.certificates?

No, it is used for AOR storage among other things.

> Also the text says that "[t]he certificate_hash contains the hash of the
> certificate object."  Are we talking about the hash of the DER encoded
> certificate, as stored in GenericCertificate.certificate?

The binary representation, yes.

> 
> A.16. Section 5.5.1.1. "IceCandidate candidates<0..2^16-1>;"
> 
> Because there must be at least one candidate, should this be:
> 
> IceCandidate candidates<1..2^16-1>;

The storage is still <0 .. 2 ^ 16 - 1> but your also correct.

> 
> A.17. "config_data (type==config)"
> 
> The definition of this field is "[t]he contents of the configuration 
> document",
> but 10.1 says that a file "...can contain multiple 'configuration' 
> elements...".
> So should not this field be in fact defined as "One XML configuration
> production.  This MUST be encoded with UTF-8 and assume a default namespace of
> ...", like for the kinds value?  

It's an XML document with unlimited configuration elements possible.

> And in this case what about the signature
> element in the XML fragment?
> 

???

> A.18. Section 5.6.2 "...not all aspects of the header apply to both types of
> transports."
> 
> It would be great if this could be explained a little bit more.  For example I
> assume that on a reliable link, the receiver still need to send the Ack for 
> each
> frame received (to calculate the RTO), but what about the content of the
> ack_sequence and received fields?
> 
> A.19. Section 5.6.3.1.1, last paragraph
> 
> This paragraph described a lockstep algorithm, but if it is the case then 
> there
> is no need for the received field, as we would always know that the previous
> messages have been received.
> 
> A.20. Section 5.7, "If the message is not fragmented, then both the first and
> last fragment are set to 1..."
> 
> If the first fragment bit is set to 1 when the message is fragmented and is 
> also
> set to one when the message is not fragmented, then it is always set to 1, so
> what is the point of having it in the first place?

I think you misread. There are two fragment flags, begin and end.

> 
> A.21. Section 10.1. "<kind name='sip-registration'><data-model>..."
> 
> Why do we need to repeat the data-model and access-control that were already 
> in
> the IANA registry?  Or is it a way to override the IANA definitions as the
> example would suggest? (as the registration for SIP-REGISTRATION is using
> DICTIONARY and USER-NODE-MATCH).
> 
> A.22. Section 10.1. "sequence: a monotonically increasing sequence number
> between 1 and 2^32"
> 
> According to section 5.3.2 and 5.3.2.1, it should be between 0 and 2^16-2 
> (65534).
> 
> A.23. Section 10.1. "root-cert  This element..."
> 
> I guess that the encoding to use is base64, but it is said nowhere.
> 
> A.24. Section 10.1.1. "| attribute id { xsd:int }),"
> 
> Does not match 13.6, that is saying that this is an unsigned integer.  Should
> probably use xsd:unsignedInt instead.
> 
> Note that there is other places in the RELAX NG document where the type can be
> improved (initial-ttl, etc...)
> 
> A.25. Section 10.1.1. 'access-control-type |= "user-match-with-anon-create"'
> 
> This control type is never defined in the document.
> 
> A.26. Section 10.1.1. 'kind-names |= "sip-registration"'
> 
> the sip-registration kind is not defined in this document.  OTOH,
> certificate-by-node and certificate-by-name are defined, but not listed here.
> 
> A.27. Section 10.1.1. 'self-signed-digest-type |= "sha1"'
> 
> Section 10.1. says that '[v]alid values for this parameter are "SHA-1" and
> "SHA-256"'.
> 
> A.28. Section 10.1.1 last paragraph "such an XML configuration file sent over
> email."
> 
> Because the signatures on the XML document are done on exact byte string and
> because emails servers are known to mess with end of lines, we will see
> configuration documents that cannot be verified after been sent by email (what
> was wrong with using XML-sig anyway?).
> 

Why would an email server alter an "attachment"? Don't send them in the body.

> A.29. Section 13.15 "destination: a hex-encoded Destination List object"
> 
> A Destination List object is never formally defined in the whole document, so 
> is
> it just Destination objects packed together, or is it in fact a "Destination
> destination_list<0..2^16-1>" ?  In other words, does it start with a length 
> field?
> 
> 
> Nits:
> - ----
> 
> - - Section 5.7 After "Where these values are:"
> 
> s/resource/resource_id/
> 
> - - Section 6.4.1.2. "...that the storing peer is not require to perform this
> verification."
> 
> s/require/required/
> 
> - -- 
> Marc Petit-Huguenin
> Personal email: [email protected]
> Professional email: [email protected]
> Blog: http://blog.marc.petit-huguenin.org
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (GNU/Linux)
> 
> iEYEARECAAYFAkz9X8sACgkQ9RoMZyVa61db8wCfY920Y+l8ho7H6crmx+Bwbczi
> VOMAn2jqKBSRaf96sNh1P0L34debXb96
> =/8Wr
> -----END PGP SIGNATURE-----
> _______________________________________________
> P2PSIP mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/p2psip
_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to