Hi Ben,
thanks for the feedback. Please see inline.
----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------
I'm balloting "yes" because I want to see this move forward, but I have a
number of comments and questions:
Substantive:
- Figure 1: It might be helpful to show the R-URI in the INVITE.
Mhmm, not sure. This would IMO break the storytelling which focuses on
the interplay of RELOAD and remaining protocol operations.
- 1, 2nd to last paragraph: Please add a citation for GRUU.
O.K. - was already in the refs, now at this para, too.
- 3.3, 7th paragraph from end: "any peer SHOULD verify
that the AOR of the request is a valid Resource Name with respect to
its domain name "
How does that differ from the MUST in the first bullet, below?
One peer is the requester (the SHOULD), the other peer is the storing
peer (the MUST). The storing peer is the entity that persists an entry
in the overlay and MUST check and ensure its consistency.
Also, does
SIP over reload support phone numbers? If so, it would be good to include
some discussion about how phone numbers fit into the domain scheme. If
no, then please say so explicitly.
This is basically the question whether AORs containing telephone numbers
correspond to valid rfc822Name in X509v3 certificates, which I suppose
they do.
We've added to the first para of Section 1:
This document defines a SIP Usage of RELOAD that allows SIP [RFC3261]
user agents (UAs) to establish peer-to-peer SIP (or SIPS) sessions
without the requirement for permanent proxy or registration servers,
e.g., a fully distributed telephony service. This service transparently
supports SIP addressing including telephone numbers.
-3.3, 3rd and 4th paragraph from end:
What certificate? (Probably covered in RELOAD, but a comment here would
be helpful.)
That's the basic RELOAD certificates from the enrollment server. It has
been introduced already in the terminology Section 2.
- 3.4, first paragraph:
The "MAY" looks like a statement of fact. I suggest "might"
This very section describes how to restrict the overlay domains - in
this sense, the MAY is a statement about the protocol (distr. system)
mechanism and should be a MAY, I suppose. It is a precise operational
option.
- 3.4, fourth paragraph:
That seems to say that "enable=false" means the restrictions are enabled.
Is that the intent?
What is intended:
If a <domain-restrictions> element is present, then these restrictions
apply. Further rules can be enabled. Without further rules (or
inconsistent parameters), domain names are restricted to those that that
match the domain name of the overlay.
- 4.1, 2nd and 3rd paragraphs from end:
Does that mean normal SIP procedures should be used if no overlay is
found for the domain, or that normal SIP procedures can be used instead
of checking for other overlays?
Normative language has been taken out here following a comment of Spencer.
The described case is "you query the wrong overlay, so we give some
hints on what else
you could do".
What about the case where the domain is supported by the overlay, but the
AOR is not found? Should the caller check for other overlays, or switch
to standard SIP?
That's the point "AOR domain is hosted in overlay?" - if the AOR is not
present, the requester may search for other contacts supporting this
domain name.
- 5.1, 2nd paragraph:
Are SIPS over reload connections assumed to be e2e encrypted? The last
sentence says that ordinary SIPS requires e2e encryption, which is simply
not true.
Yep, this has been already corrected after a comment from Spencer: see
Version 20.
What are "client links"?
Client links are RELOAD-defined links from clients (not member of the
overlay) to the overlay.
- 5.1, 3rd paragraph, last sentence:
does "redirect its communication path" mean redirect to classic SIP?
That refers to the normal SIP contact header field operations. The user
can announce an alternate contact point, which may be accessible via
classical SIP.
- 6, first paragraph: "Globally Routable User Agent URIs (GRUUs)
[RFC5627] have been
designed to allow direct routing without the indirection of a SIP
proxy function. "
That’s not really true. 5627 section 3.4 talks about using the proxy to
dereference a gruu.
O.K., let's rephrase like this:
Globally Routable User Agent URIs (GRUUs) [RFC5627] have been
designed to allow direct routing to a specific UA instance
without the need for dereferencing by a domain-specific SIP
proxy function.
That should hit the key of GRUUs.
- 8.1, first paragraph: "Hence no
extra burden is introduced for RELOAD peers beyond loads already
present in the base protocol."
What about from when a caller chooses to switch to conventional SIP to
reach a callee with a domain not supported by the overlay?
Not sure I understand: a caller using conventional SIP would not ask for
assistance by RELOAD peers??
- 8.2.4: Can you cite something for these methods that exist?
Well, one P2P anonymity service would be TOR. Here P2P pseudonym
services are more interesting, but I don't see any IETF work ... various
references in the scientific literature exist, but discussing this would
IMO really lead away from the document.
Editorial:
- IDNits has some comments marking code blocks. The data structure in 3.2
seems to qualify.
-2 : It would have been useful to mention that you are intentionally
dropping the AoR schemes back at the first AoR example.
Otherwise SIP people are going to be confused until they find the comment
5 pages in.
This is already mentioned in the Terminology Section 2.
- 3.1, first paragraph: "a UA registers its AOR and location"
technically, the user’s AOR and the UAs network location.
O.K., fixed.
- 3.2, 3rd bullet in first bullet list:
It's a bit premature to use the term Callee. Perhaps Registrant?
O.K., fixed.
- 4.2, step 3:
What is an "external AoR"?
Those that are not associated to members of the overlay.
- Appendix A: Why is this not in the main body?
This is a forward pointer to a mechanism beyond the scope of this
document (incl. the use of SHARE).
Thanks again,
Thomas
--
Prof. Dr. Thomas C. Schmidt
° Hamburg University of Applied Sciences Berliner Tor 7 °
° Dept. Informatik, Internet Technologies Group 20099 Hamburg, Germany °
° http://www.haw-hamburg.de/inet Fon: +49-40-42875-8452 °
° http://www.informatik.haw-hamburg.de/~schmidt Fax: +49-40-42875-8409 °
_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip