Hi,
I think it isn't enough beneficial that RELOAD provides connection for 
application. 
Firstly, it is difficult that RELOAD understand the link type of all kinds 
of applications. The Link type defined in RELOAD doesn't necessarily 
suitable for all applications. 
Secondly, it is difficult that RELOAD maintains the connection of 
application. Different application have different connection maintainence 
mechanism, for example, some applications need long connection, but other 
applications need short connection.
Even though RELOAD provides raw connection for application, it isn't more 
beneficial than application providing connection itself. But its 
shortcoming is obvious, and it increases the coupling between RELOAD and 
application and increases implementation complexity.

So I think it is suitable that applicatin forms connection ifself. Then we 
need think about the definition of the link type of AppAttach. It is 
different from the link type of Attach, and it should be compatible for 
all kinds of application. Maybe the specific options of link type of 
AppAttach should be leaved to application.


***************************************
Email:        [email protected]
TEL:          025-52871543
Mobile:       13776637274
Fax:          025-52872187
***************************************



Frederic-Philippe Metz <[email protected]> 
发件人:  [email protected]
2011-10-31 04:35

收件人
p2psip WG <[email protected]>
抄送

主题
Re: [P2PSIP] Establish D/TLS after AppAttach?






Hi Bruce,
great that we can discussed this point. I guess "helpful text" means
that I should suggest one :-) I will think about it if so. On the
implementation side, I would assume that there doesn't exist any
assumptions what the connection should look like to the usage and as a
consequence, it would be configurable in an implementation.

There's one question open: The problem came from an implementation
design where one implementor thought that the application with the SIP
usage expects a pure TLS/DTLS connection from RELOAD (#2) to send raw
SIP stuff and the other implementation would expect a TCP/UDP
connection (#3) where the usage (I mean application) would do the
TLS/DTLS stuff on its own. They would not be compatible to each other.
Shouldn't that be standardized that (when using RELOAD) an application
has to expect a special kind of connection (maybe in the usage draft
for every usage) ?

If not, if the connection coming from RELOAD should be assumed as a
raw connection (even if TLS/DTLS is already done in RELOAD) and the
usage (i.e.SIP) i.e. wants to use TLS then the usage (application)
should do TLS on top of the RELOAD connection ?

Cheers,
Frédéric


On Sun, Oct 30, 2011 at 4:32 PM, Bruce Lowekamp <[email protected]> wrote:
> I would personally implement it essentially as #2, with the
> application implementing an interface with a receiveMessage(Message)
> function and invoking an interface provided by the reload
> implementation that has a sendMessage(Message) function.  Reality
> needs to be a bit more complicated as, for example, the SIP usage
> specifies requirements about the certificate of the other side.
>
> I'm happy to provide a clarification in the draft if we can find some
> helpful text.  But I don't see this as needing to be specified in the
> draft---any of the approaches could produce a valid implementation.
> It might be a good discussion in an implementers' wiki page, though.
>
> Bruce
>
> On Sun, Oct 30, 2011 at 5:36 AM, Frederic-Philippe Metz
> <[email protected]> wrote:
>> Hi Bruce, thanks for the reply, I agree with you.
>> I think I missed the point.
>>
>> For the implementors, it is not clear (please correct me if I am wrong 
Michael):
>>
>> The draft says:
>> "For example, if a P2PSIP node wishes to
>>   establish a SIP dialog with another P2PSIP node, it will use
>>   AppAttach to establish a direct connection with the other node.  This
>>   new connection is separate from the peer protocol connection.  It is
>>   a dedicated UDP or TCP flow used only for the SIP dialog."
>>
>> and
>>
>> "   AppAttach:    used to form application layer connections between
>>      nodes."
>>
>> and the paragraph 5.5.2:
>>
>> This could mean two things at least (the third is for completeness):
>>
>> 1. An application issues an AppAttach to RELOAD and receives the
>> candidates. The application then have to form the connection itself.
>>
>> 2. An application issues a command to RELOAD that does the AppAttach
>> stuff ( AppAttach -> ICE -> TLS/D/TLS) and RELOAD provides an
>> application connection to the application (an "OverlayLinkType
>> connection")
>>
>> (3. For completeness: Same as 2, but RELOAD provides a pure TCP or UDP
>> connection to the application (AppAttach -> ICE -> TCP/UDP). The
>> application then has to perform TLS/DTLS itself.)
>>
>> I assume, with respect to your answer, you mean point 2. applies. Am I
>> right ? That means An application somehow tells RELOAD to make a
>> connection and RELOAD provides a application connection the
>> application then uses to exchange the application messages.
>>
>> Best Regards,
>> Frédéric
>>
>>
>>
>> On Sat, Oct 29, 2011 at 10:40 PM, Bruce Lowekamp <[email protected]> 
wrote:
>>> The OverlayLinkTypes that reload includes are all message-oriented
>>> protocols.  It's up to the usage defining the application-id to
>>> indicate what is actually passed in these messages.  e.g. the sip
>>> usage specifies SIP messages for application-id 5060.
>>>
>>> Beyond the application-id, I don't think it's the role of an IETF
>>> draft to specify how that is presented to the upper layers, though a
>>> usage has to specify what is on the wire clearly enough that
>>> compatible implementations can be written, obviously.
>>>
>>> Bruce
>>>
>>>
>>> On Wed, Oct 26, 2011 at 3:20 PM, Frederic-Philippe Metz
>>> <[email protected]> wrote:
>>>> Hi all,
>>>>
>>>> I definitely support Michaels question into the P2P group. The draft
>>>> doesn't clearly figure out how the connection "description" is
>>>> presented to the upper layers. In short terms, the reference point of
>>>> a usage using AppAttach is not defined which connection it should
>>>> expect. It may cause incompatibility if the same usage (i.e. SIP)
>>>> would expect different connection type "formats" from RELOAD.
>>>> Best Regards >>> Frédéric
>>>>
>>>> On Wed, Oct 26, 2011 at 1:04 AM, Michael Chen 
<[email protected]> wrote:
>>>>> Hi,
>>>>>
>>>>> We had some discussions at the [email protected] list, and I 
like
>>>>> to post this question here. The base draft makes no mention of 
whether
>>>>> the link between two peers from an AppAttach may/should/must also
>>>>> establish D/TLS connection. Without an agreement, two peer will not 
be
>>>>> able to forward the actual SIP dialog traffics.
>>>>>
>>>>> This could be a big inter-op issue, so I would like the principles 
of
>>>>> this draft address it.
>>>>>
>>>>> Thank you
>>>>>
>>>>> --Michael
>>>>>
>>>>> _______________________________________________
>>>>> P2PSIP mailing list
>>>>> [email protected]
>>>>> https://www.ietf.org/mailman/listinfo/p2psip
>>>>>
>>>> _______________________________________________
>>>> P2PSIP mailing list
>>>> [email protected]
>>>> https://www.ietf.org/mailman/listinfo/p2psip
>>>>
>>>
>>
>
_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip





--------------------------------------------------------
ZTE Information Security Notice: The information contained in this mail is 
solely property of the sender's organization. This mail communication is 
confidential. Recipients named above are obligated to maintain secrecy and are 
not permitted to disclose the contents of this communication to others.
This email and any files transmitted with it are confidential and intended 
solely for the use of the individual or entity to whom they are addressed. If 
you have received this email in error please notify the originator of the 
message. Any views expressed in this message are those of the individual sender.
This message has been scanned for viruses and Spam by ZTE Anti-Spam system.
_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to