From daemon@optimus.ietf.org  Thu Nov  1 10:03:40 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA20390
	for <midcom-archive@odin.ietf.org>; Thu, 1 Nov 2001 10:03:39 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id KAA04166
	for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 10:03:43 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA03792;
	Thu, 1 Nov 2001 09:59:35 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA03760
	for <midcom@optimus.ietf.org>; Thu, 1 Nov 2001 09:59:33 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA20265
	for <midcom@ietf.org>; Thu, 1 Nov 2001 09:59:29 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.2) with SMTP id M2001110114564122258
 ; Thu, 01 Nov 2001 14:56:41 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <V84C4N12>; Thu, 1 Nov 2001 14:58:49 -0000
Message-ID: <00533D13955AD411AF3800A0C9B426390EC4AF@ThisAddressDoesNotExist>
From: Barry Scott <bscott@ridgewaysystems.com>
To: "'James Ho'" <jamesho37@hotmail.com>, midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates
Date: Thu, 1 Nov 2001 14:58:42 -0000 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C162E5.B2715850"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C162E5.B2715850
Content-Type: text/plain;
	charset="ISO-8859-1"

The policy we need turns out to be the default for many
enterprises already.

Typical behavour is to prevent UDP from the outside
to get inside. But once a UDP packet from the inside
is sent to the outside the firewall will pinhole itself
to allow return traffic. After a period of inactivity
the firewall will close the pinhole, for example after
45 seconds.

		BArry

-----Original Message-----
From: James Ho [mailto:jamesho37@hotmail.com]
Sent: 31 October 2001 22:20
To: midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates


As I understand it, the Davies proposal requires an open
UDP port on the firewall for media traversal. I can't think
of many/any enterprises being willing to implement such a
firewall policy. Or maybe my understanding is faulty??

james

_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C162E5.B2715850
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] pre-midcom candidates</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>The policy we need turns out to be the default for =
many</FONT>
<BR><FONT SIZE=3D2>enterprises already.</FONT>
</P>

<P><FONT SIZE=3D2>Typical behavour is to prevent UDP from the =
outside</FONT>
<BR><FONT SIZE=3D2>to get inside. But once a UDP packet from the =
inside</FONT>
<BR><FONT SIZE=3D2>is sent to the outside the firewall will pinhole =
itself</FONT>
<BR><FONT SIZE=3D2>to allow return traffic. After a period of =
inactivity</FONT>
<BR><FONT SIZE=3D2>the firewall will close the pinhole, for example =
after</FONT>
<BR><FONT SIZE=3D2>45 seconds.</FONT>
</P>

<P>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT SIZE=3D2>BArry</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: James Ho [<A =
HREF=3D"mailto:jamesho37@hotmail.com">mailto:jamesho37@hotmail.com</A>]<=
/FONT>
<BR><FONT SIZE=3D2>Sent: 31 October 2001 22:20</FONT>
<BR><FONT SIZE=3D2>To: midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [midcom] pre-midcom candidates</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>As I understand it, the Davies proposal requires an =
open</FONT>
<BR><FONT SIZE=3D2>UDP port on the firewall for media traversal. I =
can't think</FONT>
<BR><FONT SIZE=3D2>of many/any enterprises being willing to implement =
such a</FONT>
<BR><FONT SIZE=3D2>firewall policy. Or maybe my understanding is =
faulty??</FONT>
</P>

<P><FONT SIZE=3D2>james</FONT>
</P>

<P><FONT =
SIZE=3D2>_______________________________________________________________=
__</FONT>
<BR><FONT SIZE=3D2>Get your FREE download of MSN Explorer at <A =
HREF=3D"http://explorer.msn.com/intl.asp" =
TARGET=3D"_blank">http://explorer.msn.com/intl.asp</A></FONT>
</P>
<BR>

<P><FONT =
SIZE=3D2>_______________________________________________</FONT>
<BR><FONT SIZE=3D2>midcom mailing list</FONT>
<BR><FONT SIZE=3D2>midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://www1.ietf.org/mailman/listinfo/midcom" =
TARGET=3D"_blank">http://www1.ietf.org/mailman/listinfo/midcom</A></FONT=
>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C162E5.B2715850--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov  1 11:22:35 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA22982
	for <midcom-archive@odin.ietf.org>; Thu, 1 Nov 2001 11:22:34 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA07279
	for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 11:22:38 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA07238;
	Thu, 1 Nov 2001 11:18:21 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA07209
	for <midcom@optimus.ietf.org>; Thu, 1 Nov 2001 11:18:20 -0500 (EST)
Received: from mail1.microsoft.com (mail1.microsoft.com [131.107.3.125])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA22843
	for <midcom@ietf.org>; Thu, 1 Nov 2001 11:18:15 -0500 (EST)
Received: from inet-vrs-01.redmond.corp.microsoft.com ([157.54.8.27]) by mail1.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Thu, 1 Nov 2001 08:17:48 -0800
Received: from 157.54.8.155 by inet-vrs-01.redmond.corp.microsoft.com (InterScan E-Mail VirusWall NT); Thu, 01 Nov 2001 08:17:42 -0800
Received: from red-imc-04.redmond.corp.microsoft.com ([157.54.2.168]) by inet-hub-04.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Thu, 1 Nov 2001 08:17:05 -0800
Received: from win-imc-01.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.39]) by red-imc-04.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Thu, 1 Nov 2001 08:17:05 -0800
Received: from win-msg-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.134]) by win-imc-01.wingroup.windeploy.ntdev.microsoft.com with Microsoft SMTPSVC(6.0.3541.1);
	 Thu, 1 Nov 2001 08:16:18 -0800
X-MimeOLE: Produced By Microsoft Exchange V6.0.6063.0
Content-Class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Subject: RE: [midcom] pre-midcom candidates
Date: Thu, 1 Nov 2001 08:16:20 -0800
Message-ID: <F66A04C29AD9034A8205949AD0C901040194D7F4@win-msg-02.wingroup.windeploy.ntdev.microsoft.com>
Thread-Topic: [midcom] pre-midcom candidates
thread-index: AcFi5dCtFp0BDxujTx6Am4t+Vlkc3wACm1dg
From: "Christian Huitema" <huitema@windows.microsoft.com>
To: "Barry Scott" <bscott@ridgewaysystems.com>,
        "James Ho" <jamesho37@hotmail.com>, <midcom@ietf.org>
X-OriginalArrivalTime: 01 Nov 2001 16:16:18.0673 (UTC) FILETIME=[89CDE610:01C162F0]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by optimus.ietf.org id LAA07210
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 8bit

Barry,

This is exactly the same firewall requirement as STUN.

-----Original Message-----
From: Barry Scott [mailto:bscott@ridgewaysystems.com] 
Sent: Thursday, November 01, 2001 6:59 AM
To: 'James Ho'; midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates

> The policy we need turns out to be the default for many 
> enterprises already. 
> Typical behavour is to prevent UDP from the outside 
> to get inside. But once a UDP packet from the inside 
> is sent to the outside the firewall will pinhole itself 
> to allow return traffic. After a period of inactivity 
> the firewall will close the pinhole, for example after 
> 45 seconds. 

Barry,

This is exactly the same requirement as STUN, with the difference that
STUN does not require an infrastructure in the middle of the network.

-- Christian Huitema
 

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov  1 11:35:32 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA23210
	for <midcom-archive@odin.ietf.org>; Thu, 1 Nov 2001 11:35:32 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA07886
	for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 11:35:36 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA07802;
	Thu, 1 Nov 2001 11:32:32 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA07773
	for <midcom@optimus.ietf.org>; Thu, 1 Nov 2001 11:32:31 -0500 (EST)
Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA23120
	for <midcom@ietf.org>; Thu, 1 Nov 2001 11:32:26 -0500 (EST)
Received: from BobP [63.67.143.2] by acmepacket.com
  (SMTPD32-7.04) id A91DAA360118; Thu, 01 Nov 2001 11:32:29 -0500
Message-ID: <016501c162f2$6b37a0e0$2300000a@acmepacket.com>
From: "Bob Penfield" <bpenfield@acmepacket.com>
To: "Barry Scott" <bscott@ridgewaysystems.com>,
        "'James Ho'" <jamesho37@hotmail.com>, <midcom@ietf.org>
References: <00533D13955AD411AF3800A0C9B426390EC4AF@ThisAddressDoesNotExist>
Subject: Re: [midcom] pre-midcom candidates
Date: Thu, 1 Nov 2001 11:29:46 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

What percentage of NAT/FW are symmetric as opposed to full-cone as described
in the STUN proposal? There is some debate whether or not the interim
solution needs to address the symmetric NAT problem. If the great majority
of existing FW/NAT are symmetric, we probably need to include it now.

(-:bob

Robert F. Penfield
Chief Software Architect
Acme Packet, Inc.
130 New Boston Street
Woburn, MA 01801
bpenfield@acmepacket.com

----- Original Message -----
From: "Barry Scott" <bscott@ridgewaysystems.com>
To: "'James Ho'" <jamesho37@hotmail.com>; <midcom@ietf.org>
Sent: Thursday, November 01, 2001 9:58 AM
Subject: RE: [midcom] pre-midcom candidates


> The policy we need turns out to be the default for many
> enterprises already.
>
> Typical behavour is to prevent UDP from the outside
> to get inside. But once a UDP packet from the inside
> is sent to the outside the firewall will pinhole itself
> to allow return traffic. After a period of inactivity
> the firewall will close the pinhole, for example after
> 45 seconds.
>
> BArry
>
> -----Original Message-----
> From: James Ho [mailto:jamesho37@hotmail.com]
> Sent: 31 October 2001 22:20
> To: midcom@ietf.org
> Subject: RE: [midcom] pre-midcom candidates
>
>
> As I understand it, the Davies proposal requires an open
> UDP port on the firewall for media traversal. I can't think
> of many/any enterprises being willing to implement such a
> firewall policy. Or maybe my understanding is faulty??
>
> james
>
> _________________________________________________________________
> Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp
>
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
>


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov  1 11:53:27 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA23582
	for <midcom-archive@odin.ietf.org>; Thu, 1 Nov 2001 11:53:26 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA08284
	for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 11:53:31 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA08110;
	Thu, 1 Nov 2001 11:40:41 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA08079
	for <midcom@optimus.ietf.org>; Thu, 1 Nov 2001 11:40:39 -0500 (EST)
Received: from pmesmtp01.wcom.com (pmesmtp01.wcom.com [199.249.20.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA23321
	for <midcom@ietf.org>; Thu, 1 Nov 2001 11:40:34 -0500 (EST)
Received: from pmismtp04.wcomnet.com ([166.38.62.39])
 by firewall.wcom.com (PMDF V5.2-33 #47837)
 with ESMTP id <0GM400DBFRMTKL@firewall.wcom.com> for midcom@ietf.org; Thu,
 1 Nov 2001 16:40:06 +0000 (GMT)
Received: from pmismtp04.wcomnet.com by pmismtp04.wcomnet.com
 (PMDF V5.2-33 #42258) with SMTP id <0GM400M01RMMRQ@pmismtp04.wcomnet.com>;
 Thu, 01 Nov 2001 16:40:05 +0000 (GMT)
Received: from rccc6131 ([166.34.120.127])
 by pmismtp04.wcomnet.com (PMDF V5.2-33 #42258)
 with ESMTP id <0GM400KEMRLSL2@pmismtp04.wcomnet.com>; Thu,
 01 Nov 2001 16:39:29 +0000 (GMT)
Date: Thu, 01 Nov 2001 10:39:22 -0600
From: "Christopher A. Martin" <christopher.a.martin@wcom.com>
Subject: RE: [midcom] pre-midcom candidates - the Davies Critique
In-reply-to: 
 <F66A04C29AD9034A8205949AD0C9010401C0E396@win-msg-02.wingroup.windeploy.ntdev.microsoft.com>
To: "'Christian Huitema'" <huitema@windows.microsoft.com>,
        "'Steve Davies'" <sdavies@ridgewaysystems.com>,
        "'midcom'" <midcom@ietf.org>
Cc: "'Melinda Shore'" <mshore@cisco.com>,
        "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>
Reply-to: christopher.a.martin@wcom.com
Message-id: <003401c162f3$c3817220$7f7822a6@rccc6131.mcit.com>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V4.72.3110.3
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0
Content-type: text/plain; charset=iso-8859-1
Content-transfer-encoding: 7bit
Importance: Normal
X-Priority: 3 (Normal)
X-MSMail-priority: Normal
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Anything intended to keep a "pinhole" open is actually pretty inefficient in
behavoir...the Davies proposal is actually on an as needed basis which is
more efficient. Also the ablity to maintain "control" by the IT managers is
inherent to the Davies design, IMHO, since the enforcement is maintained
both at the AP(where policy can be enforced), the firewall(s), and the SIP
proxies (in the case of SIP signaling). I need to continue researcing the
Davies proposal, but these were my initial opinions on the draft.

The other proposals place enforcement at the clients, as they are
maintaining the pinholes through the firewall, not a place that many IT
managers typically allow enforcement to placed (except for possibly the
SOHO).

> -----Original Message-----
> From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of
> Christian Huitema
> Sent: Wednesday, October 31, 2001 4:26 PM
> To: Steve Davies; midcom
> Cc: Melinda Shore; Jonathan Rosenberg
> Subject: RE: [midcom] pre-midcom candidates - the Davies Critique
>
>
> Steve,
>
> Your point regarding "Stun and firewalls" is mistaken. The STUN
> requirement is that if there is a firewall, it let a response
> come in to
> a packet sent from an internal port. This is the default behavior of
> most "residential NAT/firewall", and it is also an optional
> behavior in
> many enterprise firewalls. Whether such a policy is deemed
> acceptable by
> the local IT manager is debatable -- there are pros and cons.
>
> -- Christian Huitema
>
> -----Original Message-----
> From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
> Sent: Wednesday, October 31, 2001 12:57 PM
> To: 'midcom'
> Cc: 'Melinda Shore'; 'Jonathan Rosenberg'
> Subject: RE: [midcom] pre-midcom candidates - the Davies Critique
>
> (Apologies if you get this twice. The first attempt was too
> long for the
> mailing list so I've deleted the history.)....
> Naturally, I don't entirely agree with Jonathan's analysis. Here is
> mine:
> The Sen Proposal:
> -----------------
> I don't see the Sen proposal as an adequate near-term/pre-midcom
> solution for two main reasons:
> (a) it requires changes to the protocol:
> ----------------------------------------
> In order to make the Sen proposal work we are told that a new service
> tag must be incorporated in the SIP Register request and a
> new SIP Ping
> (keep-alive) method must be incorporated. Not only will this take time
> to implement in SIP but presumably we'll also need corresponding
> protocol changes for Megaco, MGCP, H.323, etc. Or is Midcom
> SIP-specific?
> (b) it requires behavioural changes to the client:
> --------------------------------------------------
> It requires symmetric RTP and the continual transmission of
> RTP and RTCP
> packets to keep the NAT bindings open. While symmetric RTP
> may be a good
> thing, that doesn't imply all applications have constant
> bi-directional
> streams - think of 'broadcast' type applications. Also why should
> terminals be expected to turn off silence suppression? How
> are endpoints
> to know when and when not to make this behavioural change?
> Other weaknesses of the proposal include a requirement on terminals to
> signal to the SIP proxy when they are behind a NAT. It is not
> explained
> how they are supposed to know whether or not they are.
> Additionally, the
> use of random ports on the RTP Proxy makes it difficult to
> protect such
> a device with a regular filtering firewall. Such
> configurations would be
> required for an enterprise do-it-yourself solution(the
> enterprise is its
> own provider) and by service providers wanting to protect
> their networks
> and service from DoS attacks.
> Note that correction of all these shortcomings results in the same
> architecture and method outlined in the Davies proposal.
> The Rosenberg/STUN Proposal:
> ----------------------------
> Whilst I acknowledge the STUN proposal provides a method to determine
> the type of NAT a terminal may be behind, I view the proposal as
> incomplete and potentially impractical candidate as a
> near-term/pre-midcom solution.
> a) Firewalls are everywhere:
> ----------------------------
> Whenever a firewall is deployed in conjunction with a NAT,
> irrespective
> of the type of NAT, the net result is equivalent to what the
> STUN method
> describes as a Symmetric NAT. In the case of symmetric NATs, the
> Rosenberg proposal acknowledges that a media
> intermediary/relay (or RTP
> Proxy) is required. However, the STUN proposal doesn't inform us what
> the architecture and method are for making calls in this
> case, although
> Jonathan acknowledges in his email that there are three
> solutions - the
> Davies proposal, the Sen proposal and an unpublished STUN proposal.
> Firewalls are a fact of life in all enterprises connected to the
> internet. An ever-increasing number of users are installing
> firewalls in
> their homes as well. The majority of calls will require a media
> intermediary/RTP Proxy. In other words, VoIP providers will have to
> install media intermediaries from Day One of any service. Can you
> imagine the subscription scenario if they don't:
> Customer: 'Please may I subscribe to your service'
> Provider: 'Is your terminal behind a firewall?'
> Customer: 'Yes'
> Provider: 'Sorry our service won't work for you' or 'Yes, but please
> place your terminal outside the firewall' or 'Yes, but you
> can only call
> other people not behind a firewall or symmetric NAT'.
> This is not what the VoIP industry needs right now!
> b) Too early to optimise:
> -------------------------
> The STUN proposal boils down to a port saving technique for VoIP
> providers. But in a nascent market its impractical to start
> with a port
> saving technique particularly when its unquantifiable how many ports a
> provider may save. What providers need is a solution that is
> deployable
> in all cases - that implies a media intermediary solution. Trying to
> combine a port saving technique in conjunction with a media
> intermediary
> solution will add complexity that will delay and stall the
> VoIP market.
> From a provider's perspective, this delay and additional testing could
> far outweigh any savings gained by requiring fewer media intermediary
> ports.
> c) Unproven:
> ------------
> i) TIMEOUTS. When a user is behind a firewall or symmetric
> NAT, to avoid
> use of a media intermediary the terminal must invoke the STUN protocol
> on a call by call basis. The STUN protocol requires potentially
> significant timeouts to expire in order to determine whether media may
> go direct. What will this do to call setup times?
> ii) NETWORK BASED NATS. There may be cases where the terminal
> determines
> that the media may go direct, but in fact the media passes through
> network based NATs and the call will fail. This would typically happen
> at the provider boundary, because the provider uses some internal
> addressing scheme or when passing from IPv4 to IPv6 networks. The
> solution would be to place the STUN server on the remote side of those
> network based NATs, but this would have the consequence of tromboning
> the media via those network based NATs for 'provider-internal' calls,
> defeating the reason for STUN. Alternatively, multiple STUN servers
> would need to be deployed - one for each different NAT location, but
> that then poses the question of how a terminal would know which STUN
> server to use on a call-by-call basis.
> Davies proposal:
> ----------------
> The Davies proposal is very midcom-like. The Proxy Extension
> Agent (PEA)
> is like a MIDDLEBOX and the Application Proxy (AP) is like a MIDCOM
> AGENT. The AP is responsible for getting publicly reachable transport
> addresses on the PEA for external calls and publishing those addresses
> in the protocol messages.
> The Davies proposal simplifies the security policy problem being
> grappled with by MIDCOM to a very simple static policy
> administered and
> controlled by the IT manager and implemented on existing
> firewalls. Just
> three static pinholes are required to be configured in the firewall.
> Furthermore, these pinholes are outbound pinholes(i.e. out from the
> enterprise).
> Jonathan writes that in the Davies draft there are issues to do with
> consistency with enterprise firewall policy, but this is
> unsubstantiated. When details of these issues are provided, we will be
> happy to discuss them. The Davies method is entirely consistent with
> enterprise firewall policy - it is similar to, but actually far more
> restrictive than the firewall policy that allows web browsing for
> example. The Davies proposal's policy has been vetted by service
> providers and is already in commercial deployments - we can
> only assume
> enterprises find it acceptable.
> As well as being midcom-like, the Davies method has many other
> significant advantages:
> * It provides a 100% solution. It will work anywhere no
> matter how many
> and what type and combination of firewalls and NATs there are.
> * No change is required to any of the protocols. It is not even
> necessary for endpoints to implement symmetric RTP.
> * The implementation can be made transparent to the endpoints or be
> implemented by them.
> * Enterprise or Service Provider deployments are possible. The PEA may
> be deployed within a service provider's network or within the
> DMZ of an
> enterprise's own service centre.
> * Passing through a media intermediary is seen as enhancing
> security and
> saving IP addresses. Hiding an enterprise IP address from the remote
> party (only the transport addresses of the PEA are published in
> messages) is seen as a benefit and enables the enterprise to use the
> same IP address used for other Internet traffic.
> * Service Providers see a benefit in handling the media
> through PEA for
> several reasons. It enables them to hide the transport addresses of
> their other service equipment. It provides them with a
> suitable point to
> implement wire-tapping (e.g.CALEA) - ITSPs in many countries are bound
> to provide such capabilities. It also provides them with a media QOS
> execution point and it provides suitable IPv4/IPv6 migration boundary
> points.
> Jonathan seeks to belittle the Davies proposal by likening it to RSIP.
> I'm not sure what the point is here. It is true that we have borrowed
> and learnt from many of the principles and techniques used within the
> Internet. That's why we have well known ports, outbound initiated
> connections, and TCP multiplexing, so it's not surprising the
> method is
> recognisable and architecturally looks similar to other
> protocols. What
> is unique, is the way in which this method combines the different
> Internet techniques together with the transport of real-time
> UDP streams
> without any tunneling overhead.
> In fact, the single disadvantage of the Davies proposal is that it
> requires media intermediaries, but no-one has devised a non-media
> intermediary solution that solves all of today's firewall and NAT
> deployments. In any case, media intermediaries are not of much concern
> to service providers because they will co-locate those intermediaries
> with their access equipment in their POPs. In due course, those
> intermediaries may even be implemented in the access routers or Midcom
> will obviate them.
> Pre-Midcom Recommendation:
> --------------------------
> Jonathan writes that he wants to tackle the harder stuff,
> i.e. firewalls
> and symmetric NATs, later. The fact of the matter is that the Davies
> proposal has solved the harder stuff already. It is the
> Davies proposal
> that is the low-hanging fruit because it addresses 100% of deployments
> and it has working examples. Surely this is where a
> pre-midcom solution
> must start. A VoIP provider needs it from Day One because it is very
> likely some/many customers will have a firewall or symmetric
> NAT. If in
> time, providers are seeking more efficient deployments or are
> seeking to
> reduce costs, then the Davies solution is easily extended to
> incorporate
> a STUN-like method. But before embarking on this effort it
> would be wise
> to judge the market need and determine when MIDCOM will kick in.
> Steve Davies
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
>


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov  1 12:06:18 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23834
	for <midcom-archive@odin.ietf.org>; Thu, 1 Nov 2001 12:06:17 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA09277
	for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 12:06:22 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09223;
	Thu, 1 Nov 2001 12:03:38 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09192
	for <midcom@optimus.ietf.org>; Thu, 1 Nov 2001 12:03:36 -0500 (EST)
Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23806
	for <midcom@ietf.org>; Thu, 1 Nov 2001 12:03:31 -0500 (EST)
Received: from BobP [63.67.143.2] by acmepacket.com
  (SMTPD32-7.04) id A067D1070118; Thu, 01 Nov 2001 12:03:35 -0500
Message-ID: <018701c162f6$c3c307a0$2300000a@acmepacket.com>
From: "Bob Penfield" <bpenfield@acmepacket.com>
To: "midcom" <midcom@ietf.org>
Date: Thu, 1 Nov 2001 12:00:52 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Content-Transfer-Encoding: 7bit
Subject: [midcom] framework-04 comments
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Hi all,

I do have some nits on the framework:

1) I think all occurrences of "In-path" should be removed from section 7.

2) Figure 3 is not correct. In order to match the timeline flows it should
be:

                         ___________
                     --->|   SIP   |<-----\
                    /    |  Proxy  |       \
                   |     |_________|       |
                  1|       |^    ^|       4|
                   |       ||    ||        |
                   |8     2||3  7||6       |5
   ______________  |       ||    ||        |   ______________
   |            |<-/      _v|____|v____     \->|            |
   | External   |    Na   |           |   Nc   | SIP Phone  |
   | SIP phone  |>------->| Middlebox |>------>| within     |
   |            |<-------<|___________|<------<| Pvt. domain|
   |____________|    Nb                   Nd   |____________|

The text in the 2nd paragraph of 7.0 needs to be updated to reflect the
above.

3) Just for correctness, the 100Trying message should precede communication
with the middlebox in all the timeline flows (sections 7.1, 7.2 & 7.2).

4) Section 7.2 & 7.3: The real reason that the SIP proxy must communicate
with the NAT middlebox before sending the INVITE on is that it needs to
change the IP address(es) and port(s) in the SDP of the INVITE to those
allocated by the middlebox. If it does not, the called party will send its
RTP media to the wrong address+port.

5) Section 7.2 & 7.3: The timeline explicitly indicates that the SDP is
modified for the 200-OK response to the INVITE, but not for the INVITE
itself going from the proxy to the private phone.

6) Section 7.2 & 7.3: The "Modify SDP" for the BYE request and the 200-OK
response to the BYE (top of page 24, bottom of page 26 and middle of page
27) should be removed. This message will not contain SDP.

cheers,
(-:bob

Robert F. Penfield
Chief Software Architect
Acme Packet, Inc.
130 New Boston Street
Woburn, MA 01801
bpenfield@acmepacket.com



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov  1 12:28:08 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24387
	for <midcom-archive@odin.ietf.org>; Thu, 1 Nov 2001 12:28:08 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA09705
	for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 12:28:13 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09610;
	Thu, 1 Nov 2001 12:25:28 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09578
	for <midcom@optimus.ietf.org>; Thu, 1 Nov 2001 12:25:26 -0500 (EST)
Received: from hotmail.com (f164.pav1.hotmail.com [64.4.31.164])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA24321
	for <midcom@ietf.org>; Thu, 1 Nov 2001 12:25:21 -0500 (EST)
Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
	 Thu, 1 Nov 2001 09:24:55 -0800
Received: from 207.5.1.168 by pv1fd.pav1.hotmail.msn.com with HTTP;
	Thu, 01 Nov 2001 17:24:55 GMT
X-Originating-IP: [207.5.1.168]
From: "James Ho" <jamesho37@hotmail.com>
To: bpenfield@acmepacket.com, bscott@ridgewaysystems.com, midcom@ietf.org
Subject: Re: [midcom] pre-midcom candidates
Date: Thu, 01 Nov 2001 09:24:55 -0800
Mime-Version: 1.0
Content-Type: text/plain; format=flowed
Message-ID: <F164ufVma0osA91E9GQ00020a98@hotmail.com>
X-OriginalArrivalTime: 01 Nov 2001 17:24:55.0419 (UTC) FILETIME=[1F937CB0:01C162FA]
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Why could'nt tunnel-mode IPsec be used beween an IPsec end-point in
the enterprise and another in the SP network to tunnel H.323/SIP
traffic across firewalls? The auth/integrity checking within ESP
with null encryption should allow for a secure tunnel improving
enterprise IT confidence. Plus its a standard approach vs. the
"proprietary' approaches proposed. To address NAT issues, the
internal IPsec end-point could have a public IP address.

I don;t performance/latency will be an issue as IP storage folks
are considering tunnel-mode IPsec to be a mandatory  requirement
for all IP storage protocols (i.e. iSCSI, FCIP, etc).

Saqib

>From: "Bob Penfield" <bpenfield@acmepacket.com>
>To: "Barry Scott" <bscott@ridgewaysystems.com>, "'James Ho'" 
><jamesho37@hotmail.com>, <midcom@ietf.org>
>Subject: Re: [midcom] pre-midcom candidates
>Date: Thu, 1 Nov 2001 11:29:46 -0500
>
>What percentage of NAT/FW are symmetric as opposed to full-cone as 
>described
>in the STUN proposal? There is some debate whether or not the interim
>solution needs to address the symmetric NAT problem. If the great majority
>of existing FW/NAT are symmetric, we probably need to include it now.
>
>(-:bob
>
>Robert F. Penfield
>Chief Software Architect
>Acme Packet, Inc.
>130 New Boston Street
>Woburn, MA 01801
>bpenfield@acmepacket.com
>
>----- Original Message -----
>From: "Barry Scott" <bscott@ridgewaysystems.com>
>To: "'James Ho'" <jamesho37@hotmail.com>; <midcom@ietf.org>
>Sent: Thursday, November 01, 2001 9:58 AM
>Subject: RE: [midcom] pre-midcom candidates
>
>
> > The policy we need turns out to be the default for many
> > enterprises already.
> >
> > Typical behavour is to prevent UDP from the outside
> > to get inside. But once a UDP packet from the inside
> > is sent to the outside the firewall will pinhole itself
> > to allow return traffic. After a period of inactivity
> > the firewall will close the pinhole, for example after
> > 45 seconds.
> >
> > BArry
> >
> > -----Original Message-----
> > From: James Ho [mailto:jamesho37@hotmail.com]
> > Sent: 31 October 2001 22:20
> > To: midcom@ietf.org
> > Subject: RE: [midcom] pre-midcom candidates
> >
> >
> > As I understand it, the Davies proposal requires an open
> > UDP port on the firewall for media traversal. I can't think
> > of many/any enterprises being willing to implement such a
> > firewall policy. Or maybe my understanding is faulty??
> >
> > james
> >
> > _________________________________________________________________
> > Get your FREE download of MSN Explorer at 
>http://explorer.msn.com/intl.asp
> >
> >
> > _______________________________________________
> > midcom mailing list
> > midcom@ietf.org
> > http://www1.ietf.org/mailman/listinfo/midcom
> >
>


_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov  1 12:51:36 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA25459
	for <midcom-archive@odin.ietf.org>; Thu, 1 Nov 2001 12:51:36 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA10625
	for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 12:51:41 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA10576;
	Thu, 1 Nov 2001 12:48:25 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA10545
	for <midcom@optimus.ietf.org>; Thu, 1 Nov 2001 12:48:22 -0500 (EST)
Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA25343
	for <midcom@ietf.org>; Thu, 1 Nov 2001 12:48:16 -0500 (EST)
Received: from BobP [63.67.143.2] by acmepacket.com
  (SMTPD32-7.04) id AADF733300AC; Thu, 01 Nov 2001 12:48:15 -0500
Message-ID: <01a601c162fd$00a8e080$2300000a@acmepacket.com>
From: "Bob Penfield" <bpenfield@acmepacket.com>
To: <christopher.a.martin@wcom.com>,
        "'Christian Huitema'" <huitema@windows.microsoft.com>,
        "'Steve Davies'" <sdavies@ridgewaysystems.com>,
        "'midcom'" <midcom@ietf.org>
Cc: "'Melinda Shore'" <mshore@cisco.com>,
        "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>
References: <003401c162f3$c3817220$7f7822a6@rccc6131.mcit.com>
Subject: Re: [midcom] pre-midcom candidates - the Davies Critique
Date: Thu, 1 Nov 2001 12:45:30 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit


----- Original Message -----
From: "Christopher A. Martin" <christopher.a.martin@wcom.com>
To: "'Christian Huitema'" <huitema@windows.microsoft.com>; "'Steve Davies'"
<sdavies@ridgewaysystems.com>; "'midcom'" <midcom@ietf.org>
Cc: "'Melinda Shore'" <mshore@cisco.com>; "'Jonathan Rosenberg'"
<jdrosen@dynamicsoft.com>
Sent: Thursday, November 01, 2001 11:39 AM
Subject: RE: [midcom] pre-midcom candidates - the Davies Critique


> Anything intended to keep a "pinhole" open is actually pretty inefficient
in
> behavoir...the Davies proposal is actually on an as needed basis which is
> more efficient. Also the ablity to maintain "control" by the IT managers
is
> inherent to the Davies design, IMHO, since the enforcement is maintained
> both at the AP(where policy can be enforced), the firewall(s), and the SIP
> proxies (in the case of SIP signaling). I need to continue researcing the
> Davies proposal, but these were my initial opinions on the draft.
>
> The other proposals place enforcement at the clients, as they are
> maintaining the pinholes through the firewall, not a place that many IT
> managers typically allow enforcement to placed (except for possibly the
> SOHO).
>

You are assuming that IT manager have "control" over the Application Proxy.
I don't think that will be the case. If the APs are built into end-points,
the enforcement is still at the client. Both the Davies and the STUN
proposals involve poking UDP holes thru the NAT/FW for RTP by devices that
are "clients" as far as an IT manager is concerned. Davies just adds the
tunnel for the signalling.

>
> > -----Original Message-----
> > From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of
> > Christian Huitema
> > Sent: Wednesday, October 31, 2001 4:26 PM
> > To: Steve Davies; midcom
> > Cc: Melinda Shore; Jonathan Rosenberg
> > Subject: RE: [midcom] pre-midcom candidates - the Davies Critique
> >
> >
> > Steve,
> >
> > Your point regarding "Stun and firewalls" is mistaken. The STUN
> > requirement is that if there is a firewall, it let a response
> > come in to
> > a packet sent from an internal port. This is the default behavior of
> > most "residential NAT/firewall", and it is also an optional
> > behavior in
> > many enterprise firewalls. Whether such a policy is deemed
> > acceptable by
> > the local IT manager is debatable -- there are pros and cons.
> >
> > -- Christian Huitema
> >
> > -----Original Message-----
> > From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
> > Sent: Wednesday, October 31, 2001 12:57 PM
> > To: 'midcom'
> > Cc: 'Melinda Shore'; 'Jonathan Rosenberg'
> > Subject: RE: [midcom] pre-midcom candidates - the Davies Critique
> >
> > (Apologies if you get this twice. The first attempt was too
> > long for the
> > mailing list so I've deleted the history.)....
> > Naturally, I don't entirely agree with Jonathan's analysis. Here is
> > mine:
> > The Sen Proposal:
> > -----------------
> > I don't see the Sen proposal as an adequate near-term/pre-midcom
> > solution for two main reasons:
> > (a) it requires changes to the protocol:
> > ----------------------------------------
> > In order to make the Sen proposal work we are told that a new service
> > tag must be incorporated in the SIP Register request and a
> > new SIP Ping
> > (keep-alive) method must be incorporated. Not only will this take time
> > to implement in SIP but presumably we'll also need corresponding
> > protocol changes for Megaco, MGCP, H.323, etc. Or is Midcom
> > SIP-specific?
> > (b) it requires behavioural changes to the client:
> > --------------------------------------------------
> > It requires symmetric RTP and the continual transmission of
> > RTP and RTCP
> > packets to keep the NAT bindings open. While symmetric RTP
> > may be a good
> > thing, that doesn't imply all applications have constant
> > bi-directional
> > streams - think of 'broadcast' type applications. Also why should
> > terminals be expected to turn off silence suppression? How
> > are endpoints
> > to know when and when not to make this behavioural change?
> > Other weaknesses of the proposal include a requirement on terminals to
> > signal to the SIP proxy when they are behind a NAT. It is not
> > explained
> > how they are supposed to know whether or not they are.
> > Additionally, the
> > use of random ports on the RTP Proxy makes it difficult to
> > protect such
> > a device with a regular filtering firewall. Such
> > configurations would be
> > required for an enterprise do-it-yourself solution(the
> > enterprise is its
> > own provider) and by service providers wanting to protect
> > their networks
> > and service from DoS attacks.
> > Note that correction of all these shortcomings results in the same
> > architecture and method outlined in the Davies proposal.
> > The Rosenberg/STUN Proposal:
> > ----------------------------
> > Whilst I acknowledge the STUN proposal provides a method to determine
> > the type of NAT a terminal may be behind, I view the proposal as
> > incomplete and potentially impractical candidate as a
> > near-term/pre-midcom solution.
> > a) Firewalls are everywhere:
> > ----------------------------
> > Whenever a firewall is deployed in conjunction with a NAT,
> > irrespective
> > of the type of NAT, the net result is equivalent to what the
> > STUN method
> > describes as a Symmetric NAT. In the case of symmetric NATs, the
> > Rosenberg proposal acknowledges that a media
> > intermediary/relay (or RTP
> > Proxy) is required. However, the STUN proposal doesn't inform us what
> > the architecture and method are for making calls in this
> > case, although
> > Jonathan acknowledges in his email that there are three
> > solutions - the
> > Davies proposal, the Sen proposal and an unpublished STUN proposal.
> > Firewalls are a fact of life in all enterprises connected to the
> > internet. An ever-increasing number of users are installing
> > firewalls in
> > their homes as well. The majority of calls will require a media
> > intermediary/RTP Proxy. In other words, VoIP providers will have to
> > install media intermediaries from Day One of any service. Can you
> > imagine the subscription scenario if they don't:
> > Customer: 'Please may I subscribe to your service'
> > Provider: 'Is your terminal behind a firewall?'
> > Customer: 'Yes'
> > Provider: 'Sorry our service won't work for you' or 'Yes, but please
> > place your terminal outside the firewall' or 'Yes, but you
> > can only call
> > other people not behind a firewall or symmetric NAT'.
> > This is not what the VoIP industry needs right now!
> > b) Too early to optimise:
> > -------------------------
> > The STUN proposal boils down to a port saving technique for VoIP
> > providers. But in a nascent market its impractical to start
> > with a port
> > saving technique particularly when its unquantifiable how many ports a
> > provider may save. What providers need is a solution that is
> > deployable
> > in all cases - that implies a media intermediary solution. Trying to
> > combine a port saving technique in conjunction with a media
> > intermediary
> > solution will add complexity that will delay and stall the
> > VoIP market.
> > From a provider's perspective, this delay and additional testing could
> > far outweigh any savings gained by requiring fewer media intermediary
> > ports.
> > c) Unproven:
> > ------------
> > i) TIMEOUTS. When a user is behind a firewall or symmetric
> > NAT, to avoid
> > use of a media intermediary the terminal must invoke the STUN protocol
> > on a call by call basis. The STUN protocol requires potentially
> > significant timeouts to expire in order to determine whether media may
> > go direct. What will this do to call setup times?
> > ii) NETWORK BASED NATS. There may be cases where the terminal
> > determines
> > that the media may go direct, but in fact the media passes through
> > network based NATs and the call will fail. This would typically happen
> > at the provider boundary, because the provider uses some internal
> > addressing scheme or when passing from IPv4 to IPv6 networks. The
> > solution would be to place the STUN server on the remote side of those
> > network based NATs, but this would have the consequence of tromboning
> > the media via those network based NATs for 'provider-internal' calls,
> > defeating the reason for STUN. Alternatively, multiple STUN servers
> > would need to be deployed - one for each different NAT location, but
> > that then poses the question of how a terminal would know which STUN
> > server to use on a call-by-call basis.
> > Davies proposal:
> > ----------------
> > The Davies proposal is very midcom-like. The Proxy Extension
> > Agent (PEA)
> > is like a MIDDLEBOX and the Application Proxy (AP) is like a MIDCOM
> > AGENT. The AP is responsible for getting publicly reachable transport
> > addresses on the PEA for external calls and publishing those addresses
> > in the protocol messages.
> > The Davies proposal simplifies the security policy problem being
> > grappled with by MIDCOM to a very simple static policy
> > administered and
> > controlled by the IT manager and implemented on existing
> > firewalls. Just
> > three static pinholes are required to be configured in the firewall.
> > Furthermore, these pinholes are outbound pinholes(i.e. out from the
> > enterprise).
> > Jonathan writes that in the Davies draft there are issues to do with
> > consistency with enterprise firewall policy, but this is
> > unsubstantiated. When details of these issues are provided, we will be
> > happy to discuss them. The Davies method is entirely consistent with
> > enterprise firewall policy - it is similar to, but actually far more
> > restrictive than the firewall policy that allows web browsing for
> > example. The Davies proposal's policy has been vetted by service
> > providers and is already in commercial deployments - we can
> > only assume
> > enterprises find it acceptable.
> > As well as being midcom-like, the Davies method has many other
> > significant advantages:
> > * It provides a 100% solution. It will work anywhere no
> > matter how many
> > and what type and combination of firewalls and NATs there are.
> > * No change is required to any of the protocols. It is not even
> > necessary for endpoints to implement symmetric RTP.
> > * The implementation can be made transparent to the endpoints or be
> > implemented by them.
> > * Enterprise or Service Provider deployments are possible. The PEA may
> > be deployed within a service provider's network or within the
> > DMZ of an
> > enterprise's own service centre.
> > * Passing through a media intermediary is seen as enhancing
> > security and
> > saving IP addresses. Hiding an enterprise IP address from the remote
> > party (only the transport addresses of the PEA are published in
> > messages) is seen as a benefit and enables the enterprise to use the
> > same IP address used for other Internet traffic.
> > * Service Providers see a benefit in handling the media
> > through PEA for
> > several reasons. It enables them to hide the transport addresses of
> > their other service equipment. It provides them with a
> > suitable point to
> > implement wire-tapping (e.g.CALEA) - ITSPs in many countries are bound
> > to provide such capabilities. It also provides them with a media QOS
> > execution point and it provides suitable IPv4/IPv6 migration boundary
> > points.
> > Jonathan seeks to belittle the Davies proposal by likening it to RSIP.
> > I'm not sure what the point is here. It is true that we have borrowed
> > and learnt from many of the principles and techniques used within the
> > Internet. That's why we have well known ports, outbound initiated
> > connections, and TCP multiplexing, so it's not surprising the
> > method is
> > recognisable and architecturally looks similar to other
> > protocols. What
> > is unique, is the way in which this method combines the different
> > Internet techniques together with the transport of real-time
> > UDP streams
> > without any tunneling overhead.
> > In fact, the single disadvantage of the Davies proposal is that it
> > requires media intermediaries, but no-one has devised a non-media
> > intermediary solution that solves all of today's firewall and NAT
> > deployments. In any case, media intermediaries are not of much concern
> > to service providers because they will co-locate those intermediaries
> > with their access equipment in their POPs. In due course, those
> > intermediaries may even be implemented in the access routers or Midcom
> > will obviate them.
> > Pre-Midcom Recommendation:
> > --------------------------
> > Jonathan writes that he wants to tackle the harder stuff,
> > i.e. firewalls
> > and symmetric NATs, later. The fact of the matter is that the Davies
> > proposal has solved the harder stuff already. It is the
> > Davies proposal
> > that is the low-hanging fruit because it addresses 100% of deployments
> > and it has working examples. Surely this is where a
> > pre-midcom solution
> > must start. A VoIP provider needs it from Day One because it is very
> > likely some/many customers will have a firewall or symmetric
> > NAT. If in
> > time, providers are seeking more efficient deployments or are
> > seeking to
> > reduce costs, then the Davies solution is easily extended to
> > incorporate
> > a STUN-like method. But before embarking on this effort it
> > would be wise
> > to judge the market need and determine when MIDCOM will kick in.
> > Steve Davies
> >
> > _______________________________________________
> > midcom mailing list
> > midcom@ietf.org
> > http://www1.ietf.org/mailman/listinfo/midcom
> >
>
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
>


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov  1 13:51:47 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27487
	for <midcom-archive@odin.ietf.org>; Thu, 1 Nov 2001 13:51:47 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id NAA12848
	for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 13:51:53 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA12806;
	Thu, 1 Nov 2001 13:49:35 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA12777
	for <midcom@optimus.ietf.org>; Thu, 1 Nov 2001 13:49:34 -0500 (EST)
Received: from dgesmtp02.wcom.com (dgesmtp02.wcom.com [199.249.16.17])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27409
	for <midcom@ietf.org>; Thu, 1 Nov 2001 13:49:27 -0500 (EST)
Received: from pmismtp02.wcomnet.com ([166.38.62.37])
 by firewall.wcom.com (PMDF V5.2-33 #42261)
 with ESMTP id <0GM400EJXXGNOY@firewall.wcom.com> for midcom@ietf.org; Thu,
 1 Nov 2001 18:46:00 +0000 (GMT)
Received: from pmismtp02.wcomnet.com by pmismtp02.wcomnet.com
 (PMDF V5.2-33 #42259) with SMTP id <0GM400701XGG70@pmismtp02.wcomnet.com>;
 Thu, 01 Nov 2001 18:45:59 +0000 (GMT)
Received: from rccc6131 ([166.35.225.46])
 by pmismtp02.wcomnet.com (PMDF V5.2-33 #42259)
 with ESMTP id <0GM4004GRXG70R@pmismtp02.wcomnet.com>; Thu,
 01 Nov 2001 18:45:43 +0000 (GMT)
Date: Thu, 01 Nov 2001 12:45:39 -0600
From: "Christopher A. Martin" <christopher.a.martin@wcom.com>
Subject: RE: [midcom] pre-midcom candidates
In-reply-to: <F164ufVma0osA91E9GQ00020a98@hotmail.com>
To: "'James Ho'" <jamesho37@hotmail.com>, bpenfield@acmepacket.com,
        bscott@ridgewaysystems.com, midcom@ietf.org
Reply-to: christopher.a.martin@wcom.com
Message-id: <000f01c16305$67aa87e0$2ee123a6@rccc6131.mcit.com>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V4.72.3110.3
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2377.0
Content-type: text/plain; charset=iso-8859-1
Content-transfer-encoding: 7bit
Importance: Normal
X-Priority: 3 (Normal)
X-MSMail-priority: Normal
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

This would work well for an isolated network (intranet or extranet) but when
it is desired to allow anyone (Internet) access it would be infeasible to
provide security associations to the world and probably impossible for many
endpoints (From an interoperability standpoint between vendors)...It really
depends on the scale of the solution (I like IPSec solutions myself).

Also, IPSec doesnt provide security policy enforcement, as a firewall
typically would on non-IPSec encapsulated packets, merely privacy. When you
tunnel IPSec through a firewall from endpoints, unless the security
associations are setup to be granular, the firewall cannot act on the
packets inside the tunnel.

Also not all firewalls allow IPSec (IP 50 and 51) the ability to pass
through them.

> -----Original Message-----
> From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of
> James Ho
> Sent: Thursday, November 01, 2001 11:25 AM
> To: bpenfield@acmepacket.com; bscott@ridgewaysystems.com;
> midcom@ietf.org
> Subject: Re: [midcom] pre-midcom candidates
>
>
> Why could'nt tunnel-mode IPsec be used beween an IPsec end-point in
> the enterprise and another in the SP network to tunnel H.323/SIP
> traffic across firewalls? The auth/integrity checking within ESP
> with null encryption should allow for a secure tunnel improving
> enterprise IT confidence. Plus its a standard approach vs. the
> "proprietary' approaches proposed. To address NAT issues, the
> internal IPsec end-point could have a public IP address.
>
> I don;t performance/latency will be an issue as IP storage folks
> are considering tunnel-mode IPsec to be a mandatory  requirement
> for all IP storage protocols (i.e. iSCSI, FCIP, etc).
>
> Saqib
>
> >From: "Bob Penfield" <bpenfield@acmepacket.com>
> >To: "Barry Scott" <bscott@ridgewaysystems.com>, "'James Ho'"
> ><jamesho37@hotmail.com>, <midcom@ietf.org>
> >Subject: Re: [midcom] pre-midcom candidates
> >Date: Thu, 1 Nov 2001 11:29:46 -0500
> >
> >What percentage of NAT/FW are symmetric as opposed to full-cone as
> >described
> >in the STUN proposal? There is some debate whether or not the interim
> >solution needs to address the symmetric NAT problem. If the
> great majority
> >of existing FW/NAT are symmetric, we probably need to include it now.
> >
> >(-:bob
> >
> >Robert F. Penfield
> >Chief Software Architect
> >Acme Packet, Inc.
> >130 New Boston Street
> >Woburn, MA 01801
> >bpenfield@acmepacket.com
> >
> >----- Original Message -----
> >From: "Barry Scott" <bscott@ridgewaysystems.com>
> >To: "'James Ho'" <jamesho37@hotmail.com>; <midcom@ietf.org>
> >Sent: Thursday, November 01, 2001 9:58 AM
> >Subject: RE: [midcom] pre-midcom candidates
> >
> >
> > > The policy we need turns out to be the default for many
> > > enterprises already.
> > >
> > > Typical behavour is to prevent UDP from the outside
> > > to get inside. But once a UDP packet from the inside
> > > is sent to the outside the firewall will pinhole itself
> > > to allow return traffic. After a period of inactivity
> > > the firewall will close the pinhole, for example after
> > > 45 seconds.
> > >
> > > BArry
> > >
> > > -----Original Message-----
> > > From: James Ho [mailto:jamesho37@hotmail.com]
> > > Sent: 31 October 2001 22:20
> > > To: midcom@ietf.org
> > > Subject: RE: [midcom] pre-midcom candidates
> > >
> > >
> > > As I understand it, the Davies proposal requires an open
> > > UDP port on the firewall for media traversal. I can't think
> > > of many/any enterprises being willing to implement such a
> > > firewall policy. Or maybe my understanding is faulty??
> > >
> > > james
> > >
> > > _________________________________________________________________
> > > Get your FREE download of MSN Explorer at
> >http://explorer.msn.com/intl.asp
> > >
> > >
> > > _______________________________________________
> > > midcom mailing list
> > > midcom@ietf.org
> > > http://www1.ietf.org/mailman/listinfo/midcom
> > >
> >
>
>
> _________________________________________________________________
> Get your FREE download of MSN Explorer at
> http://explorer.msn.com/intl.asp
>
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
>


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov  1 15:59:03 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA00366
	for <midcom-archive@odin.ietf.org>; Thu, 1 Nov 2001 15:59:03 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA16980
	for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 15:59:08 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA16912;
	Thu, 1 Nov 2001 15:54:39 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA16881
	for <midcom@optimus.ietf.org>; Thu, 1 Nov 2001 15:54:37 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA00206
	for <midcom@ietf.org>; Thu, 1 Nov 2001 15:54:31 -0500 (EST)
Received: from asimu-u5.cisco.com (asimu-u5.cisco.com [128.107.162.97])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fA1Ks9X27072;
	Thu, 1 Nov 2001 12:54:09 -0800 (PST)
Received: from cisco.com (localhost [127.0.0.1]) by asimu-u5.cisco.com (8.8.8-Cisco List Logging/CISCO.WS.1.2) with ESMTP id MAA26170; Thu, 1 Nov 2001 12:54:04 -0800 (PST)
Message-ID: <3BE1B66C.1635A2E3@cisco.com>
Date: Thu, 01 Nov 2001 12:54:04 -0800
From: Adina Simu <asimu@cisco.com>
Organization: Cisco Systems
X-Mailer: Mozilla 4.51C-CISCOENG [en] (X11; U; SunOS 5.6 sun4u)
X-Accept-Language: en
MIME-Version: 1.0
To: christopher.a.martin@wcom.com
CC: "'James Ho'" <jamesho37@hotmail.com>, bpenfield@acmepacket.com,
        bscott@ridgewaysystems.com, midcom@ietf.org
Subject: Re: [midcom] pre-midcom candidates
References: <000f01c16305$67aa87e0$2ee123a6@rccc6131.mcit.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

IPsec itself has big problems with NATs - NAPTs in particular (as
probably all of you know already :)).

-Adina


"Christopher A. Martin" wrote:
> 
> This would work well for an isolated network (intranet or extranet) but when
> it is desired to allow anyone (Internet) access it would be infeasible to
> provide security associations to the world and probably impossible for many
> endpoints (From an interoperability standpoint between vendors)...It really
> depends on the scale of the solution (I like IPSec solutions myself).
> 
> Also, IPSec doesnt provide security policy enforcement, as a firewall
> typically would on non-IPSec encapsulated packets, merely privacy. When you
> tunnel IPSec through a firewall from endpoints, unless the security
> associations are setup to be granular, the firewall cannot act on the
> packets inside the tunnel.
> 
> Also not all firewalls allow IPSec (IP 50 and 51) the ability to pass
> through them.
> 
> > -----Original Message-----
> > From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of
> > James Ho
> > Sent: Thursday, November 01, 2001 11:25 AM
> > To: bpenfield@acmepacket.com; bscott@ridgewaysystems.com;
> > midcom@ietf.org
> > Subject: Re: [midcom] pre-midcom candidates
> >
> >
> > Why could'nt tunnel-mode IPsec be used beween an IPsec end-point in
> > the enterprise and another in the SP network to tunnel H.323/SIP
> > traffic across firewalls? The auth/integrity checking within ESP
> > with null encryption should allow for a secure tunnel improving
> > enterprise IT confidence. Plus its a standard approach vs. the
> > "proprietary' approaches proposed. To address NAT issues, the
> > internal IPsec end-point could have a public IP address.
> >
> > I don;t performance/latency will be an issue as IP storage folks
> > are considering tunnel-mode IPsec to be a mandatory  requirement
> > for all IP storage protocols (i.e. iSCSI, FCIP, etc).
> >
> > Saqib
> >
> > >From: "Bob Penfield" <bpenfield@acmepacket.com>
> > >To: "Barry Scott" <bscott@ridgewaysystems.com>, "'James Ho'"
> > ><jamesho37@hotmail.com>, <midcom@ietf.org>
> > >Subject: Re: [midcom] pre-midcom candidates
> > >Date: Thu, 1 Nov 2001 11:29:46 -0500
> > >
> > >What percentage of NAT/FW are symmetric as opposed to full-cone as
> > >described
> > >in the STUN proposal? There is some debate whether or not the interim
> > >solution needs to address the symmetric NAT problem. If the
> > great majority
> > >of existing FW/NAT are symmetric, we probably need to include it now.
> > >
> > >(-:bob
> > >
> > >Robert F. Penfield
> > >Chief Software Architect
> > >Acme Packet, Inc.
> > >130 New Boston Street
> > >Woburn, MA 01801
> > >bpenfield@acmepacket.com
> > >
> > >----- Original Message -----
> > >From: "Barry Scott" <bscott@ridgewaysystems.com>
> > >To: "'James Ho'" <jamesho37@hotmail.com>; <midcom@ietf.org>
> > >Sent: Thursday, November 01, 2001 9:58 AM
> > >Subject: RE: [midcom] pre-midcom candidates
> > >
> > >
> > > > The policy we need turns out to be the default for many
> > > > enterprises already.
> > > >
> > > > Typical behavour is to prevent UDP from the outside
> > > > to get inside. But once a UDP packet from the inside
> > > > is sent to the outside the firewall will pinhole itself
> > > > to allow return traffic. After a period of inactivity
> > > > the firewall will close the pinhole, for example after
> > > > 45 seconds.
> > > >
> > > > BArry
> > > >
> > > > -----Original Message-----
> > > > From: James Ho [mailto:jamesho37@hotmail.com]
> > > > Sent: 31 October 2001 22:20
> > > > To: midcom@ietf.org
> > > > Subject: RE: [midcom] pre-midcom candidates
> > > >
> > > >
> > > > As I understand it, the Davies proposal requires an open
> > > > UDP port on the firewall for media traversal. I can't think
> > > > of many/any enterprises being willing to implement such a
> > > > firewall policy. Or maybe my understanding is faulty??
> > > >
> > > > james
> > > >
> > > > _________________________________________________________________
> > > > Get your FREE download of MSN Explorer at
> > >http://explorer.msn.com/intl.asp
> > > >
> > > >
> > > > _______________________________________________
> > > > midcom mailing list
> > > > midcom@ietf.org
> > > > http://www1.ietf.org/mailman/listinfo/midcom
> > > >
> > >
> >
> >
> > _________________________________________________________________
> > Get your FREE download of MSN Explorer at
> > http://explorer.msn.com/intl.asp
> >
> >
> > _______________________________________________
> > midcom mailing list
> > midcom@ietf.org
> > http://www1.ietf.org/mailman/listinfo/midcom
> >
> 
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov  1 16:29:20 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA01073
	for <midcom-archive@odin.ietf.org>; Thu, 1 Nov 2001 16:29:20 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id QAA18207
	for midcom-archive@odin.ietf.org; Thu, 1 Nov 2001 16:29:25 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA18058;
	Thu, 1 Nov 2001 16:25:54 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA17978
	for <midcom@optimus.ietf.org>; Thu, 1 Nov 2001 16:25:49 -0500 (EST)
Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA00940
	for <midcom@ietf.org>; Thu, 1 Nov 2001 16:25:43 -0500 (EST)
Received: from smtprch2.nortel.com (erchg0k.us.nortel.com [47.113.64.104])
	by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id PAA01549
	for <midcom@ietf.org>; Thu, 1 Nov 2001 15:25:16 -0600 (CST)
Received: from zrchb200.us.nortel.com by smtprch2.nortel.com;
          Thu, 1 Nov 2001 15:18:19 -0600
Received: by zrchb200.us.nortel.com with Internet Mail Service (5.5.2653.19) 
          id <VPB2N1QZ>; Thu, 1 Nov 2001 15:24:24 -0600
Message-ID: <933FADF5E673D411B8A30002A5608A0E06F29D@zrc2c012.us.nortel.com>
From: "Sanjoy Sen" <sanjoy@nortelnetworks.com>
To: "'Steve Davies'" <sdavies@ridgewaysystems.com>,
        "'midcom'" <midcom@ietf.org>
Cc: "'Melinda Shore'" <mshore@cisco.com>,
        "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>
Subject: RE: [midcom] pre-midcom candidates - the Davies Critique
Date: Thu, 1 Nov 2001 15:24:27 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
              boundary="----_=_NextPart_001_01C1631B.96490840"
X-Orig: <sanjoy@americasm01.nt.com>
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1631B.96490840
Content-Type: text/plain;
	charset="iso-8859-1"

Comments inline.

-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: Wednesday, October 31, 2001 2:57 PM
To: 'midcom'
Cc: 'Melinda Shore'; 'Jonathan Rosenberg'
Subject: RE: [midcom] pre-midcom candidates - the Davies Critique



(Apologies if you get this twice. The first attempt was too long for the
mailing list so I've deleted the history.).... 

Naturally, I don't entirely agree with Jonathan's analysis. Here is mine: 

The Sen Proposal: 
----------------- 
I don't see the Sen proposal as an adequate near-term/pre-midcom solution
for two main reasons:  

[SS] The solution is already in live deployment in some service provider
networks!

(a) it requires changes to the protocol: 
---------------------------------------- 
In order to make the Sen proposal work we are told that a new service tag
must be incorporated in the SIP Register request and a new SIP Ping
(keep-alive) method must be incorporated. Not only will this take time to
implement in SIP but presumably we'll also need corresponding protocol
changes for Megaco, MGCP, H.323, etc. Or is Midcom SIP-specific? 

[SS] The Proxy-Require option tag is only what is required. You need to
enable the Proxy distinguish between the cases when it should and should not
send messages to the source address/port of the received packet. The Ping
method is optional, Register refreshes can be used instead. The drawback of
the latter is that it hits the Registrar (at least once every minute)
unnecesarily. We tried that & ran into performance problems which made us
switch to a more lightweight mechanism. 

Yes, the signaling solution depicted in the draft is SIP-specific. 

(b) it requires behavioural changes to the client: 
-------------------------------------------------- 
It requires symmetric RTP and the continual transmission of RTP and RTCP
packets to keep the NAT bindings open. While symmetric RTP may be a good
thing, that doesn't imply all applications have constant bi-directional
streams - think of 'broadcast' type applications. Also why should terminals
be expected to turn off silence suppression? How are endpoints to know when
and when not to make this behavioural change?  

[SS] The "Symmetric RTP" that we use is simply receive packets in the same
port that you send packets from. This is easily configurable in amost all
existing clients.  To keep the media path through the FW/NAT open, the
client is required to send out RTP/UDP packets voluntarily only when the
media stream is muted. These packets can be silence packets (which are
generated by many codecs for comfort noise) or empty UDP packets.

  Additionally, the use of random ports on the RTP Proxy makes it difficult
to protect such a device with a regular filtering firewall. Such
configurations would be required for an enterprise do-it-yourself
solution(the enterprise is its own provider) and by service providers
wanting to protect their networks and service from DoS attacks. 

[SS] This should not be a problem for the Enterprise-do-it-yourself ,
because they would typically have to trust packets coming from behind their
own firewall/NAT! In either case, the FW would only have to allow known
addresses/ports from the Enterprise side. 

Sanjoy

 


------_=_NextPart_001_01C1631B.96490840
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<TITLE>RE: [midcom] pre-midcom candidates - the Davies Critique</TITLE>

<META content="MSHTML 5.00.2314.1000" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=260542315-01112001>Comments inline.</SPAN></FONT></DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #0000ff 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px; PADDING-LEFT: 5px">
  <DIV align=left class=OutlookMessageHeader dir=ltr><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Steve Davies 
  [mailto:sdavies@ridgewaysystems.com]<BR><B>Sent:</B> Wednesday, October 31, 
  2001 2:57 PM<BR><B>To:</B> 'midcom'<BR><B>Cc:</B> 'Melinda Shore'; 'Jonathan 
  Rosenberg'<BR><B>Subject:</B> RE: [midcom] pre-midcom candidates - the Davies 
  Critique<BR><BR></DIV></FONT>
  <P><FONT size=2>(Apologies if you get this twice. The first attempt was too 
  long for the mailing list so I've deleted the history.)....</FONT> </P>
  <P><FONT size=2>Naturally, I don't entirely agree with Jonathan's analysis. 
  Here is mine:</FONT> </P>
  <P><FONT size=2>The Sen Proposal:</FONT> <BR><FONT 
  size=2>-----------------</FONT> <BR><FONT size=2>I don't see the Sen proposal 
  as an adequate near-term/pre-midcom solution for two main 
  reasons:</FONT>&nbsp;<FONT color=#0000ff face=Arial size=2><SPAN 
  class=260542315-01112001>&nbsp;</SPAN></FONT></P>
  <P><FONT color=#0000ff face=Arial size=2><SPAN class=260542315-01112001>[SS] 
  The solution is already in live deployment in some service provider 
  networks!</SPAN></FONT></P>
  <P><FONT size=2>(a) it requires changes to the protocol:</FONT> <BR><FONT 
  size=2>----------------------------------------</FONT> <BR><FONT size=2>In 
  order to make the Sen proposal work we are told that a new service tag must be 
  incorporated in the SIP Register request and a new SIP Ping (keep-alive) 
  method must be incorporated. Not only will this take time to implement in SIP 
  but presumably we'll also need corresponding protocol changes for Megaco, 
  MGCP, H.323, etc. Or is Midcom SIP-specific?<FONT color=#0000ff 
  face=Arial><SPAN class=260542315-01112001>&nbsp;</SPAN></FONT></FONT></P>
  <P><FONT size=2><FONT color=#0000ff face=Arial><SPAN 
  class=260542315-01112001>[SS] The Proxy-Require option tag is only what is 
  required. You need to enable the Proxy distinguish between the cases when it 
  should and should not send messages to the source address/port of the received 
  packet. The Ping method is optional, Register refreshes can be used instead. 
  The drawback of the latter is that it hits the Registrar (at least once every 
  minute) unnecesarily. We tried that &amp; ran into performance problems which 
  made us switch to a more lightweight mechanism. </SPAN></FONT></FONT></P>
  <P><FONT size=2><FONT color=#0000ff face=Arial><SPAN 
  class=260542315-01112001>Yes, the signaling solution depicted in the draft is 
  SIP-specific.&nbsp;</SPAN></FONT></FONT></P>
  <P><FONT size=2>(b) it requires behavioural changes to the client:</FONT> 
  <BR><FONT size=2>--------------------------------------------------</FONT> 
  <BR><FONT size=2>It requires symmetric RTP and the continual transmission of 
  RTP and RTCP packets to keep the NAT bindings open. While symmetric RTP may be 
  a good thing, that doesn't imply all applications have constant bi-directional 
  streams - think of 'broadcast' type applications. Also why should terminals be 
  expected to turn off silence suppression? How are endpoints to know when and 
  when not to make this behavioural change?&nbsp;<FONT color=#0000ff 
  face=Arial><SPAN class=260542315-01112001>&nbsp;</SPAN></FONT></FONT></P>
  <P><FONT size=2><FONT color=#0000ff face=Arial><SPAN 
  class=260542315-01112001>[SS] The "Symmetric RTP" that we use is&nbsp;simply 
  receive packets in the same port that you send packets&nbsp;from.&nbsp;This is 
  easily configurable&nbsp;in amost all existing clients.&nbsp;&nbsp;To keep the 
  media path through the FW/NAT open, the client is required to send out RTP/UDP 
  packets voluntarily only when the media stream is muted. These packets can be 
  silence packets (which are generated by many codecs for comfort noise) or 
  empty UDP packets.</SPAN></FONT></FONT></P>
  <P><FONT face=Arial><SPAN class=260542315-01112001></SPAN></FONT><FONT 
  size=2><SPAN class=260542315-01112001><FONT 
  face=Arial>&nbsp;</FONT></SPAN></FONT><FONT size=2><SPAN 
  class=260542315-01112001>&nbsp;</SPAN>Additionally, the use of random ports on 
  the RTP Proxy makes it difficult to protect such a device with a regular 
  filtering firewall. Such configurations would be required for an enterprise 
  do-it-yourself solution(the enterprise is its own provider) and by service 
  providers wanting to protect their networks and service from DoS attacks.<FONT 
  color=#0000ff face=Arial><SPAN 
  class=260542315-01112001>&nbsp;</SPAN></FONT></FONT></P>
  <P><FONT size=2><FONT color=#0000ff face=Arial><SPAN 
  class=260542315-01112001>[SS] This should not be a problem for the 
  Enterprise-do-it-yourself , because they would typically have to trust packets 
  coming from behind their own firewall/NAT! In either case, the FW would only 
  have to allow known addresses/ports from the Enterprise side. 
  </SPAN></FONT></FONT></P>
  <P><FONT color=#0000ff face=Arial size=2><SPAN 
  class=260542315-01112001>Sanjoy</SPAN></FONT></P>
  <P><FONT face=Arial size=2><SPAN 
  class=260542315-01112001></SPAN></FONT>&nbsp;</P></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C1631B.96490840--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 00:33:49 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA10939
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 00:33:49 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id AAA29316
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 00:33:50 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA29272;
	Fri, 2 Nov 2001 00:30:51 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA29235
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 00:30:49 -0500 (EST)
Received: from qtech1.quarrytech.com (email.quarrytech.com [4.17.144.4])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA10870
	for <midcom@ietf.org>; Fri, 2 Nov 2001 00:30:47 -0500 (EST)
Received: from mduffy (10.1.1.254 [10.1.1.254]) by qtech1.quarrytech.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id 49ZFCT1J; Fri, 2 Nov 2001 00:30:18 -0500
Message-Id: <3.0.5.32.20011102002139.00820510@email.quarrytech.com>
X-Sender: mduffy@email.quarrytech.com
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Fri, 02 Nov 2001 00:21:39 -0500
To: Melinda Shore <mshore@cisco.com>, midcom@ietf.org
From: Mark Duffy <mduffy@quarrytech.com>
Subject: Re: [midcom] Current status
In-Reply-To: <5.1.0.14.0.20011031174517.00a5b0c0@mira-sjc5-4.cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

>Framework: There have been *no* comments on the recent revision
>of the framework draft.  I'm not sure I want to start WG last call
>on it until I have some sense of whether or not more than a few
>people have given it a good going-over already.  Have you?

I have some minor documentation comments I'll send separately.  More
substantively, what if any resolution to the topology question can we
reach?  This is both a technical and political question.  Whatever the
resolution surely the framework should reflect it.

The framework draft basically decides not to address this (section 5.0
first paragraph, and section 9 first paragraph).  We have the Aoun/Sen,
Penfield, and Molitor drafts from August that seem to support about that
same conclusion: the ability to support complex topologies is basically
limited by the topology knowledge the agent has available.  

We have the in-and-out proposal from Scott which allows some use of
topology knowledge the middlebox might have, but does not address middlebox
discovery by agents.  And then there is the "friendly" RSVP-like proposal
from Melinda which seems to address the topology and discovery questions
although it lies somewhat "outside the box" of the framework and
requirements work to date in the wg.

- Mark

P.S. apologies in advance for any mangling I have done in attempting to
summarize the drafts in one sentence each.


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 00:33:52 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA10934
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 00:33:48 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id AAA29302
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 00:33:49 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA29233;
	Fri, 2 Nov 2001 00:30:48 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA29202
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 00:30:47 -0500 (EST)
Received: from qtech1.quarrytech.com (email.quarrytech.com [4.17.144.4])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA10863
	for <midcom@ietf.org>; Fri, 2 Nov 2001 00:30:45 -0500 (EST)
Received: from mduffy (10.1.1.254 [10.1.1.254]) by qtech1.quarrytech.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id 49ZFCT1G; Fri, 2 Nov 2001 00:30:15 -0500
Message-Id: <3.0.5.32.20011102002146.008f6a90@email.quarrytech.com>
X-Sender: mduffy@email.quarrytech.com
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Fri, 02 Nov 2001 00:21:46 -0500
To: Pyda Srisuresh <srisuresh@yahoo.com>, midcom@ietf.org
From: Mark Duffy <mduffy@quarrytech.com>
Subject: Re: [midcom] Rev4 of MIDCOM Architecture & framework document
In-Reply-To: <20011017121426.70434.qmail@web13802.mail.yahoo.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Thank you Suresh, here are my comments.
These are just suggestions on the document, not I think on the fundamental
concepts.  -- Mark.


Section 2.15 -- definition of "Ruleset".  I recommend we remove the second
paragraph:
   Ruleset specifies the dynamic resources (i.e., Filter Specs,
   Action Specs, Ruleset type, Timeout values etc.) that maybe
   communicated through the MIDCOM protocol.
I don't think it adds much to the definition, and it introduces another new
undefined term ("resources").  There was some discussion of removing this
on the list 4 Oct.

Section 6.0 -- policy server.  In the third paragraph it states
   The policy server acts in an advisory capacity to a middlebox to
   authorize or terminate authorization for an agent to gain 
   connectivity to the middlebox. The primary objective of a policy
I think "gain connectivity to the middlebox" is a fairly imprecise wording.
 Section 2.9 (policy server definition) has more/better description than
this section 6.0.  Perhaps some of that can be moved here and replace some
of 6.0.  BTW my understanding, and I can read this into the section 2.9
description but it is not unambiguously stated there, that the policy
server may govern which agents may establish midcom sessions with the
middlebox *and also* restrict what Rulesets a given agent may manipulate.
No?  Perhaps we can clarify that.

Section 6.2 -- registration.  The first paragraph explains that
registration is different than establishing a session.  The phrase
"transport session" is used several times in this paragraph.  I suggest
that the first two uses should be replaced with the recently defined term
"Midcom session".

Section 6.2.  The third paragraph seems confusing.  Also, it discusses
either the agent or the middlebox initiating the midcom session.  My
understanding from the requirements discussion etc. is that we have come
around to only the agent initiating the session.  I suggest modifying the
paragraph as follows:
   The MIDCOM agent profile may be pre-configured on the middlebox while
   provisioning the middlebox function. Thereafter, the agent may choose
   to initiate a Midcom session prior to any data traffic. Alternatively,
   it may choose to initiate a Midcom session only upon noticing the
   application specific traffic. 

Section 6.2.  The 4th paragraph discusses "Coupling MIDCOM agents with the
middlebox ruleset".  I'm not sure what that coupling refers to.  Can we
clarify this?

Section 6.2.  The seventh paragraph is confusing, and again contains the
concept of the middlebox initiating the midcom session.  Since the main
purpose of this paragraph (I think) is to point out that the agent
information may be provisioned into a policy server rather than the
middlebox, and we've said that above, I suggest just omitting this paragraph.

Section 6.2, 8th paragraph.  The first seven lines here are about midcom
session disconnection and have nothing to do with
registration/deregistration.  Since they cover material already presented
in section 4, I suggest deleting them.

Section 11-security considerations.  The first paragraph points out some
deleterious effects of middleboxes on security protocols.  The second
paragraph seems to state that midcom can fix all this because the middlebox
will no longer need to inspect or modify data.  The text should acknowledge
that the midcom model does not help with the problem of NAT breaking IPsec
since in this case the middlebox still modifies data that matters.



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 02:33:37 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA27335
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 02:33:36 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id CAA09087
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 02:33:39 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id CAA09069;
	Fri, 2 Nov 2001 02:31:17 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id CAA09039
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 02:31:15 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA27328
	for <midcom@ietf.org>; Fri, 2 Nov 2001 02:31:13 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fA27TQb7002675;
	Fri, 2 Nov 2001 02:29:26 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <WBWQXN1L>; Fri, 2 Nov 2001 02:30:42 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6D25@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'James Ho'" <jamesho37@hotmail.com>, bpenfield@acmepacket.com,
        bscott@ridgewaysystems.com, midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates
Date: Fri, 2 Nov 2001 02:30:35 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



 

> -----Original Message-----
> From: James Ho [mailto:jamesho37@hotmail.com]
> Sent: Thursday, November 01, 2001 12:25 PM
> To: bpenfield@acmepacket.com; bscott@ridgewaysystems.com;
> midcom@ietf.org
> Subject: Re: [midcom] pre-midcom candidates
> 
> 
> Why could'nt tunnel-mode IPsec be used beween an IPsec end-point in
> the enterprise and another in the SP network to tunnel H.323/SIP
> traffic across firewalls? The auth/integrity checking within ESP
> with null encryption should allow for a secure tunnel improving
> enterprise IT confidence. Plus its a standard approach vs. the
> "proprietary' approaches proposed. To address NAT issues, the
> internal IPsec end-point could have a public IP address.

Indeed, it could. In fact, any number of alternate VPN solutions could be
used. I actually get through my nat at home by using a Microsoft VPN to my
corporate network where our proxies and stuff run. The Davies approach is
another form of vpn, if you think about it. 

All of these suffer from the problems of triangle routed media through the
service provider, resulting in the expense of double-erlang bandwidth
provisioning, and high latencies, that I have documented. The point I have
been making, and the point I made continuously during the informal get
together at IETF 51, was that if you are willing to accept these penalties,
there are many VPN solutions today. They have their own issues in terms of
compliance with enterprise firewall policy, but thats another issue I will
comment on separately.

What we need is a solution that does not suffer these problems, and that is
what stun is offering.

- Jonathan R.

---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com


> 
> Saqib
> 
> >From: "Bob Penfield" <bpenfield@acmepacket.com>
> >To: "Barry Scott" <bscott@ridgewaysystems.com>, "'James Ho'" 
> ><jamesho37@hotmail.com>, <midcom@ietf.org>
> >Subject: Re: [midcom] pre-midcom candidates
> >Date: Thu, 1 Nov 2001 11:29:46 -0500
> >
> >What percentage of NAT/FW are symmetric as opposed to full-cone as 
> >described
> >in the STUN proposal? There is some debate whether or not the interim
> >solution needs to address the symmetric NAT problem. If the 
> great majority
> >of existing FW/NAT are symmetric, we probably need to include it now.
> >
> >(-:bob
> >
> >Robert F. Penfield
> >Chief Software Architect
> >Acme Packet, Inc.
> >130 New Boston Street
> >Woburn, MA 01801
> >bpenfield@acmepacket.com
> >
> >----- Original Message -----
> >From: "Barry Scott" <bscott@ridgewaysystems.com>
> >To: "'James Ho'" <jamesho37@hotmail.com>; <midcom@ietf.org>
> >Sent: Thursday, November 01, 2001 9:58 AM
> >Subject: RE: [midcom] pre-midcom candidates
> >
> >
> > > The policy we need turns out to be the default for many
> > > enterprises already.
> > >
> > > Typical behavour is to prevent UDP from the outside
> > > to get inside. But once a UDP packet from the inside
> > > is sent to the outside the firewall will pinhole itself
> > > to allow return traffic. After a period of inactivity
> > > the firewall will close the pinhole, for example after
> > > 45 seconds.
> > >
> > > BArry
> > >
> > > -----Original Message-----
> > > From: James Ho [mailto:jamesho37@hotmail.com]
> > > Sent: 31 October 2001 22:20
> > > To: midcom@ietf.org
> > > Subject: RE: [midcom] pre-midcom candidates
> > >
> > >
> > > As I understand it, the Davies proposal requires an open
> > > UDP port on the firewall for media traversal. I can't think
> > > of many/any enterprises being willing to implement such a
> > > firewall policy. Or maybe my understanding is faulty??
> > >
> > > james
> > >
> > > _________________________________________________________________
> > > Get your FREE download of MSN Explorer at 
> >http://explorer.msn.com/intl.asp
> > >
> > >
> > > _______________________________________________
> > > midcom mailing list
> > > midcom@ietf.org
> > > http://www1.ietf.org/mailman/listinfo/midcom
> > >
> >
> 
> 
> _________________________________________________________________
> Get your FREE download of MSN Explorer at 
http://explorer.msn.com/intl.asp


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 02:39:24 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA27360
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 02:39:18 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id CAA09166
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 02:39:19 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id CAA09142;
	Fri, 2 Nov 2001 02:35:57 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id CAA09111
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 02:35:56 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA27351
	for <midcom@ietf.org>; Fri, 2 Nov 2001 02:35:52 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fA27Y6b7002695;
	Fri, 2 Nov 2001 02:34:06 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <WBWQXN1V>; Fri, 2 Nov 2001 02:35:22 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6D26@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'christopher.a.martin@wcom.com'" <christopher.a.martin@wcom.com>,
        "'James Ho'" <jamesho37@hotmail.com>, bpenfield@acmepacket.com,
        bscott@ridgewaysystems.com, midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates
Date: Fri, 2 Nov 2001 02:35:21 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



 

> -----Original Message-----
> From: Christopher A. Martin [mailto:christopher.a.martin@wcom.com]
> Sent: Thursday, November 01, 2001 1:46 PM
> To: 'James Ho'; bpenfield@acmepacket.com; bscott@ridgewaysystems.com;
> midcom@ietf.org
> Subject: RE: [midcom] pre-midcom candidates
> 
> 
> This would work well for an isolated network (intranet or 
> extranet) but when
> it is desired to allow anyone (Internet) access it would be 
> infeasible to
> provide security associations to the world

Well, one need not do it to the world. Presumably, the VoIP provider would
offer this service to its customers. Then, it only need worry about offering
ip addresses to the customers it has actively online. 


> Also, IPSec doesnt provide security policy enforcement, as a firewall
> typically would on non-IPSec encapsulated packets, merely 
> privacy. When you
> tunnel IPSec through a firewall from endpoints, unless the security
> associations are setup to be granular, the firewall cannot act on the
> packets inside the tunnel.

No, they can't. Thats why it works. But thats also the problem shared by all
the vpn and tunneling solutions; they ultimately work since they help bypass
enterprise firewall policies that might exist.

Stun doesn't do tunneling; if the firewall disallows outbound UDP then you
can't send outbound UDP. It therefore insures that enterprise firewall
policy continues to be obeyed. 

> Also not all firewalls allow IPSec (IP 50 and 51) the ability to pass
> through them.

Pick your favorite vpn. Others get through and work. My favorite remains
RFC3093, which will traverse almost all firewalls and nats.

-Jonathan R.

---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 05:48:31 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA29037
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 05:48:31 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id FAA14063
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 05:48:34 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id FAA14006;
	Fri, 2 Nov 2001 05:45:43 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id FAA13977
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 05:45:41 -0500 (EST)
Received: from rhenium (rhenium.btinternet.com [194.73.73.93])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id FAA29002
	for <midcom@ietf.org>; Fri, 2 Nov 2001 05:45:32 -0500 (EST)
Received: from [213.122.14.30] (helo=tkw)
	by rhenium with smtp (Exim 3.22 #6)
	id 15zbpE-0003dn-00; Fri, 02 Nov 2001 10:45:25 +0000
Message-ID: <004101c16387$c6786bc0$0200000a@tkw>
From: "Pete Cordell" <pete@tech-know-ware.com>
To: "Jonathan Rosenberg" <jdrosen@dynamicsoft.com>,
        <christopher.a.martin@wcom.com>, "'James Ho'" <jamesho37@hotmail.com>,
        <bpenfield@acmepacket.com>, <bscott@ridgewaysystems.com>,
        <midcom@ietf.org>
References: <B65B4F8437968F488A01A940B21982BF020D6D26@DYN-EXCH-001.dynamicsoft.com>
Subject: Re: [midcom] pre-midcom candidates
Date: Fri, 2 Nov 2001 10:18:50 -0000
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Jonathan,

By quoting RFC 3093 as your favourite VPN solution you are really saying
that a standard VPN solution is not appropriate for the job!

Pete.

=============================================
Pete Cordell
Tech-Know-Ware
pete@tech-know-ware.com
+44 1473 635863
=============================================

----- Original Message -----
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: <christopher.a.martin@wcom.com>; 'James Ho' <jamesho37@hotmail.com>;
<bpenfield@acmepacket.com>; <bscott@ridgewaysystems.com>; <midcom@ietf.org>
Sent: 02 November 2001 07:35
Subject: RE: [midcom] pre-midcom candidates


>
>
>
>
> > -----Original Message-----
> > From: Christopher A. Martin [mailto:christopher.a.martin@wcom.com]
> > Sent: Thursday, November 01, 2001 1:46 PM
> > To: 'James Ho'; bpenfield@acmepacket.com; bscott@ridgewaysystems.com;
> > midcom@ietf.org
> > Subject: RE: [midcom] pre-midcom candidates
> >
> >
> > This would work well for an isolated network (intranet or
> > extranet) but when
> > it is desired to allow anyone (Internet) access it would be
> > infeasible to
> > provide security associations to the world
>
> Well, one need not do it to the world. Presumably, the VoIP provider would
> offer this service to its customers. Then, it only need worry about
offering
> ip addresses to the customers it has actively online.
>
>
> > Also, IPSec doesnt provide security policy enforcement, as a firewall
> > typically would on non-IPSec encapsulated packets, merely
> > privacy. When you
> > tunnel IPSec through a firewall from endpoints, unless the security
> > associations are setup to be granular, the firewall cannot act on the
> > packets inside the tunnel.
>
> No, they can't. Thats why it works. But thats also the problem shared by
all
> the vpn and tunneling solutions; they ultimately work since they help
bypass
> enterprise firewall policies that might exist.
>
> Stun doesn't do tunneling; if the firewall disallows outbound UDP then you
> can't send outbound UDP. It therefore insures that enterprise firewall
> policy continues to be obeyed.
>
> > Also not all firewalls allow IPSec (IP 50 and 51) the ability to pass
> > through them.
>
> Pick your favorite vpn. Others get through and work. My favorite remains
> RFC3093, which will traverse almost all firewalls and nats.
>
> -Jonathan R.
>
> ---
> Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
> Chief Scientist                             First Floor
> dynamicsoft                                 East Hanover, NJ 07936
> jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
> http://www.jdrosen.net                      PHONE: (973) 952-5000
> http://www.dynamicsoft.com
>
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 10:21:45 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA07572
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 10:21:44 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id KAA19789
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 10:21:46 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA19732;
	Fri, 2 Nov 2001 10:17:32 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA19703
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 10:17:30 -0500 (EST)
Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA07347
	for <midcom@ietf.org>; Fri, 2 Nov 2001 10:17:27 -0500 (EST)
Received: from BobP [63.67.143.2] by acmepacket.com
  (SMTPD32-7.04) id A90AFE90146; Fri, 02 Nov 2001 10:17:30 -0500
Message-ID: <00d601c163b1$08578840$2300000a@acmepacket.com>
From: "Bob Penfield" <bpenfield@acmepacket.com>
To: "midcom" <midcom@ietf.org>
References: <B65B4F8437968F488A01A940B21982BF020D6C5F@DYN-EXCH-001.dynamicsoft.com>
Subject: Re: [midcom] pre-midcom candidates
Date: Fri, 2 Nov 2001 10:14:12 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="Windows-1252"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Hi all,

I just want to throw my hat into the ring as a supporter of the STUN
proposal.

It is very simple and will be relatively easy to implement directly in
endpoints. It requires no state in the server side. It adheres to the
security policy of the firewall/NAT owner.

With STUN as a basic tool, more complex solutions can be developed. It could
even be used to implement much of the Davies proposal.

I do think we need to address the symmetric NAT problem soon.

The Sen proposal seems too narrow in its focus on SIP and RTP. It also
includes a midcom-like component in the protocol between the SIP element and
the RTP proxy. To standardize this approach we would need to standardize the
RTP proxy control protocol and we would virtually have midcom. The RTP proxy
is just a specialized NAT middlebox.

There are number of things I find troubling about the Davies proposal:

- The tunneling of the signaling through the firewall verges on subverting
the security policy of the firewall owner. As others have stated, existing
VPN methods can do this today. I also think that outbound TCP connections
for signaling can work in most cases.

- The protocol that would be required to implement this solution seems to be
too complex. I counted 12 methods. It seems to be as complex, if not more
so, than midcom will need to be. How long will it take to devise and
standardize it? Based on the claims of the draft, Ridgeway has devised this
protocol, but have they published the details? Given the complexity, it will
be more difficult and costly to develop endpoints that support it. Given
that, intermediate devices will be needed until all the endpoints support
it, which again increases the cost of deploying VOIP and other applications.

I think STUN is the best alternative for an easy, quick, and cost effective
solution for NAT/FW that will allow for wider deployment of VOIP and other
applications. It provides an interim solution until midcom is completed and
also is useful in the long term for scenarios where midcom is not
appropriate.

cheers,
(-:bob

Robert F. Penfield
Chief Software Architect
Acme Packet, Inc.
130 New Boston Street
Woburn, MA 01801
bpenfield@acmepacket.com



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 10:37:35 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA08112
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 10:37:35 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id KAA20399
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 10:37:37 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA20113;
	Fri, 2 Nov 2001 10:30:24 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA20084
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 10:30:22 -0500 (EST)
Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA07918
	for <midcom@ietf.org>; Fri, 2 Nov 2001 10:30:19 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fA2FTqT23192;
	Fri, 2 Nov 2001 07:29:52 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABV23867;
	Fri, 2 Nov 2001 07:29:22 -0800 (PST)
Message-Id: <5.1.0.14.0.20011102102741.00a5dec0@mira-sjc5-4.cisco.com>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Fri, 02 Nov 2001 10:30:50 -0500
To: Mark Duffy <mduffy@quarrytech.com>, midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Subject: Re: [midcom] Current status
In-Reply-To: <3.0.5.32.20011102002139.00820510@email.quarrytech.com>
References: <5.1.0.14.0.20011031174517.00a5b0c0@mira-sjc5-4.cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 12:21 AM 11/2/01 -0500, Mark Duffy wrote:
>The framework draft basically decides not to address this (section 5.0
>first paragraph, and section 9 first paragraph).  We have the Aoun/Sen,
>Penfield, and Molitor drafts from August that seem to support about that
>same conclusion: the ability to support complex topologies is basically
>limited by the topology knowledge the agent has available.  

The guidance from above right now seems to be "punt."  This is
likely to come up during the rechartering discussions; more on
that later.

In the meantime, many many many thanks to those who have gone
through the framework document and provided feedback.  We need
to get this thing closed.

Melinda



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 11:03:25 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA08797
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 11:03:25 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA21258
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 11:03:27 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA21031;
	Fri, 2 Nov 2001 11:00:42 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA20997
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 11:00:40 -0500 (EST)
Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA08673
	for <midcom@ietf.org>; Fri, 2 Nov 2001 11:00:37 -0500 (EST)
Received: from BobP [63.67.143.2] by acmepacket.com
  (SMTPD32-7.04) id A3243E690146; Fri, 02 Nov 2001 11:00:36 -0500
Message-ID: <017501c163b7$0b325ee0$2300000a@acmepacket.com>
From: "Bob Penfield" <bpenfield@acmepacket.com>
To: "Mark Duffy" <mduffy@quarrytech.com>, <midcom@ietf.org>,
        "Melinda Shore" <mshore@cisco.com>
References: <5.1.0.14.0.20011031174517.00a5b0c0@mira-sjc5-4.cisco.com> <5.1.0.14.0.20011102102741.00a5dec0@mira-sjc5-4.cisco.com>
Subject: Re: [midcom] Current status
Date: Fri, 2 Nov 2001 10:57:15 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Mark & Melinda,

I am satisfied with our current requirement (R82) which does not preclude
additional information/criteria in the filtering rules.

cheers,
(-:bob

Robert F. Penfield
Chief Software Architect
Acme Packet, Inc.
130 New Boston Street
Woburn, MA 01801
bpenfield@acmepacket.com

----- Original Message -----
From: "Melinda Shore" <mshore@cisco.com>
To: "Mark Duffy" <mduffy@quarrytech.com>; <midcom@ietf.org>
Sent: Friday, November 02, 2001 10:30 AM
Subject: Re: [midcom] Current status


> At 12:21 AM 11/2/01 -0500, Mark Duffy wrote:
> >The framework draft basically decides not to address this (section 5.0
> >first paragraph, and section 9 first paragraph).  We have the Aoun/Sen,
> >Penfield, and Molitor drafts from August that seem to support about that
> >same conclusion: the ability to support complex topologies is basically
> >limited by the topology knowledge the agent has available.
>
> The guidance from above right now seems to be "punt."  This is
> likely to come up during the rechartering discussions; more on
> that later.
>
> In the meantime, many many many thanks to those who have gone
> through the framework document and provided feedback.  We need
> to get this thing closed.
>
> Melinda
>
>
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
>


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 11:35:42 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA10650
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 11:35:41 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA22510
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 11:35:41 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA22396;
	Fri, 2 Nov 2001 11:32:36 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA22370
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 11:32:35 -0500 (EST)
Received: from qtech1.quarrytech.com (email.quarrytech.com [4.17.144.4])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA10418
	for <midcom@ietf.org>; Fri, 2 Nov 2001 11:32:32 -0500 (EST)
Received: from MDUFFY ([10.1.3.114]) by qtech1.quarrytech.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id 49ZFC4QK; Fri, 2 Nov 2001 11:32:04 -0500
Message-Id: <3.0.5.32.20011102113046.007bee20@email.quarrytech.com>
X-Sender: mduffy@email.quarrytech.com
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Fri, 02 Nov 2001 11:30:46 -0500
To: "Bob Penfield" <bpenfield@acmepacket.com>, <midcom@ietf.org>,
        "Melinda Shore" <mshore@cisco.com>
From: Mark Duffy <mduffy@quarrytech.com>
Subject: Re: [midcom] Current status
In-Reply-To: <017501c163b7$0b325ee0$2300000a@acmepacket.com>
References: <5.1.0.14.0.20011031174517.00a5b0c0@mira-sjc5-4.cisco.com>
 <5.1.0.14.0.20011102102741.00a5dec0@mira-sjc5-4.cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Hi Bob,

R82 makes the ruleset extensible.  I think your point is that this allows
extension to specify interfaces/realms/in/out/etc.  Of course that does not
help the agent with knowing what middleboxes are there and which to talk to. 

AFAIK discovery has never been in the charter and Melinda's message below
seems to confirm this now.  Ok with me for the time being, I just wanted to
verify that this was still the case, as it was not abundantly obvious to me
after we had the whole "topology issue" going on.  :-)

-Mark

At 10:57 AM 11/2/01 -0500, Bob Penfield wrote:
>Mark & Melinda,
>
>I am satisfied with our current requirement (R82) which does not preclude
>additional information/criteria in the filtering rules.
>
>cheers,
>(-:bob
...
>----- Original Message -----
>From: "Melinda Shore" <mshore@cisco.com>
>To: "Mark Duffy" <mduffy@quarrytech.com>; <midcom@ietf.org>
>Sent: Friday, November 02, 2001 10:30 AM
>Subject: Re: [midcom] Current status
>
>
>> At 12:21 AM 11/2/01 -0500, Mark Duffy wrote:
>> >The framework draft basically decides not to address this (section 5.0
>> >first paragraph, and section 9 first paragraph).  We have the Aoun/Sen,
>> >Penfield, and Molitor drafts from August that seem to support about that
>> >same conclusion: the ability to support complex topologies is basically
>> >limited by the topology knowledge the agent has available.
>>
>> The guidance from above right now seems to be "punt."  This is
>> likely to come up during the rechartering discussions; more on
>> that later.
>>
>> In the meantime, many many many thanks to those who have gone
>> through the framework document and provided feedback.  We need
>> to get this thing closed.
>>
>> Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 12:34:00 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12587
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 12:34:00 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA24970
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 12:34:03 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA24589;
	Fri, 2 Nov 2001 12:28:17 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA24538
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 12:28:15 -0500 (EST)
Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12410
	for <midcom@ietf.org>; Fri, 2 Nov 2001 12:28:11 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fA2HRgT20578;
	Fri, 2 Nov 2001 09:27:43 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABV26918;
	Fri, 2 Nov 2001 09:27:13 -0800 (PST)
Message-Id: <5.1.0.14.0.20011102122448.00a65910@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Fri, 02 Nov 2001 12:29:58 -0500
To: Mark Duffy <mduffy@quarrytech.com>,
        "Bob Penfield" <bpenfield@acmepacket.com>, <midcom@ietf.org>
From: Melinda Shore <mshore@cisco.com>
Subject: Re: [midcom] Current status
In-Reply-To: <3.0.5.32.20011102113046.007bee20@email.quarrytech.com>
References: <017501c163b7$0b325ee0$2300000a@acmepacket.com>
 <5.1.0.14.0.20011031174517.00a5b0c0@mira-sjc5-4.cisco.com>
 <5.1.0.14.0.20011102102741.00a5dec0@mira-sjc5-4.cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 11:30 AM 11/2/01 -0500, Mark Duffy wrote:
>R82 makes the ruleset extensible.  I think your point is that this allows
>extension to specify interfaces/realms/in/out/etc.  Of course that does not
>help the agent with knowing what middleboxes are there and which to talk to. 

Exactly.  The whole topology thing is fundamentally out-of-
scope.  It came up because of what were probably unnecessarily
detailed discussions about precisely what information is known
by which element, etc.  That's not to say that those discussions
were unimportant or irrelevant - they weren't, and whether the
topology discussions are reflected in the deliverables for this
iteration of the working group or not they'll bear on the
deliverables for the rechartered working group.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 15:13:14 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA17029
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 15:13:12 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA28824
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 15:13:13 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA28765;
	Fri, 2 Nov 2001 15:09:12 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA28737
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 15:09:10 -0500 (EST)
Received: from hotmail.com (f110.pav1.hotmail.com [64.4.31.110])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA16919
	for <midcom@ietf.org>; Fri, 2 Nov 2001 15:09:08 -0500 (EST)
Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
	 Fri, 2 Nov 2001 12:08:41 -0800
Received: from 207.5.1.168 by pv1fd.pav1.hotmail.msn.com with HTTP;
	Fri, 02 Nov 2001 20:08:40 GMT
X-Originating-IP: [207.5.1.168]
From: "James Ho" <jamesho37@hotmail.com>
To: jdrosen@dynamicsoft.com, christopher.a.martin@wcom.com,
        bpenfield@acmepacket.com, bscott@ridgewaysystems.com, midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates
Date: Fri, 02 Nov 2001 12:08:40 -0800
Mime-Version: 1.0
Content-Type: text/plain; format=flowed
Message-ID: <F1105cMWU9CE0hjqB8Z000224a4@hotmail.com>
X-OriginalArrivalTime: 02 Nov 2001 20:08:41.0240 (UTC) FILETIME=[2AA28980:01C163DA]
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Two points. First, other then performance/latency issues
(which I'd like to learn more about), I can't understand
what is different about protocols targeted by midcom vs.
protocols that have been and are securely supported by IPsec
for firewall traversal. The whole pt of having standards
such as Ipsec is that ITs confidence in allowing such protocols
to be securely used is enhanced due to their standard status. I'm not
sure defining new standards and/or proliferation of new
protocols (especially for the focused purpose of firewall traversal
of a specific set of media protocols) is going to enhance IT confidence
or making security policy-setting easier.

Finally, regarding performance, as I said earlier, the IP
storage folks have standardized on IPsec as a mandatory
component for authentication and integrity checking for iSCSI,
FCIP, and iFCP protocols. These protocols have very stringent
*round-trip* latency requirements, so it would behoove this
group to carefully look at if the performance requirements of
H.323/SIP are significantly different so as to justify
standardizing on a new protocol.

james


>From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
>To: "'christopher.a.martin@wcom.com'" <christopher.a.martin@wcom.com>,   
>"'James Ho'" <jamesho37@hotmail.com>, bpenfield@acmepacket.com,   
>bscott@ridgewaysystems.com, midcom@ietf.org
>Subject: RE: [midcom] pre-midcom candidates
>Date: Fri, 2 Nov 2001 02:35:21 -0500
>
>
>
>
>
> > -----Original Message-----
> > From: Christopher A. Martin [mailto:christopher.a.martin@wcom.com]
> > Sent: Thursday, November 01, 2001 1:46 PM
> > To: 'James Ho'; bpenfield@acmepacket.com; bscott@ridgewaysystems.com;
> > midcom@ietf.org
> > Subject: RE: [midcom] pre-midcom candidates
> >
> >
> > This would work well for an isolated network (intranet or
> > extranet) but when
> > it is desired to allow anyone (Internet) access it would be
> > infeasible to
> > provide security associations to the world
>
>Well, one need not do it to the world. Presumably, the VoIP provider would
>offer this service to its customers. Then, it only need worry about 
>offering
>ip addresses to the customers it has actively online.
>
>
> > Also, IPSec doesnt provide security policy enforcement, as a firewall
> > typically would on non-IPSec encapsulated packets, merely
> > privacy. When you
> > tunnel IPSec through a firewall from endpoints, unless the security
> > associations are setup to be granular, the firewall cannot act on the
> > packets inside the tunnel.
>
>No, they can't. Thats why it works. But thats also the problem shared by 
>all
>the vpn and tunneling solutions; they ultimately work since they help 
>bypass
>enterprise firewall policies that might exist.
>
>Stun doesn't do tunneling; if the firewall disallows outbound UDP then you
>can't send outbound UDP. It therefore insures that enterprise firewall
>policy continues to be obeyed.
>
> > Also not all firewalls allow IPSec (IP 50 and 51) the ability to pass
> > through them.
>
>Pick your favorite vpn. Others get through and work. My favorite remains
>RFC3093, which will traverse almost all firewalls and nats.
>
>-Jonathan R.
>
>---
>Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
>Chief Scientist                             First Floor
>dynamicsoft                                 East Hanover, NJ 07936
>jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
>http://www.jdrosen.net                      PHONE: (973) 952-5000
>http://www.dynamicsoft.com
>


_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 15:56:01 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA17887
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 15:56:01 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA29586
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 15:56:02 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA29392;
	Fri, 2 Nov 2001 15:43:02 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA29363
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 15:43:00 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA17572
	for <midcom@ietf.org>; Fri, 2 Nov 2001 15:42:53 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fA2KgVX21737;
	Fri, 2 Nov 2001 12:42:31 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABV35023;
	Fri, 2 Nov 2001 12:35:53 -0800 (PST)
Message-Id: <5.1.0.14.0.20011102151726.00a67990@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Fri, 02 Nov 2001 15:38:25 -0500
To: "James Ho" <jamesho37@hotmail.com>, midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] pre-midcom candidates
In-Reply-To: <F1105cMWU9CE0hjqB8Z000224a4@hotmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 12:08 PM 11/2/01 -0800, James Ho wrote:
>The whole pt of having standards
>such as Ipsec is that ITs confidence in allowing such protocols
>to be securely used is enhanced due to their standard status. I'm not
>sure defining new standards and/or proliferation of new
>protocols (especially for the focused purpose of firewall traversal
>of a specific set of media protocols) is going to enhance IT confidence
>or making security policy-setting easier.

If we must have this discussion (and I'd really rather we
didn't - the working group was chartered some time ago under
considerable scrutiny and we've nearly finished our work), we
should start with the understanding that nobody is saying "never
tunnel" and that we're not trying to supplant mechanisms that
work.  Midcom is a response to well-understood situations in which
tunneling will *not* work or will work badly.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 18:53:31 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA22008
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 18:53:31 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id SAA04753
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 18:53:34 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA04734;
	Fri, 2 Nov 2001 18:51:15 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA04706
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 18:51:13 -0500 (EST)
Received: from hotmail.com (f73.pav1.hotmail.com [64.4.31.73])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA21997
	for <midcom@ietf.org>; Fri, 2 Nov 2001 18:51:10 -0500 (EST)
Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
	 Fri, 2 Nov 2001 15:50:43 -0800
Received: from 207.5.1.168 by pv1fd.pav1.hotmail.msn.com with HTTP;
	Fri, 02 Nov 2001 23:50:43 GMT
X-Originating-IP: [207.5.1.168]
From: "James Ho" <jamesho37@hotmail.com>
To: mshore@cisco.com, midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates
Date: Fri, 02 Nov 2001 15:50:43 -0800
Mime-Version: 1.0
Content-Type: text/plain; format=flowed
Message-ID: <F73upeoPzF1yBgD2nfT000227a6@hotmail.com>
X-OriginalArrivalTime: 02 Nov 2001 23:50:43.0478 (UTC) FILETIME=[2F4EBB60:01C163F9]
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

My earlier e-mail was only regarding the pre-midcom drafts
(i.e. the requirements for the new midcom framework are clear while
I'm not clear on the need to come up with a new protocol standard
vs. use of an existing protocol standard for the pre-midcom work).
Sorry if I'm bringing up issues that may have been hashedout before.

Saqib

>From: Melinda Shore <mshore@cisco.com>
>To: "James Ho" <jamesho37@hotmail.com>, midcom@ietf.org
>Subject: RE: [midcom] pre-midcom candidates
>Date: Fri, 02 Nov 2001 15:38:25 -0500
>
>At 12:08 PM 11/2/01 -0800, James Ho wrote:
> >The whole pt of having standards
> >such as Ipsec is that ITs confidence in allowing such protocols
> >to be securely used is enhanced due to their standard status. I'm not
> >sure defining new standards and/or proliferation of new
> >protocols (especially for the focused purpose of firewall traversal
> >of a specific set of media protocols) is going to enhance IT confidence
> >or making security policy-setting easier.
>
>If we must have this discussion (and I'd really rather we
>didn't - the working group was chartered some time ago under
>considerable scrutiny and we've nearly finished our work), we
>should start with the understanding that nobody is saying "never
>tunnel" and that we're not trying to supplant mechanisms that
>work.  Midcom is a response to well-understood situations in which
>tunneling will *not* work or will work badly.
>
>Melinda
>


_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  2 19:03:32 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA22121
	for <midcom-archive@odin.ietf.org>; Fri, 2 Nov 2001 19:03:32 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id TAA05206
	for midcom-archive@odin.ietf.org; Fri, 2 Nov 2001 19:03:33 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA05163;
	Fri, 2 Nov 2001 19:01:24 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA05131
	for <midcom@optimus.ietf.org>; Fri, 2 Nov 2001 19:01:23 -0500 (EST)
Received: from yamato.ccrle.nec.de (yamato.ccrle.nec.de [195.37.70.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA22093
	for <midcom@ietf.org>; Fri, 2 Nov 2001 19:01:20 -0500 (EST)
Received: from wallace.heidelberg.ccrle.nec.de (root@wallace.heidelberg.ccrle.nec.de [192.168.102.1])
	by yamato.ccrle.nec.de (8.11.3/8.10.1) with ESMTP id fA303Xf48286;
	Sat, 3 Nov 2001 01:03:33 +0100 (CET)
Received: from [192.168.102.22] ([192.168.102.22])
	by wallace.heidelberg.ccrle.nec.de (8.9.3/8.9.3/SuSE Linux 8.9.3-0.1) with ESMTP id BAA20785;
	Sat, 3 Nov 2001 01:01:23 +0100
Date: Sat, 03 Nov 2001 01:02:46 +0100
From: Juergen Quittek <quittek@ccrle.nec.de>
To: midcom@ietf.org
cc: stiemerling@ccrle.nec.de
Message-ID: <4021986412.1004749366@[192.168.102.22]>
X-Mailer: Mulberry/2.0.8 (Win32)
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Content-Transfer-Encoding: 7bit
Subject: [midcom] very simple midcom-type protocol
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

We have submitted an Internet draft on the Simple NAT and
Firewall Control (SNFC) protocol. Until it is available
at the I-D repository, you can find it at
http://www.ibr.cs.tu-bs.de/~quittek/draft-stiemerling-nat-fw-config-00.txt

We will implement the SNFC protocol for the SOCKS firewall
software.

Our intention is to contribute to the current discussion on
midcom requirements by emphasizing the principle of KISS.

We are aware of the fact that SNFC does not meet all
requirements currently under discussion. However, we believe
that also a simple approach like ours can be very useful
in many situations where middlebox control is desired.

    Juergen
-- 
Juergen Quittek     quittek@ccrle.nec.de     Tel: +49 6221 90511-15
NEC Europe Ltd.,    Network Laboratories     Fax: +49 6221 90511-55
Adenauerplatz 6, 69115 Heidelberg, Germany   http://www.ccrle.nec.de

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov  5 02:31:32 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id CAA08831
	for <midcom-archive@odin.ietf.org>; Mon, 5 Nov 2001 02:31:31 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id CAA26879
	for midcom-archive@odin.ietf.org; Mon, 5 Nov 2001 02:31:33 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id CAA26468;
	Mon, 5 Nov 2001 02:17:22 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id CAA26439
	for <midcom@optimus.ietf.org>; Mon, 5 Nov 2001 02:17:20 -0500 (EST)
Received: from web13802.mail.yahoo.com (web13802.mail.yahoo.com [216.136.175.12])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id CAA08731
	for <midcom@ietf.org>; Mon, 5 Nov 2001 02:17:18 -0500 (EST)
Message-ID: <20011105071721.34555.qmail@web13802.mail.yahoo.com>
Received: from [65.12.33.187] by web13802.mail.yahoo.com via HTTP; Sun, 04 Nov 2001 23:17:21 PST
Date: Sun, 4 Nov 2001 23:17:21 -0800 (PST)
From: Pyda Srisuresh <srisuresh@yahoo.com>
Subject: Re: [midcom] Rev4 of MIDCOM Architecture & framework document
To: Mark Duffy <mduffy@quarrytech.com>, midcom@ietf.org
In-Reply-To: <3.0.5.32.20011102002146.008f6a90@email.quarrytech.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org


--- Mark Duffy <mduffy@quarrytech.com> wrote:
> Thank you Suresh, here are my comments.
> These are just suggestions on the document, not I think on the fundamental
> concepts.  -- Mark.
> 
OK.
> 
> Section 2.15 -- definition of "Ruleset".  I recommend we remove the second
> paragraph:
>    Ruleset specifies the dynamic resources (i.e., Filter Specs,
>    Action Specs, Ruleset type, Timeout values etc.) that maybe
>    communicated through the MIDCOM protocol.
> I don't think it adds much to the definition, and it introduces another new
> undefined term ("resources").  There was some discussion of removing this
> on the list 4 Oct.
> 

The above sentence is meant to provide the context in which the term is
applicable. SO, I will simply replace the above sentence as follows to avoid
adding new terms.

    Rulesets are communicated through the Midcom protocol.

> Section 6.0 -- policy server.  In the third paragraph it states
>    The policy server acts in an advisory capacity to a middlebox to
>    authorize or terminate authorization for an agent to gain 
>    connectivity to the middlebox. The primary objective of a policy
> I think "gain connectivity to the middlebox" is a fairly imprecise wording.
>  Section 2.9 (policy server definition) has more/better description than
> this section 6.0.  Perhaps some of that can be moved here and replace some
> of 6.0. 

Hope the following rewording will work for you.

  The policy server acts in an advisory capacity to a middlebox to
  authorize or terminate authorization for an agent attempting
  connectivity to the middlebox.

>         BTW my understanding, and I can read this into the section 2.9
> description but it is not unambiguously stated there, that the policy
> server may govern which agents may establish midcom sessions with the
> middlebox *and also* restrict what Rulesets a given agent may manipulate.
> No?  Perhaps we can clarify that.

Mark -Please refer paragraph 2 of section 6.2. The docoument cannot be 
an exhaustive list of all the items people want to include in a policy
server. The paragraph lists items that may be included, but not limited
to these.

> 
> Section 6.2 -- registration.  The first paragraph explains that
> registration is different than establishing a session.  The phrase
> "transport session" is used several times in this paragraph.  I suggest
> that the first two uses should be replaced with the recently defined term
> "Midcom session".
> 
OK.

> Section 6.2.  The third paragraph seems confusing.  Also, it discusses
> either the agent or the middlebox initiating the midcom session.  My
> understanding from the requirements discussion etc. is that we have come
> around to only the agent initiating the session.  I suggest modifying the
> paragraph as follows:
>    The MIDCOM agent profile may be pre-configured on the middlebox while
>    provisioning the middlebox function. Thereafter, the agent may choose
>    to initiate a Midcom session prior to any data traffic. Alternatively,
>    it may choose to initiate a Midcom session only upon noticing the
>    application specific traffic. 
> 
You are right about the client-server conclusion. Only an agent is assumed
initiate the session. So, the first 2 sentences make sense. 

But, the last sentence is perhaps meaningless in the context of
client-server communication. How does a MIDCOM agent notice application
specific traffic, without the middlebox informing it? A middlebox will
not know to notify an agent it is not in session with. So, I will remove
the last sentence.

> Section 6.2.  The 4th paragraph discusses "Coupling MIDCOM agents with the
> middlebox ruleset".  I'm not sure what that coupling refers to.  Can we
> clarify this?
> 

The coupling (or preconfiguring) of Midcom agents with Filter Spec was 
described when a middlebox is permitted to initiate a session with an 
agent. When an Agent is preconfigured to be associated with a Filter Spec, 
the middlebox knows to invoke the agent for the first packet
matching the Filter Spec. 

Now, I understand, a decision has been made by the WG that the MIDCOM 
protocol should be client-server type and not peer-to-peer. Sorry, 
I wasnt able to participate in the discussion at the time. So, I will
go along with the WG decision.

In the revised light of client-server type communication, I believe,
the coupling of an Agent with Filter Spec is still relevant in that 
it refers to agent authorization policy (i.e., session tuples for 
which the agent is authorized to act as ALG) on the middlebox. I could
reword the paragraph as follows. 

   MIDCOM agent authorization policy may be preconfigured on a
   middlebox, by specifying the agent in conjunction with Filter Spec
   for a middlebox service. In the case of a firewall, for example, the 
   ACL tuple may be altered to reflect the optional Agent presence.
   The revised ACL may look something like the following.   

   (<Session-Direction>, <Source-Address>, <Destination-Address>, 
   <IP-Protocol>, <Source-Port>, <Destination-Port>, <Agent>)
 
> Section 6.2.  The seventh paragraph is confusing, and again contains the
> concept of the middlebox initiating the midcom session.  Since the main
> purpose of this paragraph (I think) is to point out that the agent
> information may be provisioned into a policy server rather than the
> middlebox, and we've said that above, I suggest just omitting this paragraph.
> 

This is about session termination (not initiation). SO, I dont believe
there should be any confusion about middlebox initiating the MIDCOM session.
Anyways, I am OK with dropping the paragraph.

> Section 6.2, 8th paragraph.  The first seven lines here are about midcom
> session disconnection and have nothing to do with
> registration/deregistration.  Since they cover material already presented
> in section 4, I suggest deleting them.
> 
OK.

> Section 11-security considerations.  The first paragraph points out some
> deleterious effects of middleboxes on security protocols.  The second
> paragraph seems to state that midcom can fix all this because the middlebox
> will no longer need to inspect or modify data.  The text should acknowledge
> that the midcom model does not help with the problem of NAT breaking IPsec
> since in this case the middlebox still modifies data that matters.
> 
OK. I will add the following sentence at the end of second paragraph.

   Note, however, the MIDCOM framework does not help with the problem 
   of NAT breaking IPsec since in this case the middlebox still modifies
   IP and transport headers.

regards,
suresh

=====


__________________________________________________
Do You Yahoo!?
Find a job, post your resume.
http://careers.yahoo.com

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov  5 10:15:36 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA22421
	for <midcom-archive@odin.ietf.org>; Mon, 5 Nov 2001 10:15:36 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id KAA12919
	for midcom-archive@odin.ietf.org; Mon, 5 Nov 2001 10:15:37 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA12417;
	Mon, 5 Nov 2001 10:01:19 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA12389
	for <midcom@optimus.ietf.org>; Mon, 5 Nov 2001 10:01:17 -0500 (EST)
Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA21866
	for <midcom@ietf.org>; Mon, 5 Nov 2001 10:01:15 -0500 (EST)
Received: from smtprch2.nortel.com (erchg0k.us.nortel.com [47.113.64.104])
	by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id JAA07210
	for <midcom@ietf.org>; Mon, 5 Nov 2001 09:00:40 -0600 (CST)
Received: from zrchb200.us.nortel.com by smtprch2.nortel.com;
          Mon, 5 Nov 2001 08:52:58 -0600
Received: by zrchb200.us.nortel.com with Internet Mail Service (5.5.2653.19) 
          id <VPB2329C>; Mon, 5 Nov 2001 08:58:57 -0600
Message-ID: <933FADF5E673D411B8A30002A5608A0E06F2AC@zrc2c012.us.nortel.com>
From: "Sanjoy Sen" <sanjoy@nortelnetworks.com>
To: "'Bob Penfield'" <bpenfield@acmepacket.com>, midcom <midcom@ietf.org>
Cc: "Sanjoy Sen" <sanjoy@nortelnetworks.com>
Subject: RE: [midcom] pre-midcom candidates
Date: Mon, 5 Nov 2001 08:58:49 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
              boundary="----_=_NextPart_001_01C1660A.6061C1D0"
X-Orig: <sanjoy@americasm01.nt.com>
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1660A.6061C1D0
Content-Type: text/plain;
	charset="windows-1252"



> -----Original Message-----
> From: Bob Penfield [mailto:bpenfield@acmepacket.com]
> Sent: Friday, November 02, 2001 9:14 AM
> To: midcom
> Subject: Re: [midcom] pre-midcom candidates
> 
> 
> 
...
> 
> I do think we need to address the symmetric NAT problem soon.
> 
> The Sen proposal seems too narrow in its focus on SIP and RTP. It also
> includes a midcom-like component in the protocol between the 
> SIP element and
> the RTP proxy. To standardize this approach we would need to 
> standardize the
> RTP proxy control protocol and we would virtually have 
> midcom. The RTP proxy
> is just a specialized NAT middlebox.

As far as standardization, the only requirement in the Sen proposal is the
option tag (indicating to the Proxy that the client is behind the NAT) for
the signaling path. For the RTP Proxy control, a device control protocol
such as Megaco or MGCP can be used as is, i.e. there's no standardization
effort required. For traditional Firewall/NAT control (Midcom), Megaco needs
to be extended as has been described in:
http://search.ietf.org/internet-drafts/draft-sct-midcom-megaco-00.txt
http://search.ietf.org/internet-drafts/draft-sct-midcom-megaco-pkg-00.txt

The Sen proposal is as close to Midcom as it gets & is the simplest of the
three proposals. The proposal primarily addresses the needs of different
(albeit, overlapping) market segments than STUN. STUN is useful for
residential and perhaps some small/medium Enterprise scenarios, where Cone
type of NAT's predominate. The Media Proxy is the ideal candidate for
medium/large Enterprise and Carrier service providers. Not only the
predominant FW/NAT configuration for medium/large Enterprises mimick the
symmetric NAT behavior, but the signaling/media Proxy combination provides
some key advantages in terms of route-pinning and service management (e.g.,
billing, legal intercept) for service providers, carriers.  

Thanks, 
Sanjoy

================================
Interactive Multimedia Server
Carrier VoIP
Nortel Networks
Ph: 972-685-8274, Fax: 972-685-3813
Mobile: 972-571-2062




------_=_NextPart_001_01C1660A.6061C1D0
Content-Type: text/html;
	charset="windows-1252"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dwindows-1252">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2654.89">
<TITLE>RE: [midcom] pre-midcom candidates</TITLE>
</HEAD>
<BODY>
<BR>
<BR>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Bob Penfield [<A =
HREF=3D"mailto:bpenfield@acmepacket.com">mailto:bpenfield@acmepacket.com=
</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Friday, November 02, 2001 9:14 AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: midcom</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [midcom] pre-midcom =
candidates</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>...</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I do think we need to address the symmetric NAT =
problem soon.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; The Sen proposal seems too narrow in its focus =
on SIP and RTP. It also</FONT>
<BR><FONT SIZE=3D2>&gt; includes a midcom-like component in the =
protocol between the </FONT>
<BR><FONT SIZE=3D2>&gt; SIP element and</FONT>
<BR><FONT SIZE=3D2>&gt; the RTP proxy. To standardize this approach we =
would need to </FONT>
<BR><FONT SIZE=3D2>&gt; standardize the</FONT>
<BR><FONT SIZE=3D2>&gt; RTP proxy control protocol and we would =
virtually have </FONT>
<BR><FONT SIZE=3D2>&gt; midcom. The RTP proxy</FONT>
<BR><FONT SIZE=3D2>&gt; is just a specialized NAT middlebox.</FONT>
</P>

<P><FONT SIZE=3D2>As far as standardization, the only requirement in =
the Sen proposal is the option tag (indicating to the Proxy that the =
client is behind the NAT) for the signaling path. For the RTP Proxy =
control, a device control protocol such as Megaco or MGCP can be used =
as is, i.e. there's no standardization effort required. For traditional =
Firewall/NAT control (Midcom), Megaco needs to be extended as has been =
described in:</FONT></P>

<P><FONT SIZE=3D2><A =
HREF=3D"http://search.ietf.org/internet-drafts/draft-sct-midcom-megaco-0=
0.txt" =
TARGET=3D"_blank">http://search.ietf.org/internet-drafts/draft-sct-midco=
m-megaco-00.txt</A></FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://search.ietf.org/internet-drafts/draft-sct-midcom-megaco-p=
kg-00.txt" =
TARGET=3D"_blank">http://search.ietf.org/internet-drafts/draft-sct-midco=
m-megaco-pkg-00.txt</A></FONT>
</P>

<P><FONT SIZE=3D2>The Sen proposal is as close to Midcom as it gets =
&amp; is the simplest of the three proposals. The proposal primarily =
addresses the needs of different (albeit, overlapping) market segments =
than STUN. STUN is useful for residential and perhaps some small/medium =
Enterprise scenarios, where Cone type of NAT's predominate. The Media =
Proxy is the ideal candidate for medium/large Enterprise and Carrier =
service providers. Not only the predominant FW/NAT configuration for =
medium/large Enterprises mimick the symmetric NAT behavior, but the =
signaling/media Proxy combination provides some key advantages in terms =
of route-pinning and service management (e.g., billing, legal =
intercept) for service providers, carriers.&nbsp; </FONT></P>

<P><FONT SIZE=3D2>Thanks, </FONT>
<BR><FONT SIZE=3D2>Sanjoy</FONT>
</P>

<P><FONT =
SIZE=3D2>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</FONT>
<BR><FONT SIZE=3D2>Interactive Multimedia Server</FONT>
<BR><FONT SIZE=3D2>Carrier VoIP</FONT>
<BR><FONT SIZE=3D2>Nortel Networks</FONT>
<BR><FONT SIZE=3D2>Ph: 972-685-8274, Fax: 972-685-3813</FONT>
<BR><FONT SIZE=3D2>Mobile: 972-571-2062</FONT>
</P>
<BR>
<BR>

</BODY>
</HTML>
------_=_NextPart_001_01C1660A.6061C1D0--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov  6 00:51:18 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA17316
	for <midcom-archive@odin.ietf.org>; Tue, 6 Nov 2001 00:51:18 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id AAA05779
	for midcom-archive@odin.ietf.org; Tue, 6 Nov 2001 00:51:18 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA05668;
	Tue, 6 Nov 2001 00:42:06 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA05643
	for <midcom@optimus.ietf.org>; Tue, 6 Nov 2001 00:42:04 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA17230
	for <midcom@ietf.org>; Tue, 6 Nov 2001 00:42:04 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fA65eCVW007223;
	Tue, 6 Nov 2001 00:40:12 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <WBWQXVH6>; Tue, 6 Nov 2001 00:41:30 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6D79@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'James Ho'" <jamesho37@hotmail.com>, mshore@cisco.com, midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates
Date: Tue, 6 Nov 2001 00:41:28 -0500 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



 

> -----Original Message-----
> From: James Ho [mailto:jamesho37@hotmail.com]
> Sent: Friday, November 02, 2001 6:51 PM
> To: mshore@cisco.com; midcom@ietf.org
> Subject: RE: [midcom] pre-midcom candidates
> 
> 
> My earlier e-mail was only regarding the pre-midcom drafts
> (i.e. the requirements for the new midcom framework are clear while
> I'm not clear on the need to come up with a new protocol standard
> vs. use of an existing protocol standard for the pre-midcom work).
> Sorry if I'm bringing up issues that may have been hashedout before.

THis is indeed a good question, and its the point I have been trying to
make. There are a variety of VPN solutions, and many of them allow
applications to traverse nat. There are drawbacks of the VPN solutions -
increased latency and increased data traffic to the provider. Any solution
which retains these drawbacks is just going to define yet-another VPN
approach, and its not clear what the value of that is. There IS immmediate
value in a solution that does not suffer these problems, and therefore does
something different from VPN will do. That is the point to the stun
proposal.

-Jonathan R.

---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov  6 15:39:42 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA02592
	for <midcom-archive@odin.ietf.org>; Tue, 6 Nov 2001 15:39:42 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA17821
	for midcom-archive@odin.ietf.org; Tue, 6 Nov 2001 15:39:45 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA17681;
	Tue, 6 Nov 2001 15:32:40 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA17652
	for <midcom@optimus.ietf.org>; Tue, 6 Nov 2001 15:32:37 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id PAA02408
	for <midcom@ietf.org>; Tue, 6 Nov 2001 15:32:32 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.2) with SMTP id M2001110620295217572
 ; Tue, 06 Nov 2001 20:29:52 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <W19LY1V8>; Tue, 6 Nov 2001 20:31:58 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639E92244@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: Christian Huitema <huitema@windows.microsoft.com>,
        Steve Davies<sdavies@ridgewaysystems.com>, midcom <midcom@ietf.org>
Cc: Melinda Shore <mshore@cisco.com>,
        Jonathan Rosenberg <jdrosen@dynamicsoft.com>
Subject: RE: [midcom] pre-midcom candidates - the Davies Critique
Date: Tue, 6 Nov 2001 20:31:55 -0000 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C16702.132E9520"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C16702.132E9520
Content-Type: text/plain;
	charset="ISO-8859-1"

Christian, 

Are we talking at cross purposes? I understand that the STUN protocol itself
will go through the firewall in the manner you describe here, but I couldn't
find anything in your draft to say how STUN would help VoIP traverse a
firewalls/NAT combination or Symmetric NAT once it has discovered that the
terminal is behind such a configuration. Indeed, the Davies draft explains
how VoIP can successfully traverse this deployment configuration using the
technique you describe here - i.e 'let a response come in to a packet sent
from an internal port' using a policy that is (at least we have found)
acceptable to the local IT manager. 

Steve

-----Original Message-----
From: Christian Huitema [mailto:huitema@windows.microsoft.com]
Sent: 31 October 2001 22:26
To: Steve Davies; midcom
Cc: Melinda Shore; Jonathan Rosenberg
Subject: RE: [midcom] pre-midcom candidates - the Davies Critique


Steve,

Your point regarding "Stun and firewalls" is mistaken. The STUN
requirement is that if there is a firewall, it let a response come in to
a packet sent from an internal port. This is the default behavior of
most "residential NAT/firewall", and it is also an optional behavior in
many enterprise firewalls. Whether such a policy is deemed acceptable by
the local IT manager is debatable -- there are pros and cons.

-- Christian Huitema

-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com] 
Sent: Wednesday, October 31, 2001 12:57 PM
To: 'midcom'
Cc: 'Melinda Shore'; 'Jonathan Rosenberg'
Subject: RE: [midcom] pre-midcom candidates - the Davies Critique

(Apologies if you get this twice. The first attempt was too long for the
mailing list so I've deleted the history.).... 
Naturally, I don't entirely agree with Jonathan's analysis. Here is
mine: 
The Sen Proposal: 
----------------- 
I don't see the Sen proposal as an adequate near-term/pre-midcom
solution for two main reasons: 
(a) it requires changes to the protocol: 
---------------------------------------- 
In order to make the Sen proposal work we are told that a new service
tag must be incorporated in the SIP Register request and a new SIP Ping
(keep-alive) method must be incorporated. Not only will this take time
to implement in SIP but presumably we'll also need corresponding
protocol changes for Megaco, MGCP, H.323, etc. Or is Midcom
SIP-specific?
(b) it requires behavioural changes to the client: 
-------------------------------------------------- 
It requires symmetric RTP and the continual transmission of RTP and RTCP
packets to keep the NAT bindings open. While symmetric RTP may be a good
thing, that doesn't imply all applications have constant bi-directional
streams - think of 'broadcast' type applications. Also why should
terminals be expected to turn off silence suppression? How are endpoints
to know when and when not to make this behavioural change? 
Other weaknesses of the proposal include a requirement on terminals to
signal to the SIP proxy when they are behind a NAT. It is not explained
how they are supposed to know whether or not they are. Additionally, the
use of random ports on the RTP Proxy makes it difficult to protect such
a device with a regular filtering firewall. Such configurations would be
required for an enterprise do-it-yourself solution(the enterprise is its
own provider) and by service providers wanting to protect their networks
and service from DoS attacks.
Note that correction of all these shortcomings results in the same
architecture and method outlined in the Davies proposal.
The Rosenberg/STUN Proposal: 
---------------------------- 
Whilst I acknowledge the STUN proposal provides a method to determine
the type of NAT a terminal may be behind, I view the proposal as
incomplete and potentially impractical candidate as a
near-term/pre-midcom solution. 
a) Firewalls are everywhere: 
---------------------------- 
Whenever a firewall is deployed in conjunction with a NAT, irrespective
of the type of NAT, the net result is equivalent to what the STUN method
describes as a Symmetric NAT. In the case of symmetric NATs, the
Rosenberg proposal acknowledges that a media intermediary/relay (or RTP
Proxy) is required. However, the STUN proposal doesn't inform us what
the architecture and method are for making calls in this case, although
Jonathan acknowledges in his email that there are three solutions - the
Davies proposal, the Sen proposal and an unpublished STUN proposal.
Firewalls are a fact of life in all enterprises connected to the
internet. An ever-increasing number of users are installing firewalls in
their homes as well. The majority of calls will require a media
intermediary/RTP Proxy. In other words, VoIP providers will have to
install media intermediaries from Day One of any service. Can you
imagine the subscription scenario if they don't: 
Customer: 'Please may I subscribe to your service' 
Provider: 'Is your terminal behind a firewall?' 
Customer: 'Yes' 
Provider: 'Sorry our service won't work for you' or 'Yes, but please
place your terminal outside the firewall' or 'Yes, but you can only call
other people not behind a firewall or symmetric NAT'.
This is not what the VoIP industry needs right now! 
b) Too early to optimise: 
------------------------- 
The STUN proposal boils down to a port saving technique for VoIP
providers. But in a nascent market its impractical to start with a port
saving technique particularly when its unquantifiable how many ports a
provider may save. What providers need is a solution that is deployable
in all cases - that implies a media intermediary solution. Trying to
combine a port saving technique in conjunction with a media intermediary
solution will add complexity that will delay and stall the VoIP market.
From a provider's perspective, this delay and additional testing could
far outweigh any savings gained by requiring fewer media intermediary
ports.
c) Unproven: 
------------ 
i) TIMEOUTS. When a user is behind a firewall or symmetric NAT, to avoid
use of a media intermediary the terminal must invoke the STUN protocol
on a call by call basis. The STUN protocol requires potentially
significant timeouts to expire in order to determine whether media may
go direct. What will this do to call setup times?
ii) NETWORK BASED NATS. There may be cases where the terminal determines
that the media may go direct, but in fact the media passes through
network based NATs and the call will fail. This would typically happen
at the provider boundary, because the provider uses some internal
addressing scheme or when passing from IPv4 to IPv6 networks. The
solution would be to place the STUN server on the remote side of those
network based NATs, but this would have the consequence of tromboning
the media via those network based NATs for 'provider-internal' calls,
defeating the reason for STUN. Alternatively, multiple STUN servers
would need to be deployed - one for each different NAT location, but
that then poses the question of how a terminal would know which STUN
server to use on a call-by-call basis.
Davies proposal: 
---------------- 
The Davies proposal is very midcom-like. The Proxy Extension Agent (PEA)
is like a MIDDLEBOX and the Application Proxy (AP) is like a MIDCOM
AGENT. The AP is responsible for getting publicly reachable transport
addresses on the PEA for external calls and publishing those addresses
in the protocol messages. 
The Davies proposal simplifies the security policy problem being
grappled with by MIDCOM to a very simple static policy administered and
controlled by the IT manager and implemented on existing firewalls. Just
three static pinholes are required to be configured in the firewall.
Furthermore, these pinholes are outbound pinholes(i.e. out from the
enterprise).
Jonathan writes that in the Davies draft there are issues to do with
consistency with enterprise firewall policy, but this is
unsubstantiated. When details of these issues are provided, we will be
happy to discuss them. The Davies method is entirely consistent with
enterprise firewall policy - it is similar to, but actually far more
restrictive than the firewall policy that allows web browsing for
example. The Davies proposal's policy has been vetted by service
providers and is already in commercial deployments - we can only assume
enterprises find it acceptable.
As well as being midcom-like, the Davies method has many other
significant advantages: 
* It provides a 100% solution. It will work anywhere no matter how many
and what type and combination of firewalls and NATs there are.
* No change is required to any of the protocols. It is not even
necessary for endpoints to implement symmetric RTP. 
* The implementation can be made transparent to the endpoints or be
implemented by them. 
* Enterprise or Service Provider deployments are possible. The PEA may
be deployed within a service provider's network or within the DMZ of an
enterprise's own service centre.
* Passing through a media intermediary is seen as enhancing security and
saving IP addresses. Hiding an enterprise IP address from the remote
party (only the transport addresses of the PEA are published in
messages) is seen as a benefit and enables the enterprise to use the
same IP address used for other Internet traffic.
* Service Providers see a benefit in handling the media through PEA for
several reasons. It enables them to hide the transport addresses of
their other service equipment. It provides them with a suitable point to
implement wire-tapping (e.g.CALEA) - ITSPs in many countries are bound
to provide such capabilities. It also provides them with a media QOS
execution point and it provides suitable IPv4/IPv6 migration boundary
points.
Jonathan seeks to belittle the Davies proposal by likening it to RSIP.
I'm not sure what the point is here. It is true that we have borrowed
and learnt from many of the principles and techniques used within the
Internet. That's why we have well known ports, outbound initiated
connections, and TCP multiplexing, so it's not surprising the method is
recognisable and architecturally looks similar to other protocols. What
is unique, is the way in which this method combines the different
Internet techniques together with the transport of real-time UDP streams
without any tunneling overhead. 
In fact, the single disadvantage of the Davies proposal is that it
requires media intermediaries, but no-one has devised a non-media
intermediary solution that solves all of today's firewall and NAT
deployments. In any case, media intermediaries are not of much concern
to service providers because they will co-locate those intermediaries
with their access equipment in their POPs. In due course, those
intermediaries may even be implemented in the access routers or Midcom
will obviate them. 
Pre-Midcom Recommendation: 
-------------------------- 
Jonathan writes that he wants to tackle the harder stuff, i.e. firewalls
and symmetric NATs, later. The fact of the matter is that the Davies
proposal has solved the harder stuff already. It is the Davies proposal
that is the low-hanging fruit because it addresses 100% of deployments
and it has working examples. Surely this is where a pre-midcom solution
must start. A VoIP provider needs it from Day One because it is very
likely some/many customers will have a firewall or symmetric NAT. If in
time, providers are seeking more efficient deployments or are seeking to
reduce costs, then the Davies solution is easily extended to incorporate
a STUN-like method. But before embarking on this effort it would be wise
to judge the market need and determine when MIDCOM will kick in.
Steve Davies 

------_=_NextPart_001_01C16702.132E9520
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] pre-midcom candidates - the Davies Critique</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Christian, </FONT>
</P>

<P><FONT SIZE=3D2>Are we talking at cross purposes? I understand that =
the STUN protocol itself will go through the firewall in the manner you =
describe here, but I couldn't find anything in your draft to say how =
STUN would help VoIP traverse a firewalls/NAT combination or Symmetric =
NAT once it has discovered that the terminal is behind such a =
configuration. Indeed, the Davies draft explains how VoIP can =
successfully traverse this deployment configuration using the technique =
you describe here - i.e 'let a response come in to a packet sent from =
an internal port' using a policy that is (at least we have found) =
acceptable to the local IT manager. </FONT></P>

<P><FONT SIZE=3D2>Steve</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Christian Huitema [<A =
HREF=3D"mailto:huitema@windows.microsoft.com">mailto:huitema@windows.mic=
rosoft.com</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 31 October 2001 22:26</FONT>
<BR><FONT SIZE=3D2>To: Steve Davies; midcom</FONT>
<BR><FONT SIZE=3D2>Cc: Melinda Shore; Jonathan Rosenberg</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [midcom] pre-midcom candidates - the =
Davies Critique</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Steve,</FONT>
</P>

<P><FONT SIZE=3D2>Your point regarding &quot;Stun and firewalls&quot; =
is mistaken. The STUN</FONT>
<BR><FONT SIZE=3D2>requirement is that if there is a firewall, it let a =
response come in to</FONT>
<BR><FONT SIZE=3D2>a packet sent from an internal port. This is the =
default behavior of</FONT>
<BR><FONT SIZE=3D2>most &quot;residential NAT/firewall&quot;, and it is =
also an optional behavior in</FONT>
<BR><FONT SIZE=3D2>many enterprise firewalls. Whether such a policy is =
deemed acceptable by</FONT>
<BR><FONT SIZE=3D2>the local IT manager is debatable -- there are pros =
and cons.</FONT>
</P>

<P><FONT SIZE=3D2>-- Christian Huitema</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Steve Davies [<A =
HREF=3D"mailto:sdavies@ridgewaysystems.com">mailto:sdavies@ridgewaysyste=
ms.com</A>] </FONT>
<BR><FONT SIZE=3D2>Sent: Wednesday, October 31, 2001 12:57 PM</FONT>
<BR><FONT SIZE=3D2>To: 'midcom'</FONT>
<BR><FONT SIZE=3D2>Cc: 'Melinda Shore'; 'Jonathan Rosenberg'</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [midcom] pre-midcom candidates - the =
Davies Critique</FONT>
</P>

<P><FONT SIZE=3D2>(Apologies if you get this twice. The first attempt =
was too long for the</FONT>
<BR><FONT SIZE=3D2>mailing list so I've deleted the history.).... =
</FONT>
<BR><FONT SIZE=3D2>Naturally, I don't entirely agree with Jonathan's =
analysis. Here is</FONT>
<BR><FONT SIZE=3D2>mine: </FONT>
<BR><FONT SIZE=3D2>The Sen Proposal: </FONT>
<BR><FONT SIZE=3D2>----------------- </FONT>
<BR><FONT SIZE=3D2>I don't see the Sen proposal as an adequate =
near-term/pre-midcom</FONT>
<BR><FONT SIZE=3D2>solution for two main reasons: </FONT>
<BR><FONT SIZE=3D2>(a) it requires changes to the protocol: </FONT>
<BR><FONT SIZE=3D2>---------------------------------------- </FONT>
<BR><FONT SIZE=3D2>In order to make the Sen proposal work we are told =
that a new service</FONT>
<BR><FONT SIZE=3D2>tag must be incorporated in the SIP Register request =
and a new SIP Ping</FONT>
<BR><FONT SIZE=3D2>(keep-alive) method must be incorporated. Not only =
will this take time</FONT>
<BR><FONT SIZE=3D2>to implement in SIP but presumably we'll also need =
corresponding</FONT>
<BR><FONT SIZE=3D2>protocol changes for Megaco, MGCP, H.323, etc. Or is =
Midcom</FONT>
<BR><FONT SIZE=3D2>SIP-specific?</FONT>
<BR><FONT SIZE=3D2>(b) it requires behavioural changes to the client: =
</FONT>
<BR><FONT SIZE=3D2>-------------------------------------------------- =
</FONT>
<BR><FONT SIZE=3D2>It requires symmetric RTP and the continual =
transmission of RTP and RTCP</FONT>
<BR><FONT SIZE=3D2>packets to keep the NAT bindings open. While =
symmetric RTP may be a good</FONT>
<BR><FONT SIZE=3D2>thing, that doesn't imply all applications have =
constant bi-directional</FONT>
<BR><FONT SIZE=3D2>streams - think of 'broadcast' type applications. =
Also why should</FONT>
<BR><FONT SIZE=3D2>terminals be expected to turn off silence =
suppression? How are endpoints</FONT>
<BR><FONT SIZE=3D2>to know when and when not to make this behavioural =
change? </FONT>
<BR><FONT SIZE=3D2>Other weaknesses of the proposal include a =
requirement on terminals to</FONT>
<BR><FONT SIZE=3D2>signal to the SIP proxy when they are behind a NAT. =
It is not explained</FONT>
<BR><FONT SIZE=3D2>how they are supposed to know whether or not they =
are. Additionally, the</FONT>
<BR><FONT SIZE=3D2>use of random ports on the RTP Proxy makes it =
difficult to protect such</FONT>
<BR><FONT SIZE=3D2>a device with a regular filtering firewall. Such =
configurations would be</FONT>
<BR><FONT SIZE=3D2>required for an enterprise do-it-yourself =
solution(the enterprise is its</FONT>
<BR><FONT SIZE=3D2>own provider) and by service providers wanting to =
protect their networks</FONT>
<BR><FONT SIZE=3D2>and service from DoS attacks.</FONT>
<BR><FONT SIZE=3D2>Note that correction of all these shortcomings =
results in the same</FONT>
<BR><FONT SIZE=3D2>architecture and method outlined in the Davies =
proposal.</FONT>
<BR><FONT SIZE=3D2>The Rosenberg/STUN Proposal: </FONT>
<BR><FONT SIZE=3D2>---------------------------- </FONT>
<BR><FONT SIZE=3D2>Whilst I acknowledge the STUN proposal provides a =
method to determine</FONT>
<BR><FONT SIZE=3D2>the type of NAT a terminal may be behind, I view the =
proposal as</FONT>
<BR><FONT SIZE=3D2>incomplete and potentially impractical candidate as =
a</FONT>
<BR><FONT SIZE=3D2>near-term/pre-midcom solution. </FONT>
<BR><FONT SIZE=3D2>a) Firewalls are everywhere: </FONT>
<BR><FONT SIZE=3D2>---------------------------- </FONT>
<BR><FONT SIZE=3D2>Whenever a firewall is deployed in conjunction with =
a NAT, irrespective</FONT>
<BR><FONT SIZE=3D2>of the type of NAT, the net result is equivalent to =
what the STUN method</FONT>
<BR><FONT SIZE=3D2>describes as a Symmetric NAT. In the case of =
symmetric NATs, the</FONT>
<BR><FONT SIZE=3D2>Rosenberg proposal acknowledges that a media =
intermediary/relay (or RTP</FONT>
<BR><FONT SIZE=3D2>Proxy) is required. However, the STUN proposal =
doesn't inform us what</FONT>
<BR><FONT SIZE=3D2>the architecture and method are for making calls in =
this case, although</FONT>
<BR><FONT SIZE=3D2>Jonathan acknowledges in his email that there are =
three solutions - the</FONT>
<BR><FONT SIZE=3D2>Davies proposal, the Sen proposal and an unpublished =
STUN proposal.</FONT>
<BR><FONT SIZE=3D2>Firewalls are a fact of life in all enterprises =
connected to the</FONT>
<BR><FONT SIZE=3D2>internet. An ever-increasing number of users are =
installing firewalls in</FONT>
<BR><FONT SIZE=3D2>their homes as well. The majority of calls will =
require a media</FONT>
<BR><FONT SIZE=3D2>intermediary/RTP Proxy. In other words, VoIP =
providers will have to</FONT>
<BR><FONT SIZE=3D2>install media intermediaries from Day One of any =
service. Can you</FONT>
<BR><FONT SIZE=3D2>imagine the subscription scenario if they don't: =
</FONT>
<BR><FONT SIZE=3D2>Customer: 'Please may I subscribe to your service' =
</FONT>
<BR><FONT SIZE=3D2>Provider: 'Is your terminal behind a firewall?' =
</FONT>
<BR><FONT SIZE=3D2>Customer: 'Yes' </FONT>
<BR><FONT SIZE=3D2>Provider: 'Sorry our service won't work for you' or =
'Yes, but please</FONT>
<BR><FONT SIZE=3D2>place your terminal outside the firewall' or 'Yes, =
but you can only call</FONT>
<BR><FONT SIZE=3D2>other people not behind a firewall or symmetric =
NAT'.</FONT>
<BR><FONT SIZE=3D2>This is not what the VoIP industry needs right now! =
</FONT>
<BR><FONT SIZE=3D2>b) Too early to optimise: </FONT>
<BR><FONT SIZE=3D2>------------------------- </FONT>
<BR><FONT SIZE=3D2>The STUN proposal boils down to a port saving =
technique for VoIP</FONT>
<BR><FONT SIZE=3D2>providers. But in a nascent market its impractical =
to start with a port</FONT>
<BR><FONT SIZE=3D2>saving technique particularly when its =
unquantifiable how many ports a</FONT>
<BR><FONT SIZE=3D2>provider may save. What providers need is a solution =
that is deployable</FONT>
<BR><FONT SIZE=3D2>in all cases - that implies a media intermediary =
solution. Trying to</FONT>
<BR><FONT SIZE=3D2>combine a port saving technique in conjunction with =
a media intermediary</FONT>
<BR><FONT SIZE=3D2>solution will add complexity that will delay and =
stall the VoIP market.</FONT>
<BR><FONT SIZE=3D2>From a provider's perspective, this delay and =
additional testing could</FONT>
<BR><FONT SIZE=3D2>far outweigh any savings gained by requiring fewer =
media intermediary</FONT>
<BR><FONT SIZE=3D2>ports.</FONT>
<BR><FONT SIZE=3D2>c) Unproven: </FONT>
<BR><FONT SIZE=3D2>------------ </FONT>
<BR><FONT SIZE=3D2>i) TIMEOUTS. When a user is behind a firewall or =
symmetric NAT, to avoid</FONT>
<BR><FONT SIZE=3D2>use of a media intermediary the terminal must invoke =
the STUN protocol</FONT>
<BR><FONT SIZE=3D2>on a call by call basis. The STUN protocol requires =
potentially</FONT>
<BR><FONT SIZE=3D2>significant timeouts to expire in order to determine =
whether media may</FONT>
<BR><FONT SIZE=3D2>go direct. What will this do to call setup =
times?</FONT>
<BR><FONT SIZE=3D2>ii) NETWORK BASED NATS. There may be cases where the =
terminal determines</FONT>
<BR><FONT SIZE=3D2>that the media may go direct, but in fact the media =
passes through</FONT>
<BR><FONT SIZE=3D2>network based NATs and the call will fail. This =
would typically happen</FONT>
<BR><FONT SIZE=3D2>at the provider boundary, because the provider uses =
some internal</FONT>
<BR><FONT SIZE=3D2>addressing scheme or when passing from IPv4 to IPv6 =
networks. The</FONT>
<BR><FONT SIZE=3D2>solution would be to place the STUN server on the =
remote side of those</FONT>
<BR><FONT SIZE=3D2>network based NATs, but this would have the =
consequence of tromboning</FONT>
<BR><FONT SIZE=3D2>the media via those network based NATs for =
'provider-internal' calls,</FONT>
<BR><FONT SIZE=3D2>defeating the reason for STUN. Alternatively, =
multiple STUN servers</FONT>
<BR><FONT SIZE=3D2>would need to be deployed - one for each different =
NAT location, but</FONT>
<BR><FONT SIZE=3D2>that then poses the question of how a terminal would =
know which STUN</FONT>
<BR><FONT SIZE=3D2>server to use on a call-by-call basis.</FONT>
<BR><FONT SIZE=3D2>Davies proposal: </FONT>
<BR><FONT SIZE=3D2>---------------- </FONT>
<BR><FONT SIZE=3D2>The Davies proposal is very midcom-like. The Proxy =
Extension Agent (PEA)</FONT>
<BR><FONT SIZE=3D2>is like a MIDDLEBOX and the Application Proxy (AP) =
is like a MIDCOM</FONT>
<BR><FONT SIZE=3D2>AGENT. The AP is responsible for getting publicly =
reachable transport</FONT>
<BR><FONT SIZE=3D2>addresses on the PEA for external calls and =
publishing those addresses</FONT>
<BR><FONT SIZE=3D2>in the protocol messages. </FONT>
<BR><FONT SIZE=3D2>The Davies proposal simplifies the security policy =
problem being</FONT>
<BR><FONT SIZE=3D2>grappled with by MIDCOM to a very simple static =
policy administered and</FONT>
<BR><FONT SIZE=3D2>controlled by the IT manager and implemented on =
existing firewalls. Just</FONT>
<BR><FONT SIZE=3D2>three static pinholes are required to be configured =
in the firewall.</FONT>
<BR><FONT SIZE=3D2>Furthermore, these pinholes are outbound =
pinholes(i.e. out from the</FONT>
<BR><FONT SIZE=3D2>enterprise).</FONT>
<BR><FONT SIZE=3D2>Jonathan writes that in the Davies draft there are =
issues to do with</FONT>
<BR><FONT SIZE=3D2>consistency with enterprise firewall policy, but =
this is</FONT>
<BR><FONT SIZE=3D2>unsubstantiated. When details of these issues are =
provided, we will be</FONT>
<BR><FONT SIZE=3D2>happy to discuss them. The Davies method is entirely =
consistent with</FONT>
<BR><FONT SIZE=3D2>enterprise firewall policy - it is similar to, but =
actually far more</FONT>
<BR><FONT SIZE=3D2>restrictive than the firewall policy that allows web =
browsing for</FONT>
<BR><FONT SIZE=3D2>example. The Davies proposal's policy has been =
vetted by service</FONT>
<BR><FONT SIZE=3D2>providers and is already in commercial deployments - =
we can only assume</FONT>
<BR><FONT SIZE=3D2>enterprises find it acceptable.</FONT>
<BR><FONT SIZE=3D2>As well as being midcom-like, the Davies method has =
many other</FONT>
<BR><FONT SIZE=3D2>significant advantages: </FONT>
<BR><FONT SIZE=3D2>* It provides a 100% solution. It will work anywhere =
no matter how many</FONT>
<BR><FONT SIZE=3D2>and what type and combination of firewalls and NATs =
there are.</FONT>
<BR><FONT SIZE=3D2>* No change is required to any of the protocols. It =
is not even</FONT>
<BR><FONT SIZE=3D2>necessary for endpoints to implement symmetric RTP. =
</FONT>
<BR><FONT SIZE=3D2>* The implementation can be made transparent to the =
endpoints or be</FONT>
<BR><FONT SIZE=3D2>implemented by them. </FONT>
<BR><FONT SIZE=3D2>* Enterprise or Service Provider deployments are =
possible. The PEA may</FONT>
<BR><FONT SIZE=3D2>be deployed within a service provider's network or =
within the DMZ of an</FONT>
<BR><FONT SIZE=3D2>enterprise's own service centre.</FONT>
<BR><FONT SIZE=3D2>* Passing through a media intermediary is seen as =
enhancing security and</FONT>
<BR><FONT SIZE=3D2>saving IP addresses. Hiding an enterprise IP address =
from the remote</FONT>
<BR><FONT SIZE=3D2>party (only the transport addresses of the PEA are =
published in</FONT>
<BR><FONT SIZE=3D2>messages) is seen as a benefit and enables the =
enterprise to use the</FONT>
<BR><FONT SIZE=3D2>same IP address used for other Internet =
traffic.</FONT>
<BR><FONT SIZE=3D2>* Service Providers see a benefit in handling the =
media through PEA for</FONT>
<BR><FONT SIZE=3D2>several reasons. It enables them to hide the =
transport addresses of</FONT>
<BR><FONT SIZE=3D2>their other service equipment. It provides them with =
a suitable point to</FONT>
<BR><FONT SIZE=3D2>implement wire-tapping (e.g.CALEA) - ITSPs in many =
countries are bound</FONT>
<BR><FONT SIZE=3D2>to provide such capabilities. It also provides them =
with a media QOS</FONT>
<BR><FONT SIZE=3D2>execution point and it provides suitable IPv4/IPv6 =
migration boundary</FONT>
<BR><FONT SIZE=3D2>points.</FONT>
<BR><FONT SIZE=3D2>Jonathan seeks to belittle the Davies proposal by =
likening it to RSIP.</FONT>
<BR><FONT SIZE=3D2>I'm not sure what the point is here. It is true that =
we have borrowed</FONT>
<BR><FONT SIZE=3D2>and learnt from many of the principles and =
techniques used within the</FONT>
<BR><FONT SIZE=3D2>Internet. That's why we have well known ports, =
outbound initiated</FONT>
<BR><FONT SIZE=3D2>connections, and TCP multiplexing, so it's not =
surprising the method is</FONT>
<BR><FONT SIZE=3D2>recognisable and architecturally looks similar to =
other protocols. What</FONT>
<BR><FONT SIZE=3D2>is unique, is the way in which this method combines =
the different</FONT>
<BR><FONT SIZE=3D2>Internet techniques together with the transport of =
real-time UDP streams</FONT>
<BR><FONT SIZE=3D2>without any tunneling overhead. </FONT>
<BR><FONT SIZE=3D2>In fact, the single disadvantage of the Davies =
proposal is that it</FONT>
<BR><FONT SIZE=3D2>requires media intermediaries, but no-one has =
devised a non-media</FONT>
<BR><FONT SIZE=3D2>intermediary solution that solves all of today's =
firewall and NAT</FONT>
<BR><FONT SIZE=3D2>deployments. In any case, media intermediaries are =
not of much concern</FONT>
<BR><FONT SIZE=3D2>to service providers because they will co-locate =
those intermediaries</FONT>
<BR><FONT SIZE=3D2>with their access equipment in their POPs. In due =
course, those</FONT>
<BR><FONT SIZE=3D2>intermediaries may even be implemented in the access =
routers or Midcom</FONT>
<BR><FONT SIZE=3D2>will obviate them. </FONT>
<BR><FONT SIZE=3D2>Pre-Midcom Recommendation: </FONT>
<BR><FONT SIZE=3D2>-------------------------- </FONT>
<BR><FONT SIZE=3D2>Jonathan writes that he wants to tackle the harder =
stuff, i.e. firewalls</FONT>
<BR><FONT SIZE=3D2>and symmetric NATs, later. The fact of the matter is =
that the Davies</FONT>
<BR><FONT SIZE=3D2>proposal has solved the harder stuff already. It is =
the Davies proposal</FONT>
<BR><FONT SIZE=3D2>that is the low-hanging fruit because it addresses =
100% of deployments</FONT>
<BR><FONT SIZE=3D2>and it has working examples. Surely this is where a =
pre-midcom solution</FONT>
<BR><FONT SIZE=3D2>must start. A VoIP provider needs it from Day One =
because it is very</FONT>
<BR><FONT SIZE=3D2>likely some/many customers will have a firewall or =
symmetric NAT. If in</FONT>
<BR><FONT SIZE=3D2>time, providers are seeking more efficient =
deployments or are seeking to</FONT>
<BR><FONT SIZE=3D2>reduce costs, then the Davies solution is easily =
extended to incorporate</FONT>
<BR><FONT SIZE=3D2>a STUN-like method. But before embarking on this =
effort it would be wise</FONT>
<BR><FONT SIZE=3D2>to judge the market need and determine when MIDCOM =
will kick in.</FONT>
<BR><FONT SIZE=3D2>Steve Davies </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C16702.132E9520--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov  8 15:25:09 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA06024
	for <midcom-archive@odin.ietf.org>; Thu, 8 Nov 2001 15:25:09 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA15202
	for midcom-archive@odin.ietf.org; Thu, 8 Nov 2001 15:25:12 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA15137;
	Thu, 8 Nov 2001 15:21:43 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA15111
	for <midcom@optimus.ietf.org>; Thu, 8 Nov 2001 15:21:42 -0500 (EST)
Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05898
	for <midcom@ietf.org>; Thu, 8 Nov 2001 15:21:38 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fA8KInx02036
	for <midcom@ietf.org>; Thu, 8 Nov 2001 12:18:53 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABW79369;
	Thu, 8 Nov 2001 12:20:28 -0800 (PST)
Message-Id: <5.1.0.14.0.20011108151614.00a8ba20@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Thu, 08 Nov 2001 15:23:14 -0500
To: midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: [midcom] Requirements draft
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Unfortunately the original editors were not available to
revise the requirements draft based on Scott's list so I've
gone ahead and produced a new version myself.  I expect that
the internet-drafts queue is quite long right now and it may
be a day or more before the draft is posted, so in the 
interim a copy is available at 
http://www.employees.org/~shore/draft-ietf-midcom-requirements-03.txt

I have retained all of the agreed-upon requirements as well
as the document structure, while trying to conform to the model
provided by several requirements documents that have survived
IESG review and been published as RFCs.  I've added explanatory text
as needed - please cast a particularly critical eye on that.
The structure may need some tweaking, as well, and there's at
least one requirement that duplicates another (2.3.1 and 2.3.2).
Please have at it.

I'm hoping that this will be the second-to-last draft - that is
to say, the draft resulting from your comments on this will
be the one to go to last call.

Many thanks,

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov  8 16:17:11 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA08110
	for <midcom-archive@odin.ietf.org>; Thu, 8 Nov 2001 16:17:10 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id QAA17197
	for midcom-archive@odin.ietf.org; Thu, 8 Nov 2001 16:17:12 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA17087;
	Thu, 8 Nov 2001 16:14:04 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA17058
	for <midcom@optimus.ietf.org>; Thu, 8 Nov 2001 16:14:02 -0500 (EST)
Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA07997
	for <midcom@ietf.org>; Thu, 8 Nov 2001 16:14:00 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fA8LBJx02182
	for <midcom@ietf.org>; Thu, 8 Nov 2001 13:11:20 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABW81400;
	Thu, 8 Nov 2001 13:12:56 -0800 (PST)
Message-Id: <5.1.0.14.0.20011108161306.00a97390@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Thu, 08 Nov 2001 16:15:50 -0500
To: midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: [midcom] Agenda for Salt Lake City
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

The deadline for the Salt Lake City meeting agenda is
drawing nigh, and I need to get it submitted.  Right now
the two topics I think we need to cover are 1) pre-midcom
and 2) rechartering.  Please let me know post-haste if
there's something else you feel requires meeting time.
We will not be discussing the framework or requirements
documents.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov  9 07:14:17 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA07603
	for <midcom-archive@odin.ietf.org>; Fri, 9 Nov 2001 07:14:17 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id HAA14253
	for midcom-archive@odin.ietf.org; Fri, 9 Nov 2001 07:14:19 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id HAA13988;
	Fri, 9 Nov 2001 07:11:36 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id HAA13961
	for <midcom@optimus.ietf.org>; Fri, 9 Nov 2001 07:11:34 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA07510;
	Fri, 9 Nov 2001 07:11:32 -0500 (EST)
Message-Id: <200111091211.HAA07510@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: midcom@ietf.org
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Date: Fri, 09 Nov 2001 07:11:32 -0500
Subject: [midcom] I-D ACTION:draft-ietf-midcom-requirements-03.txt
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Middlebox Communication Working Group of the IETF.

	Title		: Middlebox Communications (midcom) Protocol      
                          Requirements
	Author(s)	: R. Swale, P. Mart, P. Sijben, S. Brim, M. Shore
	Filename	: draft-ietf-midcom-requirements-03.txt
	Pages		: 10
	Date		: 08-Nov-01
	
This document specifies the requirements that the Middlebox Commu-
nication (midcom) protocol must satisfy in order to meet the needs
of applications wishing to influence middlebox function.  These
requirements were developed with a specific focus on network
address translation and firewall middleboxes.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-midcom-requirements-03.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-midcom-requirements-03.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-midcom-requirements-03.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20011108152156.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-midcom-requirements-03.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-midcom-requirements-03.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20011108152156.I-D@ietf.org>

--OtherAccess--

--NextPart--



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 12 09:31:23 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA02401
	for <midcom-archive@odin.ietf.org>; Mon, 12 Nov 2001 09:31:22 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id JAA04814
	for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 09:31:26 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA04448;
	Mon, 12 Nov 2001 09:29:34 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA04417
	for <midcom@optimus.ietf.org>; Mon, 12 Nov 2001 09:29:32 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA02224
	for <midcom@ietf.org>; Mon, 12 Nov 2001 09:29:28 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111214270700265
 ; Mon, 12 Nov 2001 14:27:07 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <WTLZJF0M>; Mon, 12 Nov 2001 14:28:56 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639E922F5@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'Bob Penfield'" <bpenfield@acmepacket.com>, "'midcom'" <midcom@ietf.org>
Subject: RE: [midcom] pre-midcom candidates
Date: Mon, 12 Nov 2001 14:28:51 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C16B86.599289D0"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C16B86.599289D0
Content-Type: text/plain;
	charset="ISO-8859-1"

Bob,

In my opinion there is an underlying confusion in this debate. I believe

* 'the discovery of the type of firewall/NAT combination a terminal is
behind' 

is different from

* 'the traversal of VoIP through any firewall/NAT combination'

And because they are different, they don't necessarily need the same
protocol. The reason we have lots of protocols is because they provide
different functions. Trying to extend a protocol to handle substantially
different tasks usually results in a cumbersome protocol that takes forever
to produce. By definition pre-midcom needs to avoid this.

The STUN protocol does the discovery piece very well. The Davies proposal
does no discovery - it assumes apriori it's behind a Symmetric NAT (which
includes a FW/NAT combination or just a FW.)

The Davies proposal does the VoIP traversal very well. The STUN proposal
does no traversal. Having discovered it is behind a Cone-type NAT, it
requires terminal behavioural change to get the media flowing direct. As has
already been noted, STUN does not help with Symmetric NAT or a firewall/NAT
combination. It has also been noted that the extension of STUN to cope with
Symmetric NAT would result in a method that would be very like the Davies
proposal.

Therefore for 100% deployment coverage, a pre-midcom solution would need
either:

1. Davies proposal - don't care about Cone NAT for the time being
or
2. Davies + STUN - some media may go direct

I propose starting with 1. because it is less work than 2. and it has not
been quantified whether it is worthwhile to adopt STUN for the percentage of
calls it would affect in a pre-midcom timeframe. 

Other comments in-line below:

Steve

-----Original Message-----
From: Bob Penfield [mailto:bpenfield@acmepacket.com]
Sent: 02 November 2001 15:14
To: midcom
Subject: Re: [midcom] pre-midcom candidates


Hi all,

I just want to throw my hat into the ring as a supporter of the STUN
proposal.

It is very simple and will be relatively easy to implement directly in
endpoints. It requires no state in the server side. It adheres to the
security policy of the firewall/NAT owner.
[SD] How can you say STUN adheres to the security policy of the firewall/NAT
owner? It has already been noted that STUN offers no VoIP traversal solution
through a firewall/NAT combination, so today it wouldn't be deployed in this
case. Or are you saying the STUN protocol itself (minus traversal) adheres
to the security policy? The Davies proposal also adheres very well to the
security policy. Actually the mechanism the Davies proposal uses for
traversal is very similar to the mechanism used to get the STUN protocol
itself through the firewall.

With STUN as a basic tool, more complex solutions can be developed. It could
even be used to implement much of the Davies proposal.
[SD] See my main point above. The discovery of the firewall/NAT combination
is a different task to the actual traversal. If you are saying that STUN can
be used to know when to use the Davies method then I agree, but that doesn't
imply it's an extension of STUN, just that they could co-exist. The reason
we have lots of protocols is because they all do different jobs. Extending
one protocol to do lots of different jobs usually leads to going down a
rat-hole.

I do think we need to address the symmetric NAT problem soon.
[SD] The Davies proposal has! 

The Sen proposal seems too narrow in its focus on SIP and RTP. It also
includes a midcom-like component in the protocol between the SIP element and
the RTP proxy. To standardize this approach we would need to standardize the
RTP proxy control protocol and we would virtually have midcom. The RTP proxy
is just a specialized NAT middlebox.

There are number of things I find troubling about the Davies proposal:

- The tunneling of the signaling through the firewall verges on subverting
the security policy of the firewall owner. As others have stated, existing
VPN methods can do this today. I also think that outbound TCP connections
for signaling can work in most cases.
[SD] The Davies proposal has ALL connections as outgoing connections. The
firewall owner can choose to block the Davies protocol, if that is their
policy. However we expect that they will choose to use a pre-midcom solution
that fits their security policies, so there is no subversion.


- The protocol that would be required to implement this solution seems to be
too complex. I counted 12 methods. It seems to be as complex, if not more
so, than midcom will need to be. How long will it take to devise and
standardize it? Based on the claims of the draft, Ridgeway has devised this
protocol, but have they published the details? Given the complexity, it will
be more difficult and costly to develop endpoints that support it. Given
that, intermediate devices will be needed until all the endpoints support
it, which again increases the cost of deploying VOIP and other applications.
[SD] Ridgeway will publish the details if it is the chosen pre-midcom
candidate. The Davies proposal is more complex than STUN because it's
solving a more complex problem than STUN, but that does not imply it's more
complex than it needs to be. We can also infer that the Davies proposal is
less complex than Midcom because it doesn't need to do any of the pin-holing
that is required in Midcom. Cost of implementation generally decreases
inline with competition. Standardization will enable that competition. 

I think STUN is the best alternative for an easy, quick, and cost effective
solution for NAT/FW that will allow for wider deployment of VOIP and other
applications. It provides an interim solution until midcom is completed and
also is useful in the long term for scenarios where midcom is not
appropriate.
[SD] How can you make this claim when STUN doesn't solve the NAT/FW problem?

cheers,
(-:bob

Robert F. Penfield
Chief Software Architect
Acme Packet, Inc.
130 New Boston Street
Woburn, MA 01801
bpenfield@acmepacket.com



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C16B86.599289D0
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] pre-midcom candidates</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Bob,</FONT>
</P>

<P><FONT SIZE=3D2>In my opinion there is an underlying confusion in =
this debate. I believe</FONT>
</P>

<P><FONT SIZE=3D2>* 'the discovery of the type of firewall/NAT =
combination a terminal is behind' </FONT>
</P>

<P><FONT SIZE=3D2>is different from</FONT>
</P>

<P><FONT SIZE=3D2>* 'the traversal of VoIP through any firewall/NAT =
combination'</FONT>
</P>

<P><FONT SIZE=3D2>And because they are different, they don't =
necessarily need the same protocol. The reason we have lots of =
protocols is because they provide different functions. Trying to extend =
a protocol to handle substantially different tasks usually results in a =
cumbersome protocol that takes forever to produce. By definition =
pre-midcom needs to avoid this.</FONT></P>

<P><FONT SIZE=3D2>The STUN protocol does the discovery piece very well. =
The Davies proposal does no discovery - it assumes apriori it's behind =
a Symmetric NAT (which includes a FW/NAT combination or just a =
FW.)</FONT></P>

<P><FONT SIZE=3D2>The Davies proposal does the VoIP traversal very =
well. The STUN proposal does no traversal. Having discovered it is =
behind a Cone-type NAT, it requires terminal behavioural change to get =
the media flowing direct. As has already been noted, STUN does not help =
with Symmetric NAT or a firewall/NAT combination. It has also been =
noted that the extension of STUN to cope with Symmetric NAT would =
result in a method that would be very like the Davies =
proposal.</FONT></P>

<P><FONT SIZE=3D2>Therefore for 100% deployment coverage, a pre-midcom =
solution would need either:</FONT>
</P>

<P><FONT SIZE=3D2>1. Davies proposal - don't care about Cone NAT for =
the time being</FONT>
<BR><FONT SIZE=3D2>or</FONT>
<BR><FONT SIZE=3D2>2. Davies + STUN - some media may go direct</FONT>
</P>

<P><FONT SIZE=3D2>I propose starting with 1. because it is less work =
than 2. and it has not been quantified whether it is worthwhile to =
adopt STUN for the percentage of calls it would affect in a pre-midcom =
timeframe. </FONT></P>

<P><FONT SIZE=3D2>Other comments in-line below:</FONT>
</P>

<P><FONT SIZE=3D2>Steve</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Bob Penfield [<A =
HREF=3D"mailto:bpenfield@acmepacket.com">mailto:bpenfield@acmepacket.com=
</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 02 November 2001 15:14</FONT>
<BR><FONT SIZE=3D2>To: midcom</FONT>
<BR><FONT SIZE=3D2>Subject: Re: [midcom] pre-midcom candidates</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Hi all,</FONT>
</P>

<P><FONT SIZE=3D2>I just want to throw my hat into the ring as a =
supporter of the STUN</FONT>
<BR><FONT SIZE=3D2>proposal.</FONT>
</P>

<P><FONT SIZE=3D2>It is very simple and will be relatively easy to =
implement directly in</FONT>
<BR><FONT SIZE=3D2>endpoints. It requires no state in the server side. =
It adheres to the</FONT>
<BR><FONT SIZE=3D2>security policy of the firewall/NAT owner.</FONT>
<BR><FONT SIZE=3D2>[SD] How can you say STUN adheres to the security =
policy of the firewall/NAT owner? It has already been noted that STUN =
offers no VoIP traversal solution through a firewall/NAT combination, =
so today it wouldn't be deployed in this case. Or are you saying the =
STUN protocol itself (minus traversal) adheres to the security policy? =
The Davies proposal also adheres very well to the security policy. =
Actually the mechanism the Davies proposal uses for traversal is very =
similar to the mechanism used to get the STUN protocol itself through =
the firewall.</FONT></P>

<P><FONT SIZE=3D2>With STUN as a basic tool, more complex solutions can =
be developed. It could</FONT>
<BR><FONT SIZE=3D2>even be used to implement much of the Davies =
proposal.</FONT>
<BR><FONT SIZE=3D2>[SD] See my main point above. The discovery of the =
firewall/NAT combination is a different task to the actual traversal. =
If you are saying that STUN can be used to know when to use the Davies =
method then I agree, but that doesn't imply it's an extension of STUN, =
just that they could co-exist. The reason we have lots of protocols is =
because they all do different jobs. Extending one protocol to do lots =
of different jobs usually leads to going down a rat-hole.</FONT></P>

<P><FONT SIZE=3D2>I do think we need to address the symmetric NAT =
problem soon.</FONT>
<BR><FONT SIZE=3D2>[SD] The Davies proposal has! </FONT>
</P>

<P><FONT SIZE=3D2>The Sen proposal seems too narrow in its focus on SIP =
and RTP. It also</FONT>
<BR><FONT SIZE=3D2>includes a midcom-like component in the protocol =
between the SIP element and</FONT>
<BR><FONT SIZE=3D2>the RTP proxy. To standardize this approach we would =
need to standardize the</FONT>
<BR><FONT SIZE=3D2>RTP proxy control protocol and we would virtually =
have midcom. The RTP proxy</FONT>
<BR><FONT SIZE=3D2>is just a specialized NAT middlebox.</FONT>
</P>

<P><FONT SIZE=3D2>There are number of things I find troubling about the =
Davies proposal:</FONT>
</P>

<P><FONT SIZE=3D2>- The tunneling of the signaling through the firewall =
verges on subverting</FONT>
<BR><FONT SIZE=3D2>the security policy of the firewall owner. As others =
have stated, existing</FONT>
<BR><FONT SIZE=3D2>VPN methods can do this today. I also think that =
outbound TCP connections</FONT>
<BR><FONT SIZE=3D2>for signaling can work in most cases.</FONT>
<BR><FONT SIZE=3D2>[SD] The Davies proposal has ALL connections as =
outgoing connections. The firewall owner can choose to block the Davies =
protocol, if that is their policy. However we expect that they will =
choose to use a pre-midcom solution that fits their security policies, =
so there is no subversion.</FONT></P>
<BR>

<P><FONT SIZE=3D2>- The protocol that would be required to implement =
this solution seems to be</FONT>
<BR><FONT SIZE=3D2>too complex. I counted 12 methods. It seems to be as =
complex, if not more</FONT>
<BR><FONT SIZE=3D2>so, than midcom will need to be. How long will it =
take to devise and</FONT>
<BR><FONT SIZE=3D2>standardize it? Based on the claims of the draft, =
Ridgeway has devised this</FONT>
<BR><FONT SIZE=3D2>protocol, but have they published the details? Given =
the complexity, it will</FONT>
<BR><FONT SIZE=3D2>be more difficult and costly to develop endpoints =
that support it. Given</FONT>
<BR><FONT SIZE=3D2>that, intermediate devices will be needed until all =
the endpoints support</FONT>
<BR><FONT SIZE=3D2>it, which again increases the cost of deploying VOIP =
and other applications.</FONT>
<BR><FONT SIZE=3D2>[SD] Ridgeway will publish the details if it is the =
chosen pre-midcom candidate. The Davies proposal is more complex than =
STUN because it's solving a more complex problem than STUN, but that =
does not imply it's more complex than it needs to be. We can also infer =
that the Davies proposal is less complex than Midcom because it doesn't =
need to do any of the pin-holing that is required in Midcom. Cost of =
implementation generally decreases inline with competition. =
Standardization will enable that competition. </FONT></P>

<P><FONT SIZE=3D2>I think STUN is the best alternative for an easy, =
quick, and cost effective</FONT>
<BR><FONT SIZE=3D2>solution for NAT/FW that will allow for wider =
deployment of VOIP and other</FONT>
<BR><FONT SIZE=3D2>applications. It provides an interim solution until =
midcom is completed and</FONT>
<BR><FONT SIZE=3D2>also is useful in the long term for scenarios where =
midcom is not</FONT>
<BR><FONT SIZE=3D2>appropriate.</FONT>
<BR><FONT SIZE=3D2>[SD] How can you make this claim when STUN doesn't =
solve the NAT/FW problem?</FONT>
</P>

<P><FONT SIZE=3D2>cheers,</FONT>
<BR><FONT SIZE=3D2>(-:bob</FONT>
</P>

<P><FONT SIZE=3D2>Robert F. Penfield</FONT>
<BR><FONT SIZE=3D2>Chief Software Architect</FONT>
<BR><FONT SIZE=3D2>Acme Packet, Inc.</FONT>
<BR><FONT SIZE=3D2>130 New Boston Street</FONT>
<BR><FONT SIZE=3D2>Woburn, MA 01801</FONT>
<BR><FONT SIZE=3D2>bpenfield@acmepacket.com</FONT>
</P>
<BR>
<BR>

<P><FONT =
SIZE=3D2>_______________________________________________</FONT>
<BR><FONT SIZE=3D2>midcom mailing list</FONT>
<BR><FONT SIZE=3D2>midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://www1.ietf.org/mailman/listinfo/midcom" =
TARGET=3D"_blank">http://www1.ietf.org/mailman/listinfo/midcom</A></FONT=
>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C16B86.599289D0--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 12 11:03:43 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA08602
	for <midcom-archive@odin.ietf.org>; Mon, 12 Nov 2001 11:03:43 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA07251
	for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 11:03:45 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA07205;
	Mon, 12 Nov 2001 11:02:23 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA07173
	for <midcom@optimus.ietf.org>; Mon, 12 Nov 2001 11:02:21 -0500 (EST)
Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA08501
	for <midcom@ietf.org>; Mon, 12 Nov 2001 11:02:18 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fACG1nr25936;
	Mon, 12 Nov 2001 08:01:49 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABX45114;
	Mon, 12 Nov 2001 08:01:19 -0800 (PST)
Message-Id: <5.1.0.14.0.20011112105836.00a58b60@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Mon, 12 Nov 2001 11:04:16 -0500
To: Steve Davies <sdavies@ridgewaysystems.com>,
        "'Bob Penfield'" <bpenfield@acmepacket.com>,
        "'midcom'" <midcom@ietf.org>
From: Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] pre-midcom candidates
In-Reply-To: <00533D13955AD411AF3800A0C9B42639E922F5@ThisAddressDoesNotE
 xist>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 02:28 PM 11/12/01 +0000, Steve Davies wrote:
>[SD] How can you make this claim when STUN doesn't solve the NAT/FW problem? 

I'd like to remind everybody that pre-midcom != midcom.  That
is to say, the intent is to get a simple hack addressing the hard
problem (NAT traversal) out quickly.  The work that's going to
address NAT and firewall traversal and attempt to be thorough
about it is midcom itself.  Please, let's not get carried away.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 12 11:56:51 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA11102
	for <midcom-archive@odin.ietf.org>; Mon, 12 Nov 2001 11:56:51 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA09053
	for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 11:56:54 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA08847;
	Mon, 12 Nov 2001 11:50:04 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA08816
	for <midcom@optimus.ietf.org>; Mon, 12 Nov 2001 11:50:02 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA10843
	for <midcom@ietf.org>; Mon, 12 Nov 2001 11:49:58 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111216473130459
 ; Mon, 12 Nov 2001 16:47:31 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <WTLZJGF6>; Mon, 12 Nov 2001 16:49:19 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639E92306@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'Melinda Shore'" <mshore@cisco.com>, "'midcom'" <midcom@ietf.org>
Subject: RE: [midcom] pre-midcom candidates
Date: Mon, 12 Nov 2001 16:49:17 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C16B99.F7DE64C0"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C16B99.F7DE64C0
Content-Type: text/plain;
	charset="ISO-8859-1"

Melinda,

Are you moving the goal-posts? I thought the new deliverable was to:

'develop or document a protocol or approach that allows
clients to indirectly obtain address bindings from midcom-unaware
middleboxes, through communications with server elements on the public
side of the middlebox'

In my book a midcom-unaware middlebox could be a firewall, a firewall/NAT
combination, or just a NAT, so a pre-midcom solution must enable the
traversal of all these midcom-unaware devices - not just NATs. 

Steve

-----Original Message-----
From: Melinda Shore [mailto:mshore@cisco.com]
Sent: 12 November 2001 16:04
To: Steve Davies; 'Bob Penfield'; 'midcom'
Subject: RE: [midcom] pre-midcom candidates


At 02:28 PM 11/12/01 +0000, Steve Davies wrote:
>[SD] How can you make this claim when STUN doesn't solve the NAT/FW
problem? 

I'd like to remind everybody that pre-midcom != midcom.  That
is to say, the intent is to get a simple hack addressing the hard
problem (NAT traversal) out quickly.  The work that's going to
address NAT and firewall traversal and attempt to be thorough
about it is midcom itself.  Please, let's not get carried away.

Melinda

------_=_NextPart_001_01C16B99.F7DE64C0
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] pre-midcom candidates</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Melinda,</FONT>
</P>

<P><FONT SIZE=3D2>Are you moving the goal-posts? I thought the new =
deliverable was to:</FONT>
</P>

<P><FONT SIZE=3D2>'develop or document a protocol or approach that =
allows</FONT>
<BR><FONT SIZE=3D2>clients to indirectly obtain address bindings from =
midcom-unaware</FONT>
<BR><FONT SIZE=3D2>middleboxes, through communications with server =
elements on the public</FONT>
<BR><FONT SIZE=3D2>side of the middlebox'</FONT>
</P>

<P><FONT SIZE=3D2>In my book a midcom-unaware middlebox could be a =
firewall, a firewall/NAT combination, or just a NAT, so a pre-midcom =
solution must enable the traversal of all these midcom-unaware devices =
- not just NATs. </FONT></P>

<P><FONT SIZE=3D2>Steve</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Melinda Shore [<A =
HREF=3D"mailto:mshore@cisco.com">mailto:mshore@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 12 November 2001 16:04</FONT>
<BR><FONT SIZE=3D2>To: Steve Davies; 'Bob Penfield'; 'midcom'</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [midcom] pre-midcom candidates</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>At 02:28 PM 11/12/01 +0000, Steve Davies =
wrote:</FONT>
<BR><FONT SIZE=3D2>&gt;[SD] How can you make this claim when STUN =
doesn't solve the NAT/FW problem? </FONT>
</P>

<P><FONT SIZE=3D2>I'd like to remind everybody that pre-midcom !=3D =
midcom.&nbsp; That</FONT>
<BR><FONT SIZE=3D2>is to say, the intent is to get a simple hack =
addressing the hard</FONT>
<BR><FONT SIZE=3D2>problem (NAT traversal) out quickly.&nbsp; The work =
that's going to</FONT>
<BR><FONT SIZE=3D2>address NAT and firewall traversal and attempt to be =
thorough</FONT>
<BR><FONT SIZE=3D2>about it is midcom itself.&nbsp; Please, let's not =
get carried away.</FONT>
</P>

<P><FONT SIZE=3D2>Melinda</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C16B99.F7DE64C0--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 12 12:03:30 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11311
	for <midcom-archive@odin.ietf.org>; Mon, 12 Nov 2001 12:03:30 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA10360
	for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 12:03:33 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA10213;
	Mon, 12 Nov 2001 12:02:05 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA10185
	for <midcom@optimus.ietf.org>; Mon, 12 Nov 2001 12:02:04 -0500 (EST)
Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11270
	for <midcom@ietf.org>; Mon, 12 Nov 2001 12:02:00 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fACGxIx06366;
	Mon, 12 Nov 2001 08:59:19 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABX46615;
	Mon, 12 Nov 2001 09:01:02 -0800 (PST)
Message-Id: <5.1.0.14.0.20011112115843.00a62400@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Mon, 12 Nov 2001 12:03:58 -0500
To: Steve Davies <sdavies@ridgewaysystems.com>, "'midcom'" <midcom@ietf.org>
From: Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] pre-midcom candidates
In-Reply-To: <00533D13955AD411AF3800A0C9B42639E92306@ThisAddressDoesNotE
 xist>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 04:49 PM 11/12/01 +0000, Steve Davies wrote:
>Are you moving the goal-posts? 

Not at all.  The goal was and remains to do something quickly
that does NOT supplant midcom.  If we spend months and
months haggling over this we will have failed.  If we develop
something that does more-or-less what midcom will do but is
even more ugly than midcom we will have failed.  Etc.  Remember,
it's "pre-midcom," not "instead-of-midcom."

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 12 12:28:51 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12074
	for <midcom-archive@odin.ietf.org>; Mon, 12 Nov 2001 12:28:51 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA11675
	for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 12:28:54 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA11596;
	Mon, 12 Nov 2001 12:27:25 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA11565
	for <midcom@optimus.ietf.org>; Mon, 12 Nov 2001 12:27:24 -0500 (EST)
Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12041
	for <midcom@ietf.org>; Mon, 12 Nov 2001 12:27:20 -0500 (EST)
Received: from BobP [63.67.143.2] by acmepacket.com
  (SMTPD32-7.04) id A67B76C900CC; Mon, 12 Nov 2001 12:27:23 -0500
Message-ID: <007001c16b9e$de0a3420$2300000a@acmepacket.com>
From: "Bob Penfield" <bpenfield@acmepacket.com>
To: "Steve Davies" <sdavies@ridgewaysystems.com>,
        "'Melinda Shore'" <mshore@cisco.com>, "'midcom'" <midcom@ietf.org>
References: <00533D13955AD411AF3800A0C9B42639E92306@ThisAddressDoesNotExist>
Subject: Re: [midcom] pre-midcom candidates
Date: Mon, 12 Nov 2001 12:24:20 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

>
> 'develop or document a protocol or approach that allows
> clients to indirectly obtain address bindings from midcom-unaware
> middleboxes, through communications with server elements on the public
> side of the middlebox'
>
Regardless of whether its a NAT or a firewall, "indirectly obtain address
bindings .... through communications with server elements" sounds a lot more
like 'the discovery of the type of firewall/NAT combination a terminal is
behind' than 'the traversal of VoIP through any firewall/NAT combination'.
Address binding discovery is what the STUN proposal addresses rather than a
complete the VOIP solution. We're not even required to deal with the
symetric-NAT problem.

This is something that we need to submit to the IESG ASAP (in 2001). In
fact, according to the midcom web-page (which says Oct 01), we're already
late.

BTW, shouldn't we get the above verbage on the pre-midcom deliverable on the
IETF midcom web-page? It just has a milestone right now.

(-:bob



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 12 12:34:47 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12290
	for <midcom-archive@odin.ietf.org>; Mon, 12 Nov 2001 12:34:46 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA12464
	for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 12:34:48 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA12398;
	Mon, 12 Nov 2001 12:33:41 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA12370
	for <midcom@optimus.ietf.org>; Mon, 12 Nov 2001 12:33:39 -0500 (EST)
Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12263
	for <midcom@ietf.org>; Mon, 12 Nov 2001 12:33:37 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fACHXAn13809;
	Mon, 12 Nov 2001 09:33:11 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABX47767;
	Mon, 12 Nov 2001 09:32:40 -0800 (PST)
Message-Id: <5.1.0.14.0.20011112123426.00a65770@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Mon, 12 Nov 2001 12:35:36 -0500
To: "Bob Penfield" <bpenfield@acmepacket.com>, "'midcom'" <midcom@ietf.org>
From: Melinda Shore <mshore@cisco.com>
Subject: Re: [midcom] pre-midcom candidates
In-Reply-To: <007001c16b9e$de0a3420$2300000a@acmepacket.com>
References: <00533D13955AD411AF3800A0C9B42639E92306@ThisAddressDoesNotExist>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 12:24 PM 11/12/01 -0500, Bob Penfield wrote:
>BTW, shouldn't we get the above verbage on the pre-midcom deliverable on the
>IETF midcom web-page? It just has a milestone right now.

There are still discussions going on in the IESG/IAB.  I'll
let you know as soon as there's some sort of resolution.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 12 12:37:34 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA12534
	for <midcom-archive@odin.ietf.org>; Mon, 12 Nov 2001 12:37:34 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA12844
	for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 12:37:35 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA12642;
	Mon, 12 Nov 2001 12:36:00 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA12607
	for <midcom@optimus.ietf.org>; Mon, 12 Nov 2001 12:35:56 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA12410
	for <midcom@ietf.org>; Mon, 12 Nov 2001 12:35:54 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111217332327368
 ; Mon, 12 Nov 2001 17:33:24 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <WTLZJG2S>; Mon, 12 Nov 2001 17:35:11 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639E9230D@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'Melinda Shore'" <mshore@cisco.com>
Cc: "'midcom'" <midcom@ietf.org>
Subject: RE: [midcom] pre-midcom candidates
Date: Mon, 12 Nov 2001 17:35:06 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C16BA0.5E668140"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C16BA0.5E668140
Content-Type: text/plain;
	charset="ISO-8859-1"

I think I agreed. I assumed and still assume that a pre-midcom solution is a
solution that enables FW/NAT traversal through legacy equipment. Once Midcom
is finished, gradually FW/NATs would be replaced by Midcom-aware devices
obviating the pre-midcom solution. Users would migrate from pre-midcom to
Midcom because Midcom would be better. In the case of the Davies proposal, a
media intermediary is required. Midcom is better because it dispenses with
that need. The need for a pre-midcom solution is clear. The market is
stalled waiting for Midcom. But to liberate the industry the pre-midcom
solution should address, I believe, all midcom-unaware middleboxes whether
they be just a FW, a FW/NAT combination or just a NAT. 

Is this correct?

Steve

-----Original Message-----
From: Melinda Shore [mailto:mshore@cisco.com]
Sent: 12 November 2001 17:04
To: Steve Davies; 'midcom'
Subject: RE: [midcom] pre-midcom candidates


At 04:49 PM 11/12/01 +0000, Steve Davies wrote:
>Are you moving the goal-posts? 

Not at all.  The goal was and remains to do something quickly
that does NOT supplant midcom.  If we spend months and
months haggling over this we will have failed.  If we develop
something that does more-or-less what midcom will do but is
even more ugly than midcom we will have failed.  Etc.  Remember,
it's "pre-midcom," not "instead-of-midcom."

Melinda

------_=_NextPart_001_01C16BA0.5E668140
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] pre-midcom candidates</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>I think I agreed. I assumed and still assume that a =
pre-midcom solution is a solution that enables FW/NAT traversal through =
legacy equipment. Once Midcom is finished, gradually FW/NATs would be =
replaced by Midcom-aware devices obviating the pre-midcom solution. =
Users would migrate from pre-midcom to Midcom because Midcom would be =
better. In the case of the Davies proposal, a media intermediary is =
required. Midcom is better because it dispenses with that need. The =
need for a pre-midcom solution is clear. The market is stalled waiting =
for Midcom. But to liberate the industry the pre-midcom solution should =
address, I believe, all midcom-unaware middleboxes whether they be just =
a FW, a FW/NAT combination or just a NAT. </FONT></P>

<P><FONT SIZE=3D2>Is this correct?</FONT>
</P>

<P><FONT SIZE=3D2>Steve</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Melinda Shore [<A =
HREF=3D"mailto:mshore@cisco.com">mailto:mshore@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 12 November 2001 17:04</FONT>
<BR><FONT SIZE=3D2>To: Steve Davies; 'midcom'</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [midcom] pre-midcom candidates</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>At 04:49 PM 11/12/01 +0000, Steve Davies =
wrote:</FONT>
<BR><FONT SIZE=3D2>&gt;Are you moving the goal-posts? </FONT>
</P>

<P><FONT SIZE=3D2>Not at all.&nbsp; The goal was and remains to do =
something quickly</FONT>
<BR><FONT SIZE=3D2>that does NOT supplant midcom.&nbsp; If we spend =
months and</FONT>
<BR><FONT SIZE=3D2>months haggling over this we will have failed.&nbsp; =
If we develop</FONT>
<BR><FONT SIZE=3D2>something that does more-or-less what midcom will do =
but is</FONT>
<BR><FONT SIZE=3D2>even more ugly than midcom we will have =
failed.&nbsp; Etc.&nbsp; Remember,</FONT>
<BR><FONT SIZE=3D2>it's &quot;pre-midcom,&quot; not =
&quot;instead-of-midcom.&quot;</FONT>
</P>

<P><FONT SIZE=3D2>Melinda</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C16BA0.5E668140--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 12 13:19:41 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA14002
	for <midcom-archive@odin.ietf.org>; Mon, 12 Nov 2001 13:19:41 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id NAA14249
	for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 13:19:43 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA14171;
	Mon, 12 Nov 2001 13:17:40 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA14141
	for <midcom@optimus.ietf.org>; Mon, 12 Nov 2001 13:17:38 -0500 (EST)
Received: from rhenium (rhenium.btinternet.com [194.73.73.93])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA13936
	for <midcom@ietf.org>; Mon, 12 Nov 2001 13:17:36 -0500 (EST)
Received: from [213.122.130.231] (helo=tkw)
	by rhenium with smtp (Exim 3.22 #6)
	id 163LeI-0002hU-00; Mon, 12 Nov 2001 18:17:35 +0000
Message-ID: <005001c16ba6$3ee012e0$0200000a@tkw>
From: "Pete Cordell" <pete@tech-know-ware.com>
To: "Steve Davies" <sdavies@ridgewaysystems.com>,
        "'Bob Penfield'" <bpenfield@acmepacket.com>,
        "'midcom'" <midcom@ietf.org>, "Melinda Shore" <mshore@cisco.com>
References: <5.1.0.14.0.20011112105836.00a58b60@localhost>
Subject: Re: [midcom] pre-midcom candidates
Date: Mon, 12 Nov 2001 18:16:26 -0000
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

I'm just wondering if there is any point to developing a solution that does
not address the firewall.  Most enterprises will have firewalls, and the
percentage of residential firewalls can only go up.  (As has been said
elsewhere, the presence of a firewall effectively makes the NAT symmetric.
The consensus so far seems to be that such NATs need additional steps beyond
discovering what type they are to get the protocols through.)

Also, many dial-up residential cases do not have to contend with NAT at all.

My feeling is that if we don't address the firewall, we will have spent time
developing something that helps out only a very few cases, and really
doesn't move us any closer to where we want to be.

The result would be to delay real midcom with no gain.

Pete.

=============================================
Pete Cordell
Tech-Know-Ware
pete@tech-know-ware.com
+44 1473 635863
=============================================

----- Original Message -----
From: Melinda Shore <mshore@cisco.com>
To: Steve Davies <sdavies@ridgewaysystems.com>; 'Bob Penfield'
<bpenfield@acmepacket.com>; 'midcom' <midcom@ietf.org>
Sent: 12 November 2001 16:04
Subject: RE: [midcom] pre-midcom candidates


> At 02:28 PM 11/12/01 +0000, Steve Davies wrote:
> >[SD] How can you make this claim when STUN doesn't solve the NAT/FW
problem?
>
> I'd like to remind everybody that pre-midcom != midcom.  That
> is to say, the intent is to get a simple hack addressing the hard
> problem (NAT traversal) out quickly.  The work that's going to
> address NAT and firewall traversal and attempt to be thorough
> about it is midcom itself.  Please, let's not get carried away.
>
> Melinda
>
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 12 17:24:22 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA21191
	for <midcom-archive@odin.ietf.org>; Mon, 12 Nov 2001 17:24:22 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id RAA19730
	for midcom-archive@odin.ietf.org; Mon, 12 Nov 2001 17:24:24 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA19638;
	Mon, 12 Nov 2001 17:22:39 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA19582
	for <midcom@optimus.ietf.org>; Mon, 12 Nov 2001 17:22:36 -0500 (EST)
Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA21047
	for <midcom@ietf.org>; Mon, 12 Nov 2001 17:22:33 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fACMM6r08094
	for <midcom@ietf.org>; Mon, 12 Nov 2001 14:22:06 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABX59565;
	Mon, 12 Nov 2001 14:21:36 -0800 (PST)
Message-Id: <5.1.0.14.0.20011112171347.00a721f0@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Mon, 12 Nov 2001 17:24:18 -0500
To: midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: [midcom] Proposed agenda for Salt Lake City
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Notes: 
1) We will not be discussing the framework or requirements documents,
but you should be familiar with their contents in order to be prepared
for the rechartering discussion
2) You'll note that my network-friendlier draft is on the agenda.  I've
tried to be careful about not abusing my position in order to promote
fringe technology, but this document has gotten very positive feedback
and in discussion with the ADs there was agreement that it would be
discussed in the context of rechartering.  Either Scott Bradner or
Allison will be chairing that section of the meeting.
3) The pre-midcom discussion is subject to whatever constraints come
out of current offline discussions.

Melinda

Middlebox Communication WG (midcom)

Monday, December 10 at 1930-2200
==================================

CHAIR: Melinda Shore <mshore@cisco.com>

AGENDA:

Agenda bashing, scribe
Status
Rechartering
Pre-midcom

Documents:
http://www.ietf.org/internet-drafts/draft-ietf-midcom-framework-05.txt
http://www.ietf.org/internet-drafts/draft-ietf-midcom-requirements-03.txt
http://search.ietf.org/internet-drafts/draft-shore-friendly-midcom-00.txt
http://search.ietf.org/internet-drafts/draft-sen-midcom-fw-nat-00.txt
http://search.ietf.org/internet-drafts/draft-rosenberg-midcom-stun-00.txt
http://search.ietf.org/internet-drafts/draft-davies-fw-nat-traversal-01.txt 


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 13 07:13:59 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA20735
	for <midcom-archive@odin.ietf.org>; Tue, 13 Nov 2001 07:13:59 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id HAA12309
	for midcom-archive@odin.ietf.org; Tue, 13 Nov 2001 07:14:00 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id HAA11909;
	Tue, 13 Nov 2001 07:09:18 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id HAA11881
	for <midcom@optimus.ietf.org>; Tue, 13 Nov 2001 07:09:16 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA20392;
	Tue, 13 Nov 2001 07:09:14 -0500 (EST)
Message-Id: <200111131209.HAA20392@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: midcom@ietf.org
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Date: Tue, 13 Nov 2001 07:09:14 -0500
Subject: [midcom] I-D ACTION:draft-ietf-midcom-framework-05.txt
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Middlebox Communication Working Group of the IETF.

	Title		: Middlebox Communication Architecture and framework
	Author(s)	: P. Srisuresh, J. Kuthan, J. Rosenberg, 
                          A. Molitor, A. Rayhan
	Filename	: draft-ietf-midcom-framework-05.txt
	Pages		: 36
	Date		: 12-Nov-01
	
There are a variety of intermediate devices in the Internet today
that require application intelligence for their operation. 
Datagrams pertaining to real-time streaming applications such
as SIP and H.323 and peer-to-peer applications such as Napster 
and NetMeeting cannot be identified by merely examining packet
headers. .

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-midcom-framework-05.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-midcom-framework-05.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-midcom-framework-05.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20011112111907.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-midcom-framework-05.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-midcom-framework-05.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20011112111907.I-D@ietf.org>

--OtherAccess--

--NextPart--



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 13 10:10:38 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA28769
	for <midcom-archive@odin.ietf.org>; Tue, 13 Nov 2001 10:10:38 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id KAA15870
	for midcom-archive@odin.ietf.org; Tue, 13 Nov 2001 10:10:39 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA15723;
	Tue, 13 Nov 2001 10:03:17 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA15694
	for <midcom@optimus.ietf.org>; Tue, 13 Nov 2001 10:03:15 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA28110
	for <midcom@ietf.org>; Tue, 13 Nov 2001 10:03:13 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fADF2rn06615
	for <midcom@ietf.org>; Tue, 13 Nov 2001 07:02:53 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABX78225;
	Tue, 13 Nov 2001 07:02:17 -0800 (PST)
Message-Id: <5.1.0.14.0.20011113100329.00a6b350@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Tue, 13 Nov 2001 10:05:14 -0500
To: midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Subject: Fwd: [midcom] I-D ACTION:draft-ietf-midcom-framework-05.txt
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Now that the new revision of the framework draft is available I
am starting working group last call.  Please post comments to
the mailing list.  Last call will close on 27 November at 5pm PST.

Melinda

>To: IETF-Announce: ;
>Cc: midcom@ietf.org
>From: Internet-Drafts@ietf.org
>Reply-to: Internet-Drafts@ietf.org
>Date: Tue, 13 Nov 2001 07:09:14 -0500
>Subject: [midcom] I-D ACTION:draft-ietf-midcom-framework-05.txt
>Sender: midcom-admin@ietf.org
>X-Mailman-Version: 1.0
>List-Id:  <midcom.ietf.org>
>X-BeenThere: midcom@ietf.org
>
>A New Internet-Draft is available from the on-line Internet-Drafts directories.
>This draft is a work item of the Middlebox Communication Working Group of the IETF.
>
>        Title           : Middlebox Communication Architecture and framework
>        Author(s)       : P. Srisuresh, J. Kuthan, J. Rosenberg, 
>                          A. Molitor, A. Rayhan
>        Filename        : draft-ietf-midcom-framework-05.txt
>        Pages           : 36
>        Date            : 12-Nov-01
>        
>There are a variety of intermediate devices in the Internet today
>that require application intelligence for their operation. 
>Datagrams pertaining to real-time streaming applications such
>as SIP and H.323 and peer-to-peer applications such as Napster 
>and NetMeeting cannot be identified by merely examining packet
>headers. .
>
>A URL for this Internet-Draft is:
>http://www.ietf.org/internet-drafts/draft-ietf-midcom-framework-05.txt
>
>To remove yourself from the IETF Announcement list, send a message to 
>ietf-announce-request with the word unsubscribe in the body of the message.
>
>Internet-Drafts are also available by anonymous FTP. Login with the username
>"anonymous" and a password of your e-mail address. After logging in,
>type "cd internet-drafts" and then
>        "get draft-ietf-midcom-framework-05.txt".
>
>A list of Internet-Drafts directories can be found in
>http://www.ietf.org/shadow.html 
>or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
>
>
>Internet-Drafts can also be obtained by e-mail.
>
>Send a message to:
>        mailserv@ietf.org.
>In the body type:
>        "FILE /internet-drafts/draft-ietf-midcom-framework-05.txt".
>        
>NOTE:   The mail server at ietf.org can return the document in
>        MIME-encoded form by using the "mpack" utility.  To use this
>        feature, insert the command "ENCODING mime" before the "FILE"
>        command.  To decode the response(s), you will need "munpack" or
>        a MIME-compliant mail reader.  Different MIME-compliant mail readers
>        exhibit different behavior, especially when dealing with
>        "multipart" MIME messages (i.e. documents which have been split
>        up into multiple messages), so check your local documentation on
>        how to manipulate these messages.
>                
>                
>Below is the data which will enable a MIME compliant mail reader
>implementation to automatically retrieve the ASCII version of the
>Internet-Draft.
>Content-Type: text/plain
>Content-ID:     <20011112111907.I-D@ietf.org>
>
>ENCODING mime
>FILE /internet-drafts/draft-ietf-midcom-framework-05.txt
>
><ftp://ftp.ietf.org/internet-drafts/draft-ietf-midcom-framework-05.txt>


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 13 13:00:20 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA08929
	for <midcom-archive@odin.ietf.org>; Tue, 13 Nov 2001 13:00:19 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id NAA20865
	for midcom-archive@odin.ietf.org; Tue, 13 Nov 2001 13:00:21 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA20641;
	Tue, 13 Nov 2001 12:57:06 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA20609
	for <midcom@optimus.ietf.org>; Tue, 13 Nov 2001 12:57:03 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA08722
	for <midcom@ietf.org>; Tue, 13 Nov 2001 12:57:01 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111317534422303
 ; Tue, 13 Nov 2001 17:53:44 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <WTLZJHKJ>; Tue, 13 Nov 2001 17:56:20 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639172435@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'Melinda Shore'" <mshore@cisco.com>, midcom@ietf.org
Subject: RE: [midcom] Proposed agenda for Salt Lake City
Date: Tue, 13 Nov 2001 17:56:13 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C16C6C.7C315480"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C16C6C.7C315480
Content-Type: text/plain;
	charset="ISO-8859-1"

Melinda,

re: 3 below.

What offline discussions are going on and who has representation in them?

Steve
www.ridgewaysystems.com

-----Original Message-----
From: Melinda Shore [mailto:mshore@cisco.com]
Sent: 12 November 2001 22:24
To: midcom@ietf.org
Subject: [midcom] Proposed agenda for Salt Lake City


Notes: 
1) We will not be discussing the framework or requirements documents,
but you should be familiar with their contents in order to be prepared
for the rechartering discussion
2) You'll note that my network-friendlier draft is on the agenda.  I've
tried to be careful about not abusing my position in order to promote
fringe technology, but this document has gotten very positive feedback
and in discussion with the ADs there was agreement that it would be
discussed in the context of rechartering.  Either Scott Bradner or
Allison will be chairing that section of the meeting.
3) The pre-midcom discussion is subject to whatever constraints come
out of current offline discussions.

Melinda

Middlebox Communication WG (midcom)

Monday, December 10 at 1930-2200
==================================

CHAIR: Melinda Shore <mshore@cisco.com>

AGENDA:

Agenda bashing, scribe
Status
Rechartering
Pre-midcom

Documents:
http://www.ietf.org/internet-drafts/draft-ietf-midcom-framework-05.txt
http://www.ietf.org/internet-drafts/draft-ietf-midcom-requirements-03.txt
http://search.ietf.org/internet-drafts/draft-shore-friendly-midcom-00.txt
http://search.ietf.org/internet-drafts/draft-sen-midcom-fw-nat-00.txt
http://search.ietf.org/internet-drafts/draft-rosenberg-midcom-stun-00.txt
http://search.ietf.org/internet-drafts/draft-davies-fw-nat-traversal-01.txt 


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C16C6C.7C315480
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] Proposed agenda for Salt Lake City</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Melinda,</FONT>
</P>

<P><FONT SIZE=3D2>re: 3 below.</FONT>
</P>

<P><FONT SIZE=3D2>What offline discussions are going on and who has =
representation in them?</FONT>
</P>

<P><FONT SIZE=3D2>Steve</FONT>
<BR><FONT SIZE=3D2>www.ridgewaysystems.com</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Melinda Shore [<A =
HREF=3D"mailto:mshore@cisco.com">mailto:mshore@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 12 November 2001 22:24</FONT>
<BR><FONT SIZE=3D2>To: midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>Subject: [midcom] Proposed agenda for Salt Lake =
City</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Notes: </FONT>
<BR><FONT SIZE=3D2>1) We will not be discussing the framework or =
requirements documents,</FONT>
<BR><FONT SIZE=3D2>but you should be familiar with their contents in =
order to be prepared</FONT>
<BR><FONT SIZE=3D2>for the rechartering discussion</FONT>
<BR><FONT SIZE=3D2>2) You'll note that my network-friendlier draft is =
on the agenda.&nbsp; I've</FONT>
<BR><FONT SIZE=3D2>tried to be careful about not abusing my position in =
order to promote</FONT>
<BR><FONT SIZE=3D2>fringe technology, but this document has gotten very =
positive feedback</FONT>
<BR><FONT SIZE=3D2>and in discussion with the ADs there was agreement =
that it would be</FONT>
<BR><FONT SIZE=3D2>discussed in the context of rechartering.&nbsp; =
Either Scott Bradner or</FONT>
<BR><FONT SIZE=3D2>Allison will be chairing that section of the =
meeting.</FONT>
<BR><FONT SIZE=3D2>3) The pre-midcom discussion is subject to whatever =
constraints come</FONT>
<BR><FONT SIZE=3D2>out of current offline discussions.</FONT>
</P>

<P><FONT SIZE=3D2>Melinda</FONT>
</P>

<P><FONT SIZE=3D2>Middlebox Communication WG (midcom)</FONT>
</P>

<P><FONT SIZE=3D2>Monday, December 10 at 1930-2200</FONT>
<BR><FONT =
SIZE=3D2>=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D</FONT>
</P>

<P><FONT SIZE=3D2>CHAIR: Melinda Shore &lt;mshore@cisco.com&gt;</FONT>
</P>

<P><FONT SIZE=3D2>AGENDA:</FONT>
</P>

<P><FONT SIZE=3D2>Agenda bashing, scribe</FONT>
<BR><FONT SIZE=3D2>Status</FONT>
<BR><FONT SIZE=3D2>Rechartering</FONT>
<BR><FONT SIZE=3D2>Pre-midcom</FONT>
</P>

<P><FONT SIZE=3D2>Documents:</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://www.ietf.org/internet-drafts/draft-ietf-midcom-framework-=
05.txt" =
TARGET=3D"_blank">http://www.ietf.org/internet-drafts/draft-ietf-midcom-=
framework-05.txt</A></FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://www.ietf.org/internet-drafts/draft-ietf-midcom-requiremen=
ts-03.txt" =
TARGET=3D"_blank">http://www.ietf.org/internet-drafts/draft-ietf-midcom-=
requirements-03.txt</A></FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://search.ietf.org/internet-drafts/draft-shore-friendly-midc=
om-00.txt" =
TARGET=3D"_blank">http://search.ietf.org/internet-drafts/draft-shore-fri=
endly-midcom-00.txt</A></FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://search.ietf.org/internet-drafts/draft-sen-midcom-fw-nat-0=
0.txt" =
TARGET=3D"_blank">http://search.ietf.org/internet-drafts/draft-sen-midco=
m-fw-nat-00.txt</A></FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://search.ietf.org/internet-drafts/draft-rosenberg-midcom-st=
un-00.txt" =
TARGET=3D"_blank">http://search.ietf.org/internet-drafts/draft-rosenberg=
-midcom-stun-00.txt</A></FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://search.ietf.org/internet-drafts/draft-davies-fw-nat-trave=
rsal-01.txt" =
TARGET=3D"_blank">http://search.ietf.org/internet-drafts/draft-davies-fw=
-nat-traversal-01.txt</A> </FONT>
</P>
<BR>

<P><FONT =
SIZE=3D2>_______________________________________________</FONT>
<BR><FONT SIZE=3D2>midcom mailing list</FONT>
<BR><FONT SIZE=3D2>midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://www1.ietf.org/mailman/listinfo/midcom" =
TARGET=3D"_blank">http://www1.ietf.org/mailman/listinfo/midcom</A></FONT=
>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C16C6C.7C315480--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 13 13:17:45 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA09930
	for <midcom-archive@odin.ietf.org>; Tue, 13 Nov 2001 13:17:45 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id NAA21496
	for midcom-archive@odin.ietf.org; Tue, 13 Nov 2001 13:17:47 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA21401;
	Tue, 13 Nov 2001 13:15:37 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA21371
	for <midcom@optimus.ietf.org>; Tue, 13 Nov 2001 13:15:36 -0500 (EST)
Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA09795
	for <midcom@ietf.org>; Tue, 13 Nov 2001 13:15:33 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fADIF6n06829;
	Tue, 13 Nov 2001 10:15:06 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABX84258;
	Tue, 13 Nov 2001 10:14:36 -0800 (PST)
Message-Id: <5.1.0.14.0.20011113131542.00a7e040@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Tue, 13 Nov 2001 13:17:13 -0500
To: Steve Davies <sdavies@ridgewaysystems.com>, midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] Proposed agenda for Salt Lake City
In-Reply-To: <00533D13955AD411AF3800A0C9B42639172435@ThisAddressDoesNotE
 xist>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 05:56 PM 11/13/01 +0000, Steve Davies wrote:
>What offline discussions are going on and who has representation in them? 

It's a discussion among IESG and IAB member regarding whether
or not we are loosing evil in the world.  I am not involved.  Indeed,
the fewer people involved in that one, the better.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 13 20:59:38 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA24442
	for <midcom-archive@odin.ietf.org>; Tue, 13 Nov 2001 20:59:38 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id UAA02027
	for midcom-archive@odin.ietf.org; Tue, 13 Nov 2001 20:59:40 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id UAA01990;
	Tue, 13 Nov 2001 20:57:06 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id UAA01961
	for <midcom@optimus.ietf.org>; Tue, 13 Nov 2001 20:57:00 -0500 (EST)
Received: from calliope1.fm.intel.com (fmfdns01.fm.intel.com [132.233.247.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA24428
	for <midcom@ietf.org>; Tue, 13 Nov 2001 20:56:56 -0500 (EST)
Received: from fmsmsxvs042.fm.intel.com (fmsmsxvs042.fm.intel.com [132.233.42.128])
	by calliope1.fm.intel.com (8.9.1a+p1/8.9.1/d: relay.m4,v 1.46 2001/10/25 21:02:55 root Exp $) with SMTP id BAA05929
	for <midcom@ietf.org>; Wed, 14 Nov 2001 01:56:58 GMT
Received: from FMSMSX016.fm.intel.com ([132.233.42.195])
 by fmsmsxvs042.fm.intel.com (NAVGW 2.5.1.6) with SMTP id M2001111317573709876
 ; Tue, 13 Nov 2001 17:57:37 -0800
Received: by fmsmsx016.fm.intel.com with Internet Mail Service (5.5.2653.19)
	id <WY98SCZC>; Tue, 13 Nov 2001 17:56:58 -0800
Message-ID: <AA5ED351DFA4D5118A2C00508B68BB7E68C5A7@orsmsx109.jf.intel.com>
From: "Meyer, Greg W" <greg.w.meyer@intel.com>
To: "'Pete Cordell'" <pete@tech-know-ware.com>,
        Steve Davies<sdavies@ridgewaysystems.com>,
        "'Bob Penfield'" <bpenfield@acmepacket.com>,
        "'midcom'" <midcom@ietf.org>, Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] pre-midcom candidates
Date: Tue, 13 Nov 2001 17:56:51 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

I agree with Pete; I would favor a solution that addresses both firewall and
NAT. The trade-offs Jonathan raise about the Davies approach are very
acceptable given pre-midcom is temporary (until midcom is deployed). Any
short-term solution that doesn't account for today's most deployed networks
simply defeats the purpose.

Greg Meyer
Intel Labs


-----Original Message-----
From: Pete Cordell [mailto:pete@tech-know-ware.com]
Sent: Monday, November 12, 2001 10:16 AM
To: Steve Davies; 'Bob Penfield'; 'midcom'; Melinda Shore
Subject: Re: [midcom] pre-midcom candidates


I'm just wondering if there is any point to developing a solution that does
not address the firewall.  Most enterprises will have firewalls, and the
percentage of residential firewalls can only go up.  (As has been said
elsewhere, the presence of a firewall effectively makes the NAT symmetric.
The consensus so far seems to be that such NATs need additional steps beyond
discovering what type they are to get the protocols through.)

Also, many dial-up residential cases do not have to contend with NAT at all.

My feeling is that if we don't address the firewall, we will have spent time
developing something that helps out only a very few cases, and really
doesn't move us any closer to where we want to be.

The result would be to delay real midcom with no gain.

Pete.

=============================================
Pete Cordell
Tech-Know-Ware
pete@tech-know-ware.com
+44 1473 635863
=============================================

----- Original Message -----
From: Melinda Shore <mshore@cisco.com>
To: Steve Davies <sdavies@ridgewaysystems.com>; 'Bob Penfield'
<bpenfield@acmepacket.com>; 'midcom' <midcom@ietf.org>
Sent: 12 November 2001 16:04
Subject: RE: [midcom] pre-midcom candidates


> At 02:28 PM 11/12/01 +0000, Steve Davies wrote:
> >[SD] How can you make this claim when STUN doesn't solve the NAT/FW
problem?
>
> I'd like to remind everybody that pre-midcom != midcom.  That
> is to say, the intent is to get a simple hack addressing the hard
> problem (NAT traversal) out quickly.  The work that's going to
> address NAT and firewall traversal and attempt to be thorough
> about it is midcom itself.  Please, let's not get carried away.
>
> Melinda
>
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Wed Nov 14 09:35:49 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA24659
	for <midcom-archive@odin.ietf.org>; Wed, 14 Nov 2001 09:35:49 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id JAA25448
	for midcom-archive@odin.ietf.org; Wed, 14 Nov 2001 09:35:53 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA25397;
	Wed, 14 Nov 2001 09:34:11 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA25372
	for <midcom@optimus.ietf.org>; Wed, 14 Nov 2001 09:34:09 -0500 (EST)
Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA24589
	for <midcom@ietf.org>; Wed, 14 Nov 2001 09:34:04 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fAEEVNx05118
	for <midcom@ietf.org>; Wed, 14 Nov 2001 06:31:23 -0800 (PST)
Received: from spandex.cisco.com (ssh-sj1.cisco.com [171.68.225.134])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABY12472;
	Wed, 14 Nov 2001 06:33:09 -0800 (PST)
Message-Id: <5.1.0.14.0.20011114093257.00a5aba0@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Wed, 14 Nov 2001 09:36:07 -0500
To: midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: [midcom] Requirements draft
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

There have not yet been any comments on the revised requirements
draft.  I'd like to get it into last call ASAP, but both the
contents and the format have been points of fairly raucous 
contention in the past and I'd be hard-pressed to believe that
everybody thinks the current document doesn't need editing.
Please have a look at it and post comments to the mailing list.

Thanks,

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Wed Nov 14 15:40:43 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA15677
	for <midcom-archive@odin.ietf.org>; Wed, 14 Nov 2001 15:40:43 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA09298
	for midcom-archive@odin.ietf.org; Wed, 14 Nov 2001 15:40:47 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA09205;
	Wed, 14 Nov 2001 15:35:08 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA09172
	for <midcom@optimus.ietf.org>; Wed, 14 Nov 2001 15:35:05 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA15454
	for <midcom@ietf.org>; Wed, 14 Nov 2001 15:35:01 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAEKXECJ025197
	for <midcom@ietf.org>; Wed, 14 Nov 2001 15:33:14 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <W5C2JDJX>; Wed, 14 Nov 2001 15:34:34 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6E99@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'midcom@ietf.org'" <midcom@ietf.org>
Date: Wed, 14 Nov 2001 15:34:28 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Subject: [midcom] new I-D on "symmetric STUN"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Folks,

I've talked in the past about the fact that STUN used to have a bit about
handling the symmetric case, but that we yanked it out since its
sufficiently orthonogonal (and a fairly crowded space). I've just submitted
an I-D that documents that piece of the solution. Its a very simple
mechanism, more or less the same as STUN, which uses a relay server. The
protocol is called "Traversal Using Relay NAT" or TURN. Until it appears in
the archives, you can pick up a copy at:

http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt

Thanks,
Jonathan R.

---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com
 

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Wed Nov 14 23:53:16 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA28220
	for <midcom-archive@odin.ietf.org>; Wed, 14 Nov 2001 23:53:16 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id XAA23429
	for midcom-archive@odin.ietf.org; Wed, 14 Nov 2001 23:53:21 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA22761;
	Wed, 14 Nov 2001 23:17:28 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA22729
	for <midcom@ns.ietf.org>; Wed, 14 Nov 2001 23:17:27 -0500 (EST)
Received: from qtech1.quarrytech.com (email.quarrytech.com [4.17.144.4])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA27488
	for <midcom@ietf.org>; Wed, 14 Nov 2001 23:16:02 -0500 (EST)
Received: from mduffy (10.1.1.254 [10.1.1.254]) by qtech1.quarrytech.com with SMTP (Microsoft Exchange Internet Mail Service Version 5.5.2653.13)
	id WS2P2NFW; Wed, 14 Nov 2001 23:15:35 -0500
Message-Id: <3.0.5.32.20011114230552.00930bf0@email.quarrytech.com>
X-Sender: mduffy@email.quarrytech.com
X-Mailer: QUALCOMM Windows Eudora Pro Version 3.0.5 (32)
Date: Wed, 14 Nov 2001 23:05:52 -0500
To: midcom@ietf.org
From: Mark Duffy <mduffy@quarrytech.com>
In-Reply-To: <200111091211.HAA07510@ietf.org>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: [midcom] Re: I-D ACTION:draft-ietf-midcom-requirements-03.txt
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Hi, I just have a few comments/suggestions, both in the "nit" category.

Sect 2.1.3, 2nd para, it explains why we must support multiple agents to
one middlebox:  "There may be multiple instances of a single application or
multiple      applications desiring service from a single middlebox."  To
really connect this to the point it is trying to support, I suggest
extending the sentence with "and different agents may represent them."

2.1.12 "Rulesets that partially overlap other rulesets can create
nondeterministic behavior and must not be permitted."   This sentence is
much more restrictive than the requirement statement it purports to
explain.  I think what it should be saying is that the nondeterministic
behavior must not be permitted, not that the overlapping rules must not be
permitted!  I suggest rewording it thus: "The protocol must preclude
nondeterministic behavior in the case of overlapping rulesets, e.g. by
ensuring that some known precedence is imposed on overlapping rulesets."
Either that or just s/and must not/which must not/  in the original sentence.

Thanks, Mark




_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov 15 08:24:24 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA21683
	for <midcom-archive@odin.ietf.org>; Thu, 15 Nov 2001 08:24:24 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id IAA13510
	for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 08:24:25 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA13421;
	Thu, 15 Nov 2001 08:22:05 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA13391
	for <midcom@optimus.ietf.org>; Thu, 15 Nov 2001 08:22:03 -0500 (EST)
Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA21493
	for <midcom@ietf.org>; Thu, 15 Nov 2001 08:22:01 -0500 (EST)
Received: from BobP [63.67.143.2] by acmepacket.com
  (SMTPD32-7.04) id A1789ADC0254; Thu, 15 Nov 2001 08:22:00 -0500
Message-ID: <001d01c16dd6$e1c07540$2300000a@acmepacket.com>
From: "Bob Penfield" <bpenfield@acmepacket.com>
To: <midcom@ietf.org>, "Melinda Shore" <mshore@cisco.com>
References: <5.1.0.14.0.20011114093257.00a5aba0@localhost>
Subject: Re: [midcom] Requirements draft
Date: Thu, 15 Nov 2001 08:10:19 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Hi,

I have some comments on the requirements draft, mostly nits.

2.1.2: 1st para: s/middleboxe/middlebox/

2.1.3: I agree with Mark that the reasoning should mention multiple midcom
agents.

2.1.4: 2nd para: s/The states/This states/

2.1.5: 2nd para: s/provide identifying clear identification/provide clear
identification/

2.1.7: There may also be events that the agent would be interested in that
may not necessarily result in the closing of pinholes or freeing of
resources. For example, an agent might be interested in knowing when packets
for a given ruleset start or stop flowing.

2.1.11: 1st para: s/types of middlebox/types of middleboxes/

2.1.11: 2nd para: s/support other/support for other/

2.1.11: This may also include capability discovery/negotiation so that peers
can determine the set of operations and attributes that both support.

2.1.12: I agree with Mark that the protocol should define ruleset precedence
so that behavior of such overlaps is deterministic.

2.2.1: 1st para s/dopted/adopted/

2.2.1: There may also be new attributes or options (as implied by 2.2.5)
added to message types. For example,  additional filtering elements.

2.2.2: The last sentence of the 2nd paragraph is a bit confusing. I suggest:

    A midcom agent ought to be able to have a single midcom *session* with
    a middlebox and use that single session to access different middlebox
    functions on the same middlebox interface.

2.2.5: 2nd para: s/accomodate/accommodate/

2.2.6: s/behaviour/behavior/

2.2.7: The reason for this requirement is related to 2.1.5. Where there is
redundancy in the application, a redundant or backup midcom agent will need
to maintain and/or remove a ruleset created by a failed midcom agent.

cheers,
(-:bob

Robert F. Penfield
Chief Software Architect
Acme Packet, Inc.
130 New Boston Street
Woburn, MA 01801
bpenfield@acmepacket.com



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 15 12:23:10 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA05633
	for <midcom-archive@odin.ietf.org>; Thu, 15 Nov 2001 12:23:10 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA27997
	for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 12:23:13 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA27907;
	Thu, 15 Nov 2001 12:20:10 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA27879
	for <midcom@ns.ietf.org>; Thu, 15 Nov 2001 12:20:08 -0500 (EST)
Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA05364
	for <midcom@ietf.org>; Thu, 15 Nov 2001 12:20:03 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fAFHJOW24364
	for <midcom@ietf.org>; Thu, 15 Nov 2001 09:19:24 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABY50620;
	Thu, 15 Nov 2001 09:18:56 -0800 (PST)
Message-Id: <5.1.0.14.0.20011115121841.00a9add0@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Thu, 15 Nov 2001 12:21:46 -0500
To: midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: [midcom] Requirements drafts
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Many thanks to Mark and Bob for their comments, which I've
incorporated into the document.  If you haven't already done
so, please try to take a look at the document and get comments
to the mailing list in the next day or so.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 15 12:53:52 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA07906
	for <midcom-archive@odin.ietf.org>; Thu, 15 Nov 2001 12:53:52 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA29223
	for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 12:53:54 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA29204;
	Thu, 15 Nov 2001 12:51:34 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA29173
	for <midcom@ns.ietf.org>; Thu, 15 Nov 2001 12:51:31 -0500 (EST)
Received: from Mitel.COM ([216.191.234.70])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA07680
	for <midcom@ietf.org>; Thu, 15 Nov 2001 12:51:29 -0500 (EST)
From: Tom_Gray@mitel.com
Received: from kanmta01.software.mitel.com (kanmta01 [134.199.37.58]) 
	by Mitel.COM (V8/MAIL-RELAY-2.1) with SMTP id MAA29962
	for <midcom@ietf.org>; Thu, 15 Nov 2001 12:50:44 -0500 (EST)
Received: by kanmta01.software.mitel.com(Lotus SMTP MTA v4.6.7  (934.1 12-30-1999))  id 85256B05.0061C768 ; Thu, 15 Nov 2001 12:48:00 -0500
X-Lotus-FromDomain: MITEL
To: midcom@ietf.org
Message-ID: <85256B05.0061C5D8.00@kanmta01.software.mitel.com>
Date: Thu, 15 Nov 2001 12:50:37 -0500
Mime-Version: 1.0
Content-type: text/plain; charset=us-ascii
Content-Disposition: inline
Subject: [midcom] STUN/TURN proposal
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



From:  Tom Gray@MITEL on 11/15/2001 12:50 PM

The STUN protocol discovers the type of NAT used. How often is it contemplated
that the protocol would be run in a typical installation? Would it typically  be
for every VoIPcall or at a lower rate than that.



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 15 14:09:52 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA12500
	for <midcom-archive@odin.ietf.org>; Thu, 15 Nov 2001 14:09:51 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id OAA01581
	for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 14:09:54 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA01487;
	Thu, 15 Nov 2001 14:08:15 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA01457
	for <midcom@ns.ietf.org>; Thu, 15 Nov 2001 14:08:11 -0500 (EST)
Received: from hotmail.com (f147.pav1.hotmail.com [64.4.31.147])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA12321
	for <midcom@ietf.org>; Thu, 15 Nov 2001 14:08:08 -0500 (EST)
Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
	 Thu, 15 Nov 2001 11:07:39 -0800
Received: from 207.5.1.168 by pv1fd.pav1.hotmail.msn.com with HTTP;
	Thu, 15 Nov 2001 19:07:39 GMT
X-Originating-IP: [207.5.1.168]
From: "James Ho" <jamesho37@hotmail.com>
To: jdrosen@dynamicsoft.com, mshore@cisco.com, midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates
Date: Thu, 15 Nov 2001 11:07:39 -0800
Mime-Version: 1.0
Content-Type: text/plain; format=flowed
Message-ID: <F147XcrXFO2sjcrO5n70001491d@hotmail.com>
X-OriginalArrivalTime: 15 Nov 2001 19:07:39.0927 (UTC) FILETIME=[CBB14270:01C16E08]
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Two issues pertaining to the pre-midcom work that I still don't
have clarity around.

1. What are the specific latency/peformance issues associated with
tunnelling/VPN appraoches? While admitedly there is another device
in the picture, as I mentioned before, there are available/evolving
hw solutions for integrate wire-speed IPsec processing
enabling tunnel de/encapsulation at wire-speeds, so theoretically
this should not be an issue.

2. what is the benefit of developing new/additional approaches
for secure tunneling when there are existing standards in place
for this (e.g. IPsec)? From Jonathan's e-mail, it would seem that
the answer to this is 'no'. Is there a concensus around this
(I understand there is a philosophical debate underway on this but my
interest is in the technical issues)?


>From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
>To: "'James Ho'" <jamesho37@hotmail.com>, mshore@cisco.com, midcom@ietf.org
>Subject: RE: [midcom] pre-midcom candidates
>Date: Tue, 6 Nov 2001 00:41:28 -0500
>
>
>
>
>
> > -----Original Message-----
> > From: James Ho [mailto:jamesho37@hotmail.com]
> > Sent: Friday, November 02, 2001 6:51 PM
> > To: mshore@cisco.com; midcom@ietf.org
> > Subject: RE: [midcom] pre-midcom candidates
> >
> >
> > My earlier e-mail was only regarding the pre-midcom drafts
> > (i.e. the requirements for the new midcom framework are clear while
> > I'm not clear on the need to come up with a new protocol standard
> > vs. use of an existing protocol standard for the pre-midcom work).
> > Sorry if I'm bringing up issues that may have been hashedout before.
>
>THis is indeed a good question, and its the point I have been trying to
>make. There are a variety of VPN solutions, and many of them allow
>applications to traverse nat. There are drawbacks of the VPN solutions -
>increased latency and increased data traffic to the provider. Any solution
>which retains these drawbacks is just going to define yet-another VPN
>approach, and its not clear what the value of that is. There IS immmediate
>value in a solution that does not suffer these problems, and therefore does
>something different from VPN will do. That is the point to the stun
>proposal.
>
>-Jonathan R.
>
>---
>Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
>Chief Scientist                             First Floor
>dynamicsoft                                 East Hanover, NJ 07936
>jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
>http://www.jdrosen.net                      PHONE: (973) 952-5000
>http://www.dynamicsoft.com


_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 15 16:45:42 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA22836
	for <midcom-archive@odin.ietf.org>; Thu, 15 Nov 2001 16:45:42 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id QAA06620
	for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 16:45:44 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA06577;
	Thu, 15 Nov 2001 16:43:09 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA06548
	for <midcom@ns.ietf.org>; Thu, 15 Nov 2001 16:43:08 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id QAA22713
	for <midcom@ietf.org>; Thu, 15 Nov 2001 16:43:05 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111521394428208
 ; Thu, 15 Nov 2001 21:39:44 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <W9XMVSZR>; Thu, 15 Nov 2001 21:42:18 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639E923BB@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
Subject: RE: [midcom] new I-D on "symmetric STUN"
Date: Thu, 15 Nov 2001 21:42:12 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C16E1E.62968370"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C16E1E.62968370
Content-Type: text/plain;
	charset="ISO-8859-1"

Interesting TURN of events or should I say 'U TURN'. 

Puns aside, this proposal says nothing that hasn't already been proposed.
While I am pleased to see TURN uses IDENTICAL concepts to the Davies
proposal, it contains many flaws (too numerous to go into here). Fix those
flaws and you end up with the Davies proposal. Not only does TURN come a
month after the deadline set in Melinda's rules of engagement, but the
development of such a new and immature proposal is by definition not in the
best interests of a pre-midcom solution. If we agree on the concepts and
Jonathan et al are interested in a quick solution, then surely it makes
sense to jointly work on the most mature incarnation of those concepts. Why
re-invent the wheel?

Steve 

-----Original Message-----
From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com]
Sent: 14 November 2001 20:34
To: 'midcom@ietf.org'
Subject: [midcom] new I-D on "symmetric STUN"


Folks,

I've talked in the past about the fact that STUN used to have a bit about
handling the symmetric case, but that we yanked it out since its
sufficiently orthonogonal (and a fairly crowded space). I've just submitted
an I-D that documents that piece of the solution. Its a very simple
mechanism, more or less the same as STUN, which uses a relay server. The
protocol is called "Traversal Using Relay NAT" or TURN. Until it appears in
the archives, you can pick up a copy at:

http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt

Thanks,
Jonathan R.

---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com
 

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C16E1E.62968370
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] new I-D on &quot;symmetric STUN&quot;</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Interesting TURN of events or should I say 'U TURN'. =
</FONT>
</P>

<P><FONT SIZE=3D2>Puns aside, this proposal says nothing that hasn't =
already been proposed. While I am pleased to see TURN uses IDENTICAL =
concepts to the Davies proposal, it contains many flaws (too numerous =
to go into here). Fix those flaws and you end up with the Davies =
proposal. Not only does TURN come a month after the deadline set in =
Melinda's rules of engagement, but the development of such a new and =
immature proposal is by definition not in the best interests of a =
pre-midcom solution. If we agree on the concepts and Jonathan et al are =
interested in a quick solution, then surely it makes sense to jointly =
work on the most mature incarnation of those concepts. Why re-invent =
the wheel?</FONT></P>

<P><FONT SIZE=3D2>Steve </FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Jonathan Rosenberg [<A =
HREF=3D"mailto:jdrosen@dynamicsoft.com">mailto:jdrosen@dynamicsoft.com</=
A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 14 November 2001 20:34</FONT>
<BR><FONT SIZE=3D2>To: 'midcom@ietf.org'</FONT>
<BR><FONT SIZE=3D2>Subject: [midcom] new I-D on &quot;symmetric =
STUN&quot;</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Folks,</FONT>
</P>

<P><FONT SIZE=3D2>I've talked in the past about the fact that STUN used =
to have a bit about</FONT>
<BR><FONT SIZE=3D2>handling the symmetric case, but that we yanked it =
out since its</FONT>
<BR><FONT SIZE=3D2>sufficiently orthonogonal (and a fairly crowded =
space). I've just submitted</FONT>
<BR><FONT SIZE=3D2>an I-D that documents that piece of the solution. =
Its a very simple</FONT>
<BR><FONT SIZE=3D2>mechanism, more or less the same as STUN, which uses =
a relay server. The</FONT>
<BR><FONT SIZE=3D2>protocol is called &quot;Traversal Using Relay =
NAT&quot; or TURN. Until it appears in</FONT>
<BR><FONT SIZE=3D2>the archives, you can pick up a copy at:</FONT>
</P>

<P><FONT SIZE=3D2><A =
HREF=3D"http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt=
" =
TARGET=3D"_blank">http://www.jdrosen.net/papers/draft-rosenberg-midcom-t=
urn-00.txt</A></FONT>
</P>

<P><FONT SIZE=3D2>Thanks,</FONT>
<BR><FONT SIZE=3D2>Jonathan R.</FONT>
</P>

<P><FONT SIZE=3D2>---</FONT>
<BR><FONT SIZE=3D2>Jonathan D. Rosenberg, =
Ph.D.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; 72 Eagle Rock Ave.</FONT>
<BR><FONT SIZE=3D2>Chief =
Scientist&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; First Floor</FONT>
<BR><FONT =
SIZE=3D2>dynamicsoft&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
East Hanover, NJ 07936</FONT>
<BR><FONT =
SIZE=3D2>jdrosen@dynamicsoft.com&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp; FAX:&nbsp;&nbsp; (973) 952-5050</FONT>
<BR><FONT SIZE=3D2><A HREF=3D"http://www.jdrosen.net" =
TARGET=3D"_blank">http://www.jdrosen.net</A>&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; PHONE: (973) 952-5000</FONT>
<BR><FONT SIZE=3D2><A HREF=3D"http://www.dynamicsoft.com" =
TARGET=3D"_blank">http://www.dynamicsoft.com</A></FONT>
<BR><FONT SIZE=3D2>&nbsp;</FONT>
</P>

<P><FONT =
SIZE=3D2>_______________________________________________</FONT>
<BR><FONT SIZE=3D2>midcom mailing list</FONT>
<BR><FONT SIZE=3D2>midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://www1.ietf.org/mailman/listinfo/midcom" =
TARGET=3D"_blank">http://www1.ietf.org/mailman/listinfo/midcom</A></FONT=
>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C16E1E.62968370--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 15 17:02:28 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA23680
	for <midcom-archive@odin.ietf.org>; Thu, 15 Nov 2001 17:02:28 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id RAA07324
	for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 17:02:30 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA06809;
	Thu, 15 Nov 2001 16:59:45 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA06781
	for <midcom@ns.ietf.org>; Thu, 15 Nov 2001 16:59:43 -0500 (EST)
Received: from mail.netscreen.com (mail.netscreen.com [63.126.135.15])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA23541
	for <midcom@ietf.org>; Thu, 15 Nov 2001 16:59:40 -0500 (EST)
Received: from ns-ca.netscreen.com (ns-ca.netscreen.com [10.100.10.21])
	by mail.netscreen.com (8.10.0/8.10.0) with ESMTP id fAFLZnU23416;
	Thu, 15 Nov 2001 13:35:49 -0800
Received: by NS-CA with Internet Mail Service (5.5.2653.19)
	id <WX609KXM>; Thu, 15 Nov 2001 13:58:30 -0800
Message-ID: <B162270C965FD511AB9600B0D0B0AB426E3C50@NAPA>
From: John LaCour <jlacour@netscreen.com>
To: "'Steve Davies'" <sdavies@ridgewaysystems.com>,
        "'Jonathan Rosenberg'"
	 <jdrosen@dynamicsoft.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
Subject: RE: [midcom] new I-D on "symmetric STUN"
Date: Thu, 15 Nov 2001 13:57:41 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C16E20.8C907210"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C16E20.8C907210
Content-Type: text/plain;
	charset="iso-8859-1"

Steve,
 
You may or may not be correct, but this message does next to nothing
to help any of us evaluate the merits of either proposal.
 
Just because something was created earlier or even implemented doesn't
make it inherently better.
 
Rather than try to strong-arm us, you really need to enumerate the many
flaws and how your proposal addresses them.  If you want to be
completely forthcoming coming you should also discuss the weaknesses
of your own proposal and why you've made those trade-offs.
 
In fairness to you and Jonathan, I haven't done a thorough review of
either proposal yet.  This message should not be misconstrued
as  supporting either proposal.  Rather I'm trying to encourage
you to tell us something useful.
 
-John

-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: Thursday, November 15, 2001 1:42 PM
To: 'Jonathan Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric STUN"



Interesting TURN of events or should I say 'U TURN'. 

Puns aside, this proposal says nothing that hasn't already been proposed.
While I am pleased to see TURN uses IDENTICAL concepts to the Davies
proposal, it contains many flaws (too numerous to go into here). Fix those
flaws and you end up with the Davies proposal. Not only does TURN come a
month after the deadline set in Melinda's rules of engagement, but the
development of such a new and immature proposal is by definition not in the
best interests of a pre-midcom solution. If we agree on the concepts and
Jonathan et al are interested in a quick solution, then surely it makes
sense to jointly work on the most mature incarnation of those concepts. Why
re-invent the wheel?

Steve 

-----Original Message----- 
From: Jonathan Rosenberg [ mailto:jdrosen@dynamicsoft.com
<mailto:jdrosen@dynamicsoft.com> ] 
Sent: 14 November 2001 20:34 
To: 'midcom@ietf.org' 
Subject: [midcom] new I-D on "symmetric STUN" 


Folks, 

I've talked in the past about the fact that STUN used to have a bit about 
handling the symmetric case, but that we yanked it out since its 
sufficiently orthonogonal (and a fairly crowded space). I've just submitted 
an I-D that documents that piece of the solution. Its a very simple 
mechanism, more or less the same as STUN, which uses a relay server. The 
protocol is called "Traversal Using Relay NAT" or TURN. Until it appears in 
the archives, you can pick up a copy at: 

http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt
<http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt>  

Thanks, 
Jonathan R. 

--- 
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave. 
Chief Scientist                             First Floor 
dynamicsoft                                 East Hanover, NJ 07936 
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050 
http://www.jdrosen.net <http://www.jdrosen.net>                       PHONE:
(973) 952-5000 
http://www.dynamicsoft.com <http://www.dynamicsoft.com>  
  

_______________________________________________ 
midcom mailing list 
midcom@ietf.org 
http://www1.ietf.org/mailman/listinfo/midcom
<http://www1.ietf.org/mailman/listinfo/midcom>  


------_=_NextPart_001_01C16E20.8C907210
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<TITLE>RE: [midcom] new I-D on "symmetric STUN"</TITLE>

<META content="MSHTML 5.50.4807.2300" name=GENERATOR></HEAD>
<BODY>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff 
size=2>Steve,</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff size=2>You 
may or may not be correct, but this message does next to 
nothing</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff size=2>to 
help any of us evaluate the merits of either proposal.</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff size=2>Just 
because something was created earlier or even implemented 
doesn't</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff size=2>make 
it inherently better.</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff size=2>Rather 
than try to strong-arm us, you really need to enumerate the 
many</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff size=2>flaws 
and how your proposal addresses them.&nbsp; If you want to 
be</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff 
size=2>completely forthcoming coming you should also discuss the 
weaknesses</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff size=2>of 
your own proposal and why you've made those trade-offs.</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff size=2>In 
fairness to you and Jonathan, I haven't done a thorough review 
of</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff size=2>either 
proposal yet.&nbsp; This message should not be misconstrued</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff 
size=2>as&nbsp; supporting either proposal.&nbsp; Rather I'm trying to 
encourage</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff size=2>you to 
tell us something useful.</FONT></SPAN></DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff 
size=2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=590325321-15112001><FONT face=Arial color=#0000ff 
size=2>-John</FONT></SPAN></DIV>
<BLOCKQUOTE dir=ltr 
style="PADDING-LEFT: 5px; MARGIN-LEFT: 5px; BORDER-LEFT: #0000ff 2px solid; MARGIN-RIGHT: 0px">
  <DIV class=OutlookMessageHeader dir=ltr align=left><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Steve Davies 
  [mailto:sdavies@ridgewaysystems.com]<BR><B>Sent:</B> Thursday, November 15, 
  2001 1:42 PM<BR><B>To:</B> 'Jonathan Rosenberg'; 
  'midcom@ietf.org'<BR><B>Subject:</B> RE: [midcom] new I-D on "symmetric 
  STUN"<BR><BR></FONT></DIV>
  <P><FONT size=2>Interesting TURN of events or should I say 'U TURN'. 
  </FONT></P>
  <P><FONT size=2>Puns aside, this proposal says nothing that hasn't already 
  been proposed. While I am pleased to see TURN uses IDENTICAL concepts to the 
  Davies proposal, it contains many flaws (too numerous to go into here). Fix 
  those flaws and you end up with the Davies proposal. Not only does TURN come a 
  month after the deadline set in Melinda's rules of engagement, but the 
  development of such a new and immature proposal is by definition not in the 
  best interests of a pre-midcom solution. If we agree on the concepts and 
  Jonathan et al are interested in a quick solution, then surely it makes sense 
  to jointly work on the most mature incarnation of those concepts. Why 
  re-invent the wheel?</FONT></P>
  <P><FONT size=2>Steve </FONT></P>
  <P><FONT size=2>-----Original Message-----</FONT> <BR><FONT size=2>From: 
  Jonathan Rosenberg [<A 
  href="mailto:jdrosen@dynamicsoft.com">mailto:jdrosen@dynamicsoft.com</A>]</FONT> 
  <BR><FONT size=2>Sent: 14 November 2001 20:34</FONT> <BR><FONT size=2>To: 
  'midcom@ietf.org'</FONT> <BR><FONT size=2>Subject: [midcom] new I-D on 
  "symmetric STUN"</FONT> </P><BR>
  <P><FONT size=2>Folks,</FONT> </P>
  <P><FONT size=2>I've talked in the past about the fact that STUN used to have 
  a bit about</FONT> <BR><FONT size=2>handling the symmetric case, but that we 
  yanked it out since its</FONT> <BR><FONT size=2>sufficiently orthonogonal (and 
  a fairly crowded space). I've just submitted</FONT> <BR><FONT size=2>an I-D 
  that documents that piece of the solution. Its a very simple</FONT> <BR><FONT 
  size=2>mechanism, more or less the same as STUN, which uses a relay server. 
  The</FONT> <BR><FONT size=2>protocol is called "Traversal Using Relay NAT" or 
  TURN. Until it appears in</FONT> <BR><FONT size=2>the archives, you can pick 
  up a copy at:</FONT> </P>
  <P><FONT size=2><A target=_blank 
  href="http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt">http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt</A></FONT> 
  </P>
  <P><FONT size=2>Thanks,</FONT> <BR><FONT size=2>Jonathan R.</FONT> </P>
  <P><FONT size=2>---</FONT> <BR><FONT size=2>Jonathan D. Rosenberg, 
  Ph.D.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  72 Eagle Rock Ave.</FONT> <BR><FONT size=2>Chief 
  Scientist&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  First Floor</FONT> <BR><FONT 
  size=2>dynamicsoft&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  East Hanover, NJ 07936</FONT> <BR><FONT 
  size=2>jdrosen@dynamicsoft.com&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  FAX:&nbsp;&nbsp; (973) 952-5050</FONT> <BR><FONT size=2><A target=_blank 
  href="http://www.jdrosen.net">http://www.jdrosen.net</A>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 
  PHONE: (973) 952-5000</FONT> <BR><FONT size=2><A target=_blank 
  href="http://www.dynamicsoft.com">http://www.dynamicsoft.com</A></FONT> 
  <BR><FONT size=2>&nbsp;</FONT> </P>
  <P><FONT size=2>_______________________________________________</FONT> 
  <BR><FONT size=2>midcom mailing list</FONT> <BR><FONT 
  size=2>midcom@ietf.org</FONT> <BR><FONT size=2><A target=_blank 
  href="http://www1.ietf.org/mailman/listinfo/midcom">http://www1.ietf.org/mailman/listinfo/midcom</A></FONT> 
  </P></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C16E20.8C907210--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 15 18:48:06 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA28248
	for <midcom-archive@odin.ietf.org>; Thu, 15 Nov 2001 18:48:06 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id SAA10967
	for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 18:48:09 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA10747;
	Thu, 15 Nov 2001 18:45:47 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA10717
	for <midcom@ns.ietf.org>; Thu, 15 Nov 2001 18:45:45 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA28103
	for <midcom@ietf.org>; Thu, 15 Nov 2001 18:45:41 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAFNhpCJ005077;
	Thu, 15 Nov 2001 18:43:51 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <W5C2J21P>; Thu, 15 Nov 2001 18:45:13 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6EBC@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'Steve Davies'" <sdavies@ridgewaysystems.com>,
        Jonathan Rosenberg
	 <jdrosen@dynamicsoft.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
Subject: RE: [midcom] new I-D on "symmetric STUN"
Date: Thu, 15 Nov 2001 18:45:12 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



  
-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: Thursday, November 15, 2001 4:42 PM
To: 'Jonathan Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric STUN"


>Interesting TURN of events or should I say 'U TURN'. 

This is not a u-turn at all. I have mentioned this aspect of the proposal on
the list for sometime. I myself am still hazy on the merits of an
application layer vpn style approach (which is what this, and yours, are),
as compared to pure VPN. Indeed, there is a section in my draft which begins
to discuss the issues.

>Puns aside, this proposal says nothing that hasn't already been proposed.

Really? It is not bitwise or semanticwise identical to your proposal, so how
do you claim it has already been proposed? It avoids a control connection,
which you have. It avoids tunnelling, which you do. It avoids the
complexities of the probe packets, which your proposal has, and mine does
not. Thus, how do you claim this is the same?



> While I am 
>pleased to see TURN uses IDENTICAL concepts to the Davies proposal,

See above, for at least three substantive differences. We've focused on
simplicity. Thats not the same. Both do obtain addresses for use in UDP and
TCP from an intermediary. That is certainly shared, but its also unavoidable
for a solution to the symmetric problem. Even VPN and RSIP do this too. The
differences are in how this is done.


> it contains many flaws 
>(too numerous to go into here).

A fine technical assessment! Thats right up there with "it just won't work"
and "it won't scale" in the category of vacuous criticisms.


>If we agree on the concepts and Jonathan et al are 
>interested in a quick solution, then surely it makes sense to jointly work
on the most 
>mature incarnation of those concepts. Why re-invent the wheel?

Indeed. With existing VPN solutions I am unsure about the need for TURN or
your proposal. My document at least begins to discuss what the pros and cons
might be. Interesting to note that STUN is the only protocol that actually
does something new. 

-Jonathan R.
---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 15 20:41:34 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA01329
	for <midcom-archive@odin.ietf.org>; Thu, 15 Nov 2001 20:41:34 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id UAA14038
	for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 20:41:36 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id UAA14003;
	Thu, 15 Nov 2001 20:40:00 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id UAA13927
	for <midcom@ns.ietf.org>; Thu, 15 Nov 2001 20:39:57 -0500 (EST)
Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA01306
	for <midcom@ietf.org>; Thu, 15 Nov 2001 20:39:54 -0500 (EST)
Received: from smtprch2.nortel.com (erchg0k.us.nortel.com [47.113.64.104])
	by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id TAA27613
	for <midcom@ietf.org>; Thu, 15 Nov 2001 19:39:26 -0600 (CST)
Received: from zsc4c000.us.nortel.com by smtprch2.nortel.com;
          Thu, 15 Nov 2001 19:32:17 -0600
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19) 
          id <VTXNA2X0>; Thu, 15 Nov 2001 17:38:08 -0800
Message-ID: <2F1FC1DEA077D5119FAD00508BCFD6D2FF92E8@zsc3c030.us.nortel.com>
From: "Francois Audet" <audet@nortelnetworks.com>
To: "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
Subject: RE: [midcom] new I-D on "symmetric STUN"
Date: Thu, 15 Nov 2001 17:38:14 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
              boundary="----_=_NextPart_001_01C16E3F.5BC4E570"
X-Orig: <audet@americasm06.nt.com>
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C16E3F.5BC4E570
Content-Type: text/plain;
	charset="iso-8859-1"

Jonathan,

I believe that in your Figure 2, message (4), the port number for the mapped
address 
should be "1124" and not "1123".

> -----Original Message-----
> From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com]
> Sent: Wednesday, November 14, 2001 12:34
> To: 'midcom@ietf.org'
> Subject: [midcom] new I-D on "symmetric STUN"
> 
> 
> Folks,
> 
> I've talked in the past about the fact that STUN used to have 
> a bit about
> handling the symmetric case, but that we yanked it out since its
> sufficiently orthonogonal (and a fairly crowded space). I've 
> just submitted
> an I-D that documents that piece of the solution. Its a very simple
> mechanism, more or less the same as STUN, which uses a relay 
> server. The
> protocol is called "Traversal Using Relay NAT" or TURN. Until 
> it appears in
> the archives, you can pick up a copy at:
> 
> http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt
> 
> Thanks,
> Jonathan R.
> 
> ---
> Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
> Chief Scientist                             First Floor
> dynamicsoft                                 East Hanover, NJ 07936
> jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
> http://www.jdrosen.net                      PHONE: (973) 952-5000
> http://www.dynamicsoft.com
>  
> 
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
> 

------_=_NextPart_001_01C16E3F.5BC4E570
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2654.89">
<TITLE>RE: [midcom] new I-D on &quot;symmetric STUN&quot;</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Jonathan,</FONT>
</P>

<P><FONT SIZE=3D2>I believe that in your Figure 2, message (4), the =
port number for the mapped address </FONT>
<BR><FONT SIZE=3D2>should be &quot;1124&quot; and not =
&quot;1123&quot;.</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Jonathan Rosenberg [<A =
HREF=3D"mailto:jdrosen@dynamicsoft.com">mailto:jdrosen@dynamicsoft.com</=
A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Wednesday, November 14, 2001 12:34</FONT>
<BR><FONT SIZE=3D2>&gt; To: 'midcom@ietf.org'</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: [midcom] new I-D on &quot;symmetric =
STUN&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Folks,</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I've talked in the past about the fact that =
STUN used to have </FONT>
<BR><FONT SIZE=3D2>&gt; a bit about</FONT>
<BR><FONT SIZE=3D2>&gt; handling the symmetric case, but that we yanked =
it out since its</FONT>
<BR><FONT SIZE=3D2>&gt; sufficiently orthonogonal (and a fairly crowded =
space). I've </FONT>
<BR><FONT SIZE=3D2>&gt; just submitted</FONT>
<BR><FONT SIZE=3D2>&gt; an I-D that documents that piece of the =
solution. Its a very simple</FONT>
<BR><FONT SIZE=3D2>&gt; mechanism, more or less the same as STUN, which =
uses a relay </FONT>
<BR><FONT SIZE=3D2>&gt; server. The</FONT>
<BR><FONT SIZE=3D2>&gt; protocol is called &quot;Traversal Using Relay =
NAT&quot; or TURN. Until </FONT>
<BR><FONT SIZE=3D2>&gt; it appears in</FONT>
<BR><FONT SIZE=3D2>&gt; the archives, you can pick up a copy at:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; <A =
HREF=3D"http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt=
" =
TARGET=3D"_blank">http://www.jdrosen.net/papers/draft-rosenberg-midcom-t=
urn-00.txt</A></FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Thanks,</FONT>
<BR><FONT SIZE=3D2>&gt; Jonathan R.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; ---</FONT>
<BR><FONT SIZE=3D2>&gt; Jonathan D. Rosenberg, =
Ph.D.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp; 72 Eagle Rock Ave.</FONT>
<BR><FONT SIZE=3D2>&gt; Chief =
Scientist&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; First Floor</FONT>
<BR><FONT SIZE=3D2>&gt; =
dynamicsoft&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; East =
Hanover, NJ 07936</FONT>
<BR><FONT SIZE=3D2>&gt; =
jdrosen@dynamicsoft.com&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
FAX:&nbsp;&nbsp; (973) 952-5050</FONT>
<BR><FONT SIZE=3D2>&gt; <A HREF=3D"http://www.jdrosen.net" =
TARGET=3D"_blank">http://www.jdrosen.net</A>&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp; PHONE: (973) 952-5000</FONT>
<BR><FONT SIZE=3D2>&gt; <A HREF=3D"http://www.dynamicsoft.com" =
TARGET=3D"_blank">http://www.dynamicsoft.com</A></FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; =
_______________________________________________</FONT>
<BR><FONT SIZE=3D2>&gt; midcom mailing list</FONT>
<BR><FONT SIZE=3D2>&gt; midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>&gt; <A =
HREF=3D"http://www1.ietf.org/mailman/listinfo/midcom" =
TARGET=3D"_blank">http://www1.ietf.org/mailman/listinfo/midcom</A></FONT=
>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C16E3F.5BC4E570--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 15 23:02:26 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05389
	for <midcom-archive@odin.ietf.org>; Thu, 15 Nov 2001 23:02:26 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id XAA16317
	for midcom-archive@odin.ietf.org; Thu, 15 Nov 2001 23:02:28 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA16160;
	Thu, 15 Nov 2001 23:00:26 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA16116
	for <midcom@ns.ietf.org>; Thu, 15 Nov 2001 23:00:23 -0500 (EST)
Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05354
	for <midcom@ietf.org>; Thu, 15 Nov 2001 23:00:20 -0500 (EST)
Received: from imop.cisco.com (imop.cisco.com [171.69.11.44])
	by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fAG3xqH29274;
	Thu, 15 Nov 2001 19:59:52 -0800 (PST)
Received: from buckthorn-nt.cisco.com (dhcp-128-107-142-151.cisco.com [128.107.142.151])
	by imop.cisco.com (Mirapoint)
	with ESMTP id ACB12825;
	Thu, 15 Nov 2001 19:59:51 -0800 (PST)
Message-Id: <5.0.0.25.2.20011115191959.01cb3d90@imop.cisco.com>
X-Sender: rmahy@imop.cisco.com
X-Mailer: QUALCOMM Windows Eudora Version 5.0
Date: Thu, 15 Nov 2001 19:22:33 -0800
To: Tom_Gray@mitel.com
From: Rohan Mahy <rohan@cisco.com>
Cc: midcom@ietf.org
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Subject: [midcom] re: STUN/TURN proposal
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org


>From:  Tom Gray@MITEL on 11/15/2001 12:50 PM
>
>The STUN protocol discovers the type of NAT used. How often is it contemplated
>that the protocol would be run in a typical installation? Would it 
>typically  be
>for every VoIPcall or at a lower rate than that.

You would typically use STUN at *startup* to find out if you are behind a 
NAT.  You may also want to check if your IP address moved to a different 
subnet unexpectedly.

thanks,
-rohan



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov 16 09:43:30 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03462
	for <midcom-archive@odin.ietf.org>; Fri, 16 Nov 2001 09:43:29 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id JAA07495
	for midcom-archive@odin.ietf.org; Fri, 16 Nov 2001 09:43:33 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07387;
	Fri, 16 Nov 2001 09:41:27 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07360
	for <midcom@optimus.ietf.org>; Fri, 16 Nov 2001 09:41:25 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03375
	for <midcom@ietf.org>; Fri, 16 Nov 2001 09:41:21 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAGEer829892;
	Fri, 16 Nov 2001 06:40:53 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABY80971;
	Fri, 16 Nov 2001 06:40:24 -0800 (PST)
Message-Id: <5.1.0.14.0.20011116093934.00a8b130@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Fri, 16 Nov 2001 09:43:23 -0500
To: John LaCour <jlacour@netscreen.com>,
        "'Steve Davies'" <sdavies@ridgewaysystems.com>,
        "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
From: Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] new I-D on "symmetric STUN"
In-Reply-To: <B162270C965FD511AB9600B0D0B0AB426E3C50@NAPA>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 01:57 PM 11/15/01 -0800, John LaCour wrote:
>Rather than try to strong-arm us, you really need to enumerate the many
>flaws and how your proposal addresses them.  If you want to be
>completely forthcoming coming you should also discuss the weaknesses
>of your own proposal and why you've made those trade-offs.

During the pre-midcom discussion at the Salt Lake City meeting
the authors of each candidate draft will be doing precisely that.
Well, not *precisely* - what I've asked for is one slide listing
the benefits of their proposal and one slide listing the open issues.  
It might be helpful if they posted that material to the mailing list 
when it's ready.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov 16 09:46:44 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03580
	for <midcom-archive@odin.ietf.org>; Fri, 16 Nov 2001 09:46:44 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id JAA07672
	for midcom-archive@odin.ietf.org; Fri, 16 Nov 2001 09:46:48 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07545;
	Fri, 16 Nov 2001 09:45:03 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07514
	for <midcom@optimus.ietf.org>; Fri, 16 Nov 2001 09:45:02 -0500 (EST)
Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03504
	for <midcom@ietf.org>; Fri, 16 Nov 2001 09:44:57 -0500 (EST)
Received: from BobP [63.67.143.2] by acmepacket.com
  (SMTPD32-7.04) id A66BF8B90116; Fri, 16 Nov 2001 09:44:59 -0500
Message-ID: <010801c16eaa$46868040$2300000a@acmepacket.com>
From: "Bob Penfield" <bpenfield@acmepacket.com>
To: "Steve Davies" <sdavies@ridgewaysystems.com>,
        "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>, <midcom@ietf.org>
References: <00533D13955AD411AF3800A0C9B42639E923BB@ThisAddressDoesNotExist>
Subject: Re: [midcom] new I-D on "symmetric STUN"
Date: Fri, 16 Nov 2001 09:23:34 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Hi Steve,

You call your proposal mature, however I have not yet seen a detailed
specification of the protocol. Or am I missing something? I can make an
implementation based on the STUN/TURN proposals (after a few corrections
that I will post separately). Can you provide the details we need to create
implementations?

This is an urgent need which the community/industry would like make
deployable solutions within the immediate future. We cannot afford to go
through the normal 18+ month protocol development cycle. We need to submit
an implementable specification to the IESG in the next month or so.

I am also very interested in knowing what flaws you see in the proposal.
Maybe you could enumerate the most serious.

cheers,
(-:bob

Robert F. Penfield
Chief Software Architect
Acme Packet, Inc.
130 New Boston Street
Woburn, MA 01801
bpenfield@acmepacket.com

----- Original Message -----
From: "Steve Davies" <sdavies@ridgewaysystems.com>
To: "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>; <midcom@ietf.org>
Sent: Thursday, November 15, 2001 4:42 PM
Subject: RE: [midcom] new I-D on "symmetric STUN"


> Interesting TURN of events or should I say 'U TURN'.
>
> Puns aside, this proposal says nothing that hasn't already been proposed.
> While I am pleased to see TURN uses IDENTICAL concepts to the Davies
> proposal, it contains many flaws (too numerous to go into here). Fix those
> flaws and you end up with the Davies proposal. Not only does TURN come a
> month after the deadline set in Melinda's rules of engagement, but the
> development of such a new and immature proposal is by definition not in
the
> best interests of a pre-midcom solution. If we agree on the concepts and
> Jonathan et al are interested in a quick solution, then surely it makes
> sense to jointly work on the most mature incarnation of those concepts.
Why
> re-invent the wheel?
>
> Steve
>
> -----Original Message-----
> From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com]
> Sent: 14 November 2001 20:34
> To: 'midcom@ietf.org'
> Subject: [midcom] new I-D on "symmetric STUN"
>
>
> Folks,
>
> I've talked in the past about the fact that STUN used to have a bit about
> handling the symmetric case, but that we yanked it out since its
> sufficiently orthonogonal (and a fairly crowded space). I've just
submitted
> an I-D that documents that piece of the solution. Its a very simple
> mechanism, more or less the same as STUN, which uses a relay server. The
> protocol is called "Traversal Using Relay NAT" or TURN. Until it appears
in
> the archives, you can pick up a copy at:
>
> http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt
>
> Thanks,
> Jonathan R.
>
> ---
> Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
> Chief Scientist                             First Floor
> dynamicsoft                                 East Hanover, NJ 07936
> jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
> http://www.jdrosen.net                      PHONE: (973) 952-5000
> http://www.dynamicsoft.com
>
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
>


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov 16 09:50:03 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03719
	for <midcom-archive@odin.ietf.org>; Fri, 16 Nov 2001 09:50:02 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id JAA07725
	for midcom-archive@odin.ietf.org; Fri, 16 Nov 2001 09:50:06 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07598;
	Fri, 16 Nov 2001 09:46:02 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07571
	for <midcom@optimus.ietf.org>; Fri, 16 Nov 2001 09:46:01 -0500 (EST)
Received: from web14106.mail.yahoo.com (web14106.mail.yahoo.com [216.136.172.136])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA03529
	for <midcom@ietf.org>; Fri, 16 Nov 2001 09:45:56 -0500 (EST)
Message-ID: <20011116144558.13032.qmail@web14106.mail.yahoo.com>
Received: from [216.191.234.100] by web14106.mail.yahoo.com via HTTP; Fri, 16 Nov 2001 06:45:58 PST
Date: Fri, 16 Nov 2001 06:45:58 -0800 (PST)
From: Mark Taylor <m_taylorus@yahoo.com>
Subject: RE: [midcom] new I-D on "symmetric STUN"
To: "'midcom@ietf.org'" <midcom@ietf.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

 The main difference between the Davies and STUN/TURN
is that one speaks of a firewall strategy while the
other is effectively silent. The other differences are
really inconsequential and superficial.

What benefits does the Davies firewall strate3gy
bring?

In addition, the purpose of STUN is really not clear
to me. The information that it gathers seems to be
something that would be done only very rarely and
could probably be obtained from an inquiry to the
network designer. Indeed if the answer turns out to be
a symmetric NAT, a TURN server would have to be
provided outside of the NAT which is something that
would have to be done physically. STUN and TURN as
protocols that adapt to network configurations is a
concept that seems very fuzzy to me. I must be missing
something about their operation.



__________________________________________________
Do You Yahoo!?
Find the one for you at Yahoo! Personals
http://personals.yahoo.com

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov 16 09:55:25 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03987
	for <midcom-archive@odin.ietf.org>; Fri, 16 Nov 2001 09:55:25 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id JAA07882
	for midcom-archive@odin.ietf.org; Fri, 16 Nov 2001 09:55:28 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07852;
	Fri, 16 Nov 2001 09:54:30 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA07821
	for <midcom@optimus.ietf.org>; Fri, 16 Nov 2001 09:54:29 -0500 (EST)
Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA03923
	for <midcom@ietf.org>; Fri, 16 Nov 2001 09:54:24 -0500 (EST)
Received: from BobP [63.67.143.2] by acmepacket.com
  (SMTPD32-7.04) id A8A252E0116; Fri, 16 Nov 2001 09:54:26 -0500
Message-ID: <011801c16eab$95cd3080$2300000a@acmepacket.com>
From: "Bob Penfield" <bpenfield@acmepacket.com>
To: "midcom" <midcom@ietf.org>
Date: Fri, 16 Nov 2001 09:32:57 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Content-Transfer-Encoding: 7bit
Subject: [midcom] STUN/TURN missing/colliding attribute types
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

The TURN draft says that STUN and TURN can be used together. However, there
is an overlap in the Message Attribute types in the STUN and TURN drafts.
The TURN proposal re-uses type 0x0004 for CHALLENGE. It is SOURCE-ADDRESS in
STUN.

The STUN proposal names 5 attributes, but section 10.2 list only types 1
thru 4. What type is CHANGED-ADDRESS?

Since it is likely that people will want to implement a unified STUN/TURN
server, the attribute types should be unique.

cheers,
(-:bob

Robert F. Penfield
Chief Software Architect
Acme Packet, Inc.
130 New Boston Street
Woburn, MA 01801
bpenfield@acmepacket.com



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov 16 11:54:33 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA10206
	for <midcom-archive@odin.ietf.org>; Fri, 16 Nov 2001 11:54:32 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA10664
	for midcom-archive@odin.ietf.org; Fri, 16 Nov 2001 11:54:35 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA10458;
	Fri, 16 Nov 2001 11:46:57 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA10419
	for <midcom@optimus.ietf.org>; Fri, 16 Nov 2001 11:46:55 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA09777;
	Fri, 16 Nov 2001 11:46:51 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAGGj3CJ008538;
	Fri, 16 Nov 2001 11:45:03 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <W5C2JJZ0>; Fri, 16 Nov 2001 11:46:24 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6EC5@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'sipping@ietf.org'" <sipping@ietf.org>
Cc: "'midcom@ietf.org'" <midcom@ietf.org>
Date: Fri, 16 Nov 2001 11:46:24 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Subject: [midcom] New I-D on SIP NAT and Firewall Scenarios and Solutions
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Folks,

Rohan Mahy, myself, and Sanjoy Sen submitted a new I-D that documents
scenarios and solutions for a whole bunch of different NAT and firewall
scenarios for SIP. It should appear in the archives shortly, but until it
does, you can pick it up at:

http://www.jdrosen.net/papers/draft-rosenberg-sipping-nat-scenarios-00.txt

It needs a lot more work, but should hopefully help people understand how
all of the various  drafts and solutions fit together.

Thanks,
Jonathan R.

---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com
 

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 03:26:12 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22659
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 03:26:12 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id DAA10252
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 03:26:14 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA10184;
	Sat, 17 Nov 2001 03:19:55 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA10153
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 03:19:53 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22611
	for <midcom@ietf.org>; Sat, 17 Nov 2001 03:19:51 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAH8I0CJ012813;
	Sat, 17 Nov 2001 03:18:00 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <W5C2JLWD>; Sat, 17 Nov 2001 03:19:21 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6F06@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'Mark Taylor'" <m_taylorus@yahoo.com>,
        "'midcom@ietf.org'"
	 <midcom@ietf.org>
Subject: RE: [midcom] new I-D on "symmetric STUN"
Date: Sat, 17 Nov 2001 03:19:17 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



 

> -----Original Message-----
> From: Mark Taylor [mailto:m_taylorus@yahoo.com]
> Sent: Friday, November 16, 2001 9:46 AM
> To: 'midcom@ietf.org'
> Subject: RE: [midcom] new I-D on "symmetric STUN"
> 
> 
>  The main difference between the Davies and STUN/TURN
> is that one speaks of a firewall strategy while the
> other is effectively silent. The other differences are
> really inconsequential and superficial.

Not really. I think TURN is significantly simpler than the Davies proposal.
It does that by doing fewer things (for example, the Davies draft supports
outbound TCP connections through their tunneling mechanism, outbound TCP is
not provided in TURN. I'll explain that in a separate note).


> 
> What benefits does the Davies firewall strate3gy
> bring?
> 
> In addition, the purpose of STUN is really not clear
> to me. 

It does two main things:

1. helps a device discover what its nat situation is,
2. if the nat situation is full cone, restricted cone, port restricted cone,
allows it to get an ip address it can use in applications.

> The information that it gathers seems to be
> something that would be done only very rarely

Discovery, yes. Item two above would be done for each SIP call, for example.

> and
> could probably be obtained from an inquiry to the
> network designer.

I think that is quite impractical. I can imagine a PC phone app
documentation saying "next, please call your cable provider and ask them the
type of NAT they are running in their network. Enter the value in dialog
box...". I don't think so. 

> Indeed if the answer turns out to be
> a symmetric NAT, a TURN server would have to be
> provided outside of the NAT which is something that
> would have to be done physically. 

Yes.

> STUN and TURN as
> protocols that adapt to network configurations is a
> concept that seems very fuzzy to me. I must be missing
> something about their operation.

I can answer specific questions. Hopefully the new draft on nat scenarios
might clarify some of it.

-Jonathan R.

---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 03:59:32 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22868
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 03:59:28 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id DAA10914
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 03:59:29 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA10747;
	Sat, 17 Nov 2001 03:49:55 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA10718
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 03:49:53 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22798
	for <midcom@ietf.org>; Sat, 17 Nov 2001 03:49:50 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAH8lpCJ012848;
	Sat, 17 Nov 2001 03:47:51 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <W5C2JLWM>; Sat, 17 Nov 2001 03:49:12 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6F07@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'John LaCour'" <jlacour@netscreen.com>,
        "'Steve Davies'"
	 <sdavies@ridgewaysystems.com>,
        Jonathan Rosenberg
	 <jdrosen@dynamicsoft.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
Subject: RE: [midcom] new I-D on "symmetric STUN"
Date: Sat, 17 Nov 2001 03:49:06 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

John,

You are right; we need to have real differences discussed and honest
assessments of strengths and weakenesses. Let me try to do that.

STUN by itself is a bit hard to compare to the Davies proposal since its a
bit of apples/oranges. STUN provides a discovery capability, which is not
present in the Davies draft. STUN allows you to obtain an address from your
own nat that you can use in applications, which the Davies draft doesn't.
The Davies approach is to not bother with such things, and instead go for
the full symmetric solution in all cases. This has the advantage of being a
single solution which works broadly, but this generality comes at a cost.
The cost is that media is ALWAYS routed to the provider network, even when
it doesn't really have to. The result could be big increases in latency (I
call my neighbor; my provider is on the west coast, so my media goes from
New Jersey to California and back to New Jersey), and also additional cost
for the provider to purchase the bandwidth for the media to come in and go
back out. I personally believe that we should be avoiding triangle routing
of media at all costs. Whether you agree with that will heavily influence
your assessment of the solutions.

TURN is more comparable to the Davies draft. They share commonalities. Both
use a service provider intermediary to terminate UDP and TCP traffic. Both
provide the client with an IP address and port that will route to this
intermediary. Both support bidirectional sending on the "connections"
established between the client and the intermediary. There are many
differences too:

 * the Davies proposal uses a single connection between the client and
intermediary, over which control commands and outbound TCP and UDP
"subchannels" can be established. There is no such thing in TURN. The reason
is that the Davies draft assumes that outbound TCP connections would only be
allowed towards a statically configured address and port, that of the
intermediary. So, all other traffic needs to go within this connection, and
thus muxing is needed. I found this odd; if the firewall policy prevents
outbound TCP connections to anywhere but the intermediary, and the
intermediary's job is to allow you to make outbound TCP connections to
anywhere, for example, this would be a violation of enterprise firewall
policy. Similar for UDP. So, TURN assumes that the firewall allows outbound
UDP and outbound TCP to anywhere, since if it doesn't, you're not supposed
to be doing it anyway. Since the assumption is a firewall policy that allows
outbound messaging anywhere, the need for a separate multiplexed connection
is eliminated in TURN.

* the Davies proposal uses a "control channel" within their multiplex
connection. The presence of a separate control channel allows for messaging
to the client outside of the "data channels" that are established. One of
the things this enables is for a tcp listener to be created at the
intermediary, and for that listener to have lots of connections made to  it.
As each connection is made, the client is informed of this (through the
control channel). Since TURN has no control channel, there is no ability to
let the client know when a connection is established, and no ability to
support multiple connections to a specific listener. Its a one-one mapping
only. This would not be sufficient for building a web server behind a NAT,
for example, but thats not what TURN is trying to solve. Presumably, if the
enterprise is disallowing incoming connections from anywhere to the inside,
its to prevent users from doing things like running a web server. If the
enteprirse is allowing outbound TCP, it means its OK for the user to make a
connection to a single peer. So, we support a similar model, but with roles
"turned" - you have a single connection to a single peer, but its initiated
from the peer rather than from you. TURN doesn't let you do more than that.
When only a single peer can connect to a TCP listener, you don't need much
of the functionality in the Davies draft.

* The Davies proposal has this interesting "probe" mechanism that allows the
intermediary to associate a UDP "connection" from the client with commands
on the control channel. The association is only needed because commands can
be sent on the channel. The commands allow you to do things like explicitly
set the remote destination, even changing it after its set up. There is no
such capability in TURN, for much the same reasons as described above. TURN
allows a client to connect to a single peer with UDP, its just that the peer
initiates, instead of the client inside. Thats it. With that restriction,
there is no need to set the remote addresses, or to change them, and thus
the control channel is not needed, and thus the probes are not needed. 



Overall, TURN is much, much simpler than the Davies proposal since:

(1) it does not attempt to do things that are outside of the scope of the
administrator's firewall policy,
(2) it does less than the Davies proposal, because it merely supports peer
to peer connectivity where the external entity initiates to the inside,
rather than the other way around (thus the name TURN). Because it does less,
its oodles simpler.

If you want to do things like build an HTTP server, you are far better off
using a VPN, IMHO. TURN is meant to facilitate a class of applications that
have requirements similar to client-server applications permitted by
firewalls and NATs, but where the "server" is unknown, and it initiates
communications to the client first. This includes a LOT of applications, I
think, and because it tries hard to stay within the bounds of enterprise
firewall policy, is something I believe administrators would be aggreable to
allowing. 


I hope I have not misrepresented features in the Davies draft; I am sure
Steve will correct me with vigor in the event that I have.

Thanks,
Jonathan R.


---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com
  
-----Original Message-----
From: John LaCour [mailto:jlacour@netscreen.com]
Sent: Thursday, November 15, 2001 4:58 PM
To: 'Steve Davies'; 'Jonathan Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric STUN"


Steve,

You may or may not be correct, but this message does next to nothing
to help any of us evaluate the merits of either proposal.

Just because something was created earlier or even implemented doesn't
make it inherently better.

Rather than try to strong-arm us, you really need to enumerate the many
flaws and how your proposal addresses them.  If you want to be
completely forthcoming coming you should also discuss the weaknesses
of your own proposal and why you've made those trade-offs.

In fairness to you and Jonathan, I haven't done a thorough review of
either proposal yet.  This message should not be misconstrued
as  supporting either proposal.  Rather I'm trying to encourage
you to tell us something useful.

-John
-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: Thursday, November 15, 2001 1:42 PM
To: 'Jonathan Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric STUN"


Interesting TURN of events or should I say 'U TURN'. 
Puns aside, this proposal says nothing that hasn't already been proposed.
While I am pleased to see TURN uses IDENTICAL concepts to the Davies
proposal, it contains many flaws (too numerous to go into here). Fix those
flaws and you end up with the Davies proposal. Not only does TURN come a
month after the deadline set in Melinda's rules of engagement, but the
development of such a new and immature proposal is by definition not in the
best interests of a pre-midcom solution. If we agree on the concepts and
Jonathan et al are interested in a quick solution, then surely it makes
sense to jointly work on the most mature incarnation of those concepts. Why
re-invent the wheel?
Steve 
-----Original Message----- 
From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com] 
Sent: 14 November 2001 20:34 
To: 'midcom@ietf.org' 
Subject: [midcom] new I-D on "symmetric STUN" 


Folks, 
I've talked in the past about the fact that STUN used to have a bit about 
handling the symmetric case, but that we yanked it out since its 
sufficiently orthonogonal (and a fairly crowded space). I've just submitted 
an I-D that documents that piece of the solution. Its a very simple 
mechanism, more or less the same as STUN, which uses a relay server. The 
protocol is called "Traversal Using Relay NAT" or TURN. Until it appears in 
the archives, you can pick up a copy at: 
http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt 
Thanks, 
Jonathan R. 
--- 
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave. 
Chief Scientist                             First Floor 
dynamicsoft                                 East Hanover, NJ 07936 
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050 
http://www.jdrosen.net                      PHONE: (973) 952-5000 
http://www.dynamicsoft.com 
  
_______________________________________________ 
midcom mailing list 
midcom@ietf.org 
http://www1.ietf.org/mailman/listinfo/midcom 

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 04:00:38 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA22899
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 04:00:38 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id EAA11179
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 04:00:39 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA10832;
	Sat, 17 Nov 2001 03:56:56 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA10804
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 03:56:54 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22840
	for <midcom@ietf.org>; Sat, 17 Nov 2001 03:56:52 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAH8srCJ012862;
	Sat, 17 Nov 2001 03:54:54 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <W5C2JLWT>; Sat, 17 Nov 2001 03:56:15 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6F08@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'Meyer, Greg W'" <greg.w.meyer@intel.com>,
        "'Pete Cordell'"
	 <pete@tech-know-ware.com>,
        Steve Davies <sdavies@ridgewaysystems.com>,
        "'Bob Penfield'" <bpenfield@acmepacket.com>,
        "'midcom'" <midcom@ietf.org>, Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] pre-midcom candidates
Date: Sat, 17 Nov 2001 03:56:14 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



 

> -----Original Message-----
> From: Meyer, Greg W [mailto:greg.w.meyer@intel.com]
> Sent: Tuesday, November 13, 2001 8:57 PM
> To: 'Pete Cordell'; Steve Davies; 'Bob Penfield'; 'midcom'; Melinda
> Shore
> Subject: RE: [midcom] pre-midcom candidates
> 
> 
> I agree with Pete; I would favor a solution that addresses 
> both firewall and
> NAT. The trade-offs Jonathan raise about the Davies approach are very
> acceptable given pre-midcom is temporary (until midcom is 
> deployed). Any
> short-term solution that doesn't account for today's most 
> deployed networks
> simply defeats the purpose.

I just posted a note with far more details, but there is a really, really,
really important point that needs to be made here.

"addressing the firewall" CANNOT MEAN VIOLATING ENTERPRISE FIREWALL POLICY.
PERIOD. Even if this group chose to do that, I sincerely doubt that the IESG
would approve a protocol that would allow a client to bypass the firewall's
policy, unless this draft was an April Fools rfc (and there is one).

So, if the firewall disallows outbound UDP, sorry, no VoIP. I wish it wasn't
so, but thats the policy. I am sure people will deploy hacks to get around
this, and those hacks will be countered by smarter firewalls, and the game
will continue. At IETF, we develop protocols that are good for the Internet,
not protocols that are convenient for getting around annoying policies that
prevent us from making money. I fully realize that this is a tough pill to
swallow, especially these days, but I think thats the truth here.

Thanks,
Jonathan R.

---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 04:26:21 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA23082
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 04:26:21 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id EAA11547
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 04:26:22 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA11401;
	Sat, 17 Nov 2001 04:14:18 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA11370
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 04:14:16 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA22992
	for <midcom@ietf.org>; Sat, 17 Nov 2001 04:14:14 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAH9CMCJ012878;
	Sat, 17 Nov 2001 04:12:22 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <W5C2JLWX>; Sat, 17 Nov 2001 04:13:43 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6F09@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'James Ho'" <jamesho37@hotmail.com>,
        Jonathan Rosenberg
	 <jdrosen@dynamicsoft.com>, mshore@cisco.com,
        midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates
Date: Sat, 17 Nov 2001 04:13:39 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



 

> -----Original Message-----
> From: James Ho [mailto:jamesho37@hotmail.com]
> Sent: Thursday, November 15, 2001 2:08 PM
> To: jdrosen@dynamicsoft.com; mshore@cisco.com; midcom@ietf.org
> Subject: RE: [midcom] pre-midcom candidates
> 
> 
> Two issues pertaining to the pre-midcom work that I still don't
> have clarity around.
> 
> 1. What are the specific latency/peformance issues associated with
> tunnelling/VPN appraoches? While admitedly there is another device
> in the picture, as I mentioned before, there are available/evolving
> hw solutions for integrate wire-speed IPsec processing
> enabling tunnel de/encapsulation at wire-speeds, so theoretically
> this should not be an issue.

It has nothing to do with processing speed at the intermediary. The problem
is the painfully slow speed of light. Consider two users, A and B, who sign
up for service with a provider foo.com. Foo has a data center in California.
Foo has no idea where its customers physically reside when they make calls.
In fact, foo may not even know the mailing address for its customers. Now,
it so happens that A and B are in New York. A makes a VoIP call to B. The
media for these calls is routed from A, over some kind of VPN solution to
the foo.com data center in CA where the VPN server sits. The media then goes
right back into another tunnel, to B, in New York. The media, as a result,
has done a round trip through the US, just to go across the street. That
adds substantial latency, increases loss probabilities, and costs a lot for
the provider. Since media comes in and goes back out, for whatever the
number of erlangs the provider is trying to handle, they need TWICE that in
access bandwidth in their data center. If the media never goes through this
VPN server, they need only the bandwidth to support signaling. 

The cost differences between these are astounding. Lets say the provider
wants to handle a modest 4 calls a second. With signaling alone, assuming
maybe 2kB worth of SIP messages per call, thats 64 kbps. No problem. With
media, lets assume a 3 minute call hold time. At 4 calls per second, thats
720 erlangs. Lets assume G.711 plus RTP overheads, which is 80kbps. You need
to support that much in each direction, but each direction goes in and out
of the provider network. Thats 115 Mbps in each direction! Thats 1800 TIMES
as much bandwidth needed. I don't know about you, but my customers are not
itching to pay for the access bandwidth for that, the switches, the
operating expenses, and so on, which very much add up.

Another way to think about it is this; the IP network is designed to figure
out the shortest route between A and B. By using VPN solutions, you are
inserting additional hops that can result in seriously non-optimal routing.


> 
> 2. what is the benefit of developing new/additional approaches
> for secure tunneling when there are existing standards in place
> for this (e.g. IPsec)? From Jonathan's e-mail, it would seem that
> the answer to this is 'no'. Is there a concensus around this
> (I understand there is a philosophical debate underway on this but my
> interest is in the technical issues)?
> 

There are at least a few reasons why one might want a new solution for this
kind of tunneling (since it is, alas, needed for symmetric cases). I outline
these in the TURN draft, but here they are repeated:

o RSIP and the VPN solutions all allocate an entire IP address
          to the client. This means the provider must have sufficient IP
          addresses for all the clients which would simultaneously need
          service. This could require significant address space. With
          this proposal, its an IP address/port thats allocated, which
          means very few IP addresses are needed. This is the standard
          NAT argument.

        o RSIP and VPN solutions all require tunneling. In this
          proposal, there is no tunneling. The result is more efficient
          bandwidth usage, which is important for media packets (RTP is
          a likely user of this mechanism).

        o RSIP and VPN solutions might contradict enterprise firewall
          policy, allowing people to run servers, to use UDP when only
          TCP is allowed, and so on. Some would consider this a feature,
          not a drawback. But, if the goal is consistency with IT
          established policies, it is a drawback. Our proposal provides
          a simple, minimalistic functionality that is consistent with
          enterprise policy. The only feature TURN adds, is the ability
          of a user behind the firewall/NAT to receive a single incoming
          connection, which it has previously requested.


I am still on the fence, but here is at least a start on some reasons to do
it.

Thanks,
Jonathan R.

---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 04:27:21 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA23100
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 04:27:21 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id EAA11561
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 04:27:22 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA11464;
	Sat, 17 Nov 2001 04:22:01 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA11433
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 04:22:00 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA23057
	for <midcom@ietf.org>; Sat, 17 Nov 2001 04:21:58 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAH9K8CJ012890;
	Sat, 17 Nov 2001 04:20:08 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <W5C2JLW6>; Sat, 17 Nov 2001 04:21:30 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6F0A@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'Bob Penfield'" <bpenfield@acmepacket.com>, midcom <midcom@ietf.org>
Subject: RE: [midcom] STUN/TURN missing/colliding attribute types
Date: Sat, 17 Nov 2001 04:21:29 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



 

> -----Original Message-----
> From: Bob Penfield [mailto:bpenfield@acmepacket.com]
> Sent: Friday, November 16, 2001 9:33 AM
> To: midcom
> Subject: [midcom] STUN/TURN missing/colliding attribute types
> 
> 
> The TURN draft says that STUN and TURN can be used together. 
> However, there
> is an overlap in the Message Attribute types in the STUN and 
> TURN drafts.
> The TURN proposal re-uses type 0x0004 for CHALLENGE. It is 
> SOURCE-ADDRESS in
> STUN.
> 
> The STUN proposal names 5 attributes, but section 10.2 list 
> only types 1
> thru 4. What type is CHANGED-ADDRESS?

To quote the great Homer Simpson "Doh!". 

Here is the right table:

0x0001: MAPPED-ADDRESS
0x0002: RESPONSE-ADDRESS
0x0003: FLAGS
0x0004: SOURCE-ADDRESS
0x0005: CHANGED-ADDRESS
0x0006: CHALLENGE
0x0007: AUTHENTICATION
0x0008: LIFETIME
0x0009: ALTERNATE-SERVER

Thanks,
Jonathan R.

---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 04:35:42 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA23153
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 04:35:41 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id EAA11997
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 04:35:43 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA11518;
	Sat, 17 Nov 2001 04:24:41 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA11489
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 04:24:39 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA23068
	for <midcom@ietf.org>; Sat, 17 Nov 2001 04:24:37 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAH9MiCJ012900;
	Sat, 17 Nov 2001 04:22:45 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <W5C2JLW0>; Sat, 17 Nov 2001 04:24:06 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6F0B@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'Francois Audet'" <audet@nortelnetworks.com>,
        Jonathan Rosenberg
	 <jdrosen@dynamicsoft.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
Subject: RE: [midcom] new I-D on "symmetric STUN"
Date: Sat, 17 Nov 2001 04:24:05 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



  
-----Original Message-----
From: Francois Audet [mailto:audet@nortelnetworks.com]
Sent: Thursday, November 15, 2001 8:38 PM
To: 'Jonathan Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric STUN"


>Jonathan, 
>I believe that in your Figure 2, message (4), the port number for the
mapped address 
>should be "1124" and not "1123". 

Yup. Thanks.

-Jonathan R.



> -----Original Message----- 
> From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com] 
> Sent: Wednesday, November 14, 2001 12:34 
> To: 'midcom@ietf.org' 
> Subject: [midcom] new I-D on "symmetric STUN" 
> 
> 
> Folks, 
> 
> I've talked in the past about the fact that STUN used to have 
> a bit about 
> handling the symmetric case, but that we yanked it out since its 
> sufficiently orthonogonal (and a fairly crowded space). I've 
> just submitted 
> an I-D that documents that piece of the solution. Its a very simple 
> mechanism, more or less the same as STUN, which uses a relay 
> server. The 
> protocol is called "Traversal Using Relay NAT" or TURN. Until 
> it appears in 
> the archives, you can pick up a copy at: 
> 
> http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt 
> 
> Thanks, 
> Jonathan R. 
> 
> --- 
> Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave. 
> Chief Scientist                             First Floor 
> dynamicsoft                                 East Hanover, NJ 07936 
> jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050 
> http://www.jdrosen.net                      PHONE: (973) 952-5000 
> http://www.dynamicsoft.com 
>  
> 
> _______________________________________________ 
> midcom mailing list 
> midcom@ietf.org 
> http://www1.ietf.org/mailman/listinfo/midcom 
> 

---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 08:44:58 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA24656
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 08:44:57 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id IAA15997
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 08:44:59 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA15916;
	Sat, 17 Nov 2001 08:33:06 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA15846
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 08:33:02 -0500 (EST)
Received: from radvpost.us.radvision.com ([38.150.216.6])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA24596
	for <midcom@ietf.org>; Sat, 17 Nov 2001 08:33:00 -0500 (EST)
Received: by RADVPOST with Internet Mail Service (5.5.2650.21)
	id <WJ3BGFB6>; Sat, 17 Nov 2001 08:31:56 -0500
Message-ID: <0D5BBF5D638DD4119E3400508BD949459ED6B9@RADVPOST>
From: Orit Levin <orit@radvision.com>
To: "'midcom@ietf.org'" <midcom@ietf.org>
Cc: "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>,
        Steve Davies
	 <sdavies@ridgewaysystems.com>
Subject: RE: [midcom] new I-D on "symmetric STUN"
Date: Sat, 17 Nov 2001 08:31:55 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C16F6C.396B9EF0"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C16F6C.396B9EF0
Content-Type: text/plain;
	charset="iso-8859-1"

Closely following the latest developments on this arena, I also was amused
(and pleased) by the latest TURN of the events.
Without bothering with the syntax of the both proposals, I could see that
TURN technique is a (central) part of the "Davies complete solution".
1. STUN suggests learning the topology and (if possible) achieving traversal
without help from a proxy on the public side.
2. TURN suggests a protocol between a single entity in the private network
and a server on the public side in order to pinhole the NAT "from the
inside" (complying with the local security policies) and use this hole (in a
strictly managed manner) to send the traffic from the public side through
the public server.
The single entity in the private network can be a proxy (representing many
end users) if agreed with the local policies. In this case it is highly
desirable to be able to use a single "hole" on behalf of these many users.
Note, that it doesn't make this solution tunneling or VPN. 
4. Davies proposal builds around this basic "pinholing technique" an added
feature: if the server in the private network is installed (for the reason
explained above), it talks to the public server (using Davies protocol) in
order to agree on a single hole for all the transferred streams.
5. At this stage of the solution, having two servers talking to each other
on both sides of the firewall/NAT, it is tempting to add additional
tunneling/VPN solution for the "signaling part" of the story. It is more
secure (because it is closer to a real VPN) and in some situations would be
the only working solution. It doesn't necessarily mean that there is a need
for additional standardization for this case.
 
I see a problem with current Davies proposal in a sense that it bundles all
the steps above tightly together. On the other hand, Davies solution
successfully uses the exact technique presented in TURN for a couple of
years now. Moreover, there are additional proprietary implementations in the
market that have been inspired by NAT behavior and RSIP efforts and are
using the same idea, documented in TURN.
 
I believe, that we need to integrate the theory with the practical
experience in a single TURN protocol including functionality (4) above. It
improves the solution a lot. In terms of security, you will not install a
server in your private network if your policy doesn't allow for it.
I would like to hear from Steve Davies whether my understanding is correct
and what additional flows the current TURN may have. 
 
Also, it may be very helpful to publish the expanded Davies solution (and
other solutions) as a common practice documents so that the community would
better understand existing techniques with their pros and cons.
 
Orit Levin
Chief Architect
RADVISION Inc.
TEL: +1.201.529.4300 x 230
FAX: +1.201.529.3516
 
-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: Thursday, November 15, 2001 4:42 PM
To: 'Jonathan Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric STUN"
 
Interesting TURN of events or should I say 'U TURN'. 
Puns aside, this proposal says nothing that hasn't already been proposed.
While I am pleased to see TURN uses IDENTICAL concepts to the Davies
proposal, it contains many flaws (too numerous to go into here). Fix those
flaws and you end up with the Davies proposal. Not only does TURN come a
month after the deadline set in Melinda's rules of engagement, but the
development of such a new and immature proposal is by definition not in the
best interests of a pre-midcom solution. If we agree on the concepts and
Jonathan et al are interested in a quick solution, then surely it makes
sense to jointly work on the most mature incarnation of those concepts. Why
re-invent the wheel?
Steve 
-----Original Message----- 
From: Jonathan Rosenberg [ mailto:jdrosen@dynamicsoft.com
<mailto:jdrosen@dynamicsoft.com> ] 
Sent: 14 November 2001 20:34 
To: 'midcom@ietf.org' 
Subject: [midcom] new I-D on "symmetric STUN" 
 
Folks, 
I've talked in the past about the fact that STUN used to have a bit about 
handling the symmetric case, but that we yanked it out since its 
sufficiently orthonogonal (and a fairly crowded space). I've just submitted 
an I-D that documents that piece of the solution. Its a very simple 
mechanism, more or less the same as STUN, which uses a relay server. The 
protocol is called "Traversal Using Relay NAT" or TURN. Until it appears in 
the archives, you can pick up a copy at: 
http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt
<http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt>  
Thanks, 
Jonathan R. 
--- 
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave. 
Chief Scientist                             First Floor 
dynamicsoft                                 East Hanover, NJ 07936 
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050 
http://www.jdrosen.net <http://www.jdrosen.net>                       PHONE:
(973) 952-5000 
http://www.dynamicsoft.com <http://www.dynamicsoft.com>  
  
_______________________________________________ 
midcom mailing list 
midcom@ietf.org 
http://www1.ietf.org/mailman/listinfo/midcom
<http://www1.ietf.org/mailman/listinfo/midcom>  

------_=_NextPart_001_01C16F6C.396B9EF0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">


<meta name=3DProgId content=3DWord.Document>
<meta name=3DGenerator content=3D"Microsoft Word 9">
<meta name=3DOriginator content=3D"Microsoft Word 9">
<link rel=3DFile-List href=3D"cid:filelist.xml@01C16F42.3F841530">
<title>RE: [midcom] new I-D on &quot;symmetric STUN&quot;</title>
<!--[if gte mso 9]><xml>
 <o:OfficeDocumentSettings>
  <o:DoNotRelyOnCSS/>
 </o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
 <w:WordDocument>
  <w:Zoom>0</w:Zoom>
  <w:DocumentKind>DocumentEmail</w:DocumentKind>
  <w:EnvelopeVis/>
  <w:DrawingGridHorizontalSpacing>6 pt</w:DrawingGridHorizontalSpacing>
 </w:WordDocument>
</xml><![endif]-->
<style>
<!--
 /* Font Definitions */
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;
	mso-font-charset:0;
	mso-generic-font-family:swiss;
	mso-font-pitch:variable;
	mso-font-signature:553679495 -2147483648 8 0 66047 0;}
 /* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{mso-style-parent:"";
	margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;
	text-underline:single;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;
	text-underline:single;}
p.MsoAutoSig, li.MsoAutoSig, div.MsoAutoSig
	{margin:0in;
	margin-bottom:.0001pt;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
p
	{margin-right:0in;
	mso-margin-top-alt:auto;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Times New Roman";
	mso-fareast-font-family:"Times New Roman";}
span.EmailStyle19
	{mso-style-type:personal-reply;
	mso-ansi-font-size:10.0pt;
	mso-ascii-font-family:Arial;
	mso-hansi-font-family:Arial;
	mso-bidi-font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.1in 66.25pt 1.1in 66.25pt;
	mso-header-margin:.5in;
	mso-footer-margin:.5in;
	mso-paper-source:0;}
div.Section1
	{page:Section1;}
-->
</style>
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue =
style=3D'tab-interval:.5in'>

<div class=3DSection1>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>C=
losely
following the latest developments on this arena, I also was amused (and
pleased) by the latest TURN of the =
events.<o:p></o:p></span></font></span></p>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>W=
ithout
bothering with the syntax of the both proposals, I could see that TURN
technique is a (central) part of the &#8220;Davies complete =
solution&#8221;.<o:p></o:p></span></font></span></p>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>1=
. STUN
suggests learning the topology and (if possible) achieving traversal =
without
help from a proxy on the public =
side.<o:p></o:p></span></font></span></p>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>2=
. TURN
suggests a protocol between a single entity in the private network and =
a server
on the public side in order to pinhole the NAT &#8220;from the =
inside&#8221; (complying
with the local security policies) and use this hole (in a strictly =
managed
manner) to send the traffic from the public side through the public =
server.<o:p></o:p></span></font></span></p>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>T=
he single
entity in the private network can be a proxy (representing many end =
users) if
agreed with the local policies. In this case it is highly desirable to =
be able
to use a single &#8220;hole&#8221; on behalf of these many users. Note, =
that it doesn&#8217;t
make this solution tunneling or VPN. =
<o:p></o:p></span></font></span></p>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>4=
. Davies
proposal builds around this basic &#8220;pinholing technique&#8221; an =
added feature: if
the server in the private network is installed (for the reason =
explained
above), it talks to the public server (using Davies protocol) in order =
to agree
on a single hole for all the transferred =
streams.<o:p></o:p></span></font></span></p>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>5=
. At this
stage of the solution, having two servers talking to each other on both =
sides
of the firewall/NAT, it is tempting to add additional tunneling/VPN =
solution
for the &#8220;signaling part&#8221; of the story. It is more secure =
(because it is closer
to a real VPN) and in some situations would be the only working =
solution. It
doesn&#8217;t necessarily mean that there is a need for additional =
standardization
for this case.<o:p></o:p></span></font></span></p>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'><=
![if =
!supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></font></span></p>=


<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>I=
 see a
problem with current Davies proposal in a sense that it bundles all the =
steps
above tightly together. On the other hand, Davies solution successfully =
uses
the exact technique presented in TURN for a couple of years now. =
Moreover,
there are additional proprietary implementations in the market that =
have been
inspired by NAT behavior and RSIP efforts and are using the same idea,
documented in TURN.<o:p></o:p></span></font></span></p>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'><=
![if =
!supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></font></span></p>=


<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>I=
 believe,
that we need to integrate the theory with the practical experience in a =
single
TURN protocol including functionality (4) above. It improves the =
solution a lot.
In terms of security, you will not install a server in your private =
network if
your policy doesn&#8217;t allow for =
it.<o:p></o:p></span></font></span></p>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>I=
 would
like to hear from Steve Davies whether my understanding is correct and =
what
additional flows the current TURN may have. =
<o:p></o:p></span></font></span></p>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'><=
![if =
!supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></font></span></p>=


<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'>A=
lso, it
may be very helpful to publish the expanded Davies solution (and other
solutions) as a common practice documents so that the community would =
better
understand existing techniques with their pros and =
cons.<o:p></o:p></span></font></span></p>

<p class=3DMsoNormal><span class=3DEmailStyle19><font size=3D2 =
color=3Dnavy face=3DArial><span
style=3D'font-size:10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'><=
![if =
!supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></font></span></p>=


<p class=3DMsoAutoSig><!--[if supportFields]><span =
class=3DEmailStyle19><font=20
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;mso-bidi-font-size:
12.0pt;font-family:Arial'><span =
style=3D'mso-element:field-begin'></span><span=20
style=3D"mso-spacerun: yes">&nbsp;</span>AUTOTEXTLIST \s &quot;E-mail=20
Signature&quot; <span =
style=3D'mso-element:field-separator'></span></span></font></span><![end=
if]--><font
color=3Dnavy><span style=3D'color:navy'>Orit Levin</span></font><font =
color=3Dnavy><span
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoAutoSig><font size=3D3 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;color:navy'>Chief =
Architect</span></font><font
color=3Dnavy><span =
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoAutoSig><font size=3D3 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;color:navy'>RADVISION Inc.</span></font><font
color=3Dnavy><span =
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoAutoSig><font size=3D3 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;color:navy'>TEL: +1.201.529.4300 x =
230</span></font><font
color=3Dnavy><span =
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoAutoSig><font size=3D3 color=3Dnavy face=3D"Times New =
Roman"><span
style=3D'font-size:12.0pt;color:navy'>FAX: =
+1.201.529.3516</span></font><font
color=3Dnavy><span =
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal><!--[if supportFields]><span =
class=3DEmailStyle19><font=20
size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;mso-bidi-font-size:
12.0pt;font-family:Arial'><span =
style=3D'mso-element:field-end'></span></span></font></span><![endif]-->=
<span
class=3DEmailStyle19><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;mso-bidi-font-size:12.0pt;font-family:Arial'><![if =
!supportEmptyParas]>&nbsp;<![endif]><o:p></o:p></span></font></span></p>=


<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D2 =
color=3Dblack
face=3DTahoma><span =
style=3D'font-size:10.0pt;font-family:Tahoma;color:black'>-----Original
Message-----<br>
<b><span style=3D'font-weight:bold'>From:</span></b> Steve Davies
[mailto:sdavies@ridgewaysystems.com]<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Thursday, November =
15, 2001
4:42 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> 'Jonathan =
Rosenberg';
'midcom@ietf.org'<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [midcom] =
new I-D on
&quot;symmetric STUN&quot;</span></font><font color=3Dnavy><span
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dnavy
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;color:navy'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dnavy><span =
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p style=3D'margin-left:.5in'><font size=3D2 color=3Dblack =
face=3D"Times New Roman"><span
style=3D'font-size:10.0pt;color:black'>Interesting TURN of events or =
should I say
'U TURN'. </span></font><font color=3Dnavy><span =
style=3D'color:navy;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>

<p style=3D'margin-left:.5in'><font size=3D2 color=3Dblack =
face=3D"Times New Roman"><span
style=3D'font-size:10.0pt;color:black'>Puns aside, this proposal says =
nothing
that hasn't already been proposed. While I am pleased to see TURN uses
IDENTICAL concepts to the Davies proposal, it contains many flaws (too =
numerous
to go into here). Fix those flaws and you end up with the Davies =
proposal. Not
only does TURN come a month after the deadline set in Melinda's rules =
of
engagement, but the development of such a new and immature proposal is =
by
definition not in the best interests of a pre-midcom solution. If we =
agree on
the concepts and Jonathan et al are interested in a quick solution, =
then surely
it makes sense to jointly work on the most mature incarnation of those
concepts. Why re-invent the wheel?</span></font><font =
color=3Dnavy><span
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p style=3D'margin-left:.5in'><font size=3D2 color=3Dblack =
face=3D"Times New Roman"><span
style=3D'font-size:10.0pt;color:black'>Steve </span></font><font =
color=3Dnavy><span
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p style=3D'margin-left:.5in'><font size=3D2 color=3Dblack =
face=3D"Times New Roman"><span
style=3D'font-size:10.0pt;color:black'>-----Original =
Message-----</span></font><font
color=3Dblack><span style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>From: Jonathan Rosenberg [<a =
href=3D"mailto:jdrosen@dynamicsoft.com">mailto:jdrosen@dynamicsoft.com</=
a>]</span></font><font
color=3Dblack><span style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>Sent: 14 November 2001 20:34</span></font><font =
color=3Dblack><span
style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>To: 'midcom@ietf.org'</span></font><font =
color=3Dblack><span
style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>Subject: [midcom] new I-D on &quot;symmetric =
STUN&quot;</span></font><font
color=3Dblack><span style=3D'color:black'> </span></font><font =
color=3Dnavy><span
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p class=3DMsoNormal style=3D'margin-left:.5in'><font size=3D3 =
color=3Dnavy
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;color:navy'><![if =
!supportEmptyParas]>&nbsp;<![endif]></span></font><font
color=3Dnavy><span =
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p style=3D'margin-left:.5in'><font size=3D2 color=3Dblack =
face=3D"Times New Roman"><span
style=3D'font-size:10.0pt;color:black'>Folks,</span></font><font =
color=3Dblack><span
style=3D'color:black'> </span></font><font color=3Dnavy><span =
style=3D'color:navy;
mso-color-alt:windowtext'><o:p></o:p></span></font></p>

<p style=3D'margin-left:.5in'><font size=3D2 color=3Dblack =
face=3D"Times New Roman"><span
style=3D'font-size:10.0pt;color:black'>I've talked in the past about =
the fact
that STUN used to have a bit about</span></font><font =
color=3Dblack><span
style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>handling the symmetric case, but that we yanked it out =
since its</span></font><font
color=3Dblack><span style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>sufficiently orthonogonal (and a fairly crowded space). =
I've just
submitted</span></font><font color=3Dblack><span style=3D'color:black'> =
<br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>an I-D that documents that piece of the solution. Its a =
very
simple</span></font><font color=3Dblack><span style=3D'color:black'> =
<br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>mechanism, more or less the same as STUN, which uses a =
relay
server. The</span></font><font color=3Dblack><span =
style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>protocol is called &quot;Traversal Using Relay NAT&quot; =
or TURN.
Until it appears in</span></font><font color=3Dblack><span =
style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>the archives, you can pick up a copy =
at:</span></font><font
color=3Dblack><span style=3D'color:black'> </span></font><font =
color=3Dnavy><span
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p style=3D'margin-left:.5in'><font size=3D2 color=3Dblack =
face=3D"Times New Roman"><span
style=3D'font-size:10.0pt;color:black'><a
href=3D"http://www.jdrosen.net/papers/draft-rosenberg-midcom-turn-00.txt=
"
target=3D"_blank">http://www.jdrosen.net/papers/draft-rosenberg-midcom-t=
urn-00.txt</a></span></font><font
color=3Dblack><span style=3D'color:black'> </span></font><font =
color=3Dnavy><span
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p style=3D'margin-left:.5in'><font size=3D2 color=3Dblack =
face=3D"Times New Roman"><span
style=3D'font-size:10.0pt;color:black'>Thanks,</span></font><font =
color=3Dblack><span
style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>Jonathan R.</span></font><font color=3Dblack><span =
style=3D'color:
black'> </span></font><font color=3Dnavy><span =
style=3D'color:navy;mso-color-alt:
windowtext'><o:p></o:p></span></font></p>

<p style=3D'margin-left:.5in'><font size=3D2 color=3Dblack =
face=3D"Times New Roman"><span
style=3D'font-size:10.0pt;color:black'>---</span></font><font =
color=3Dblack><span
style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>Jonathan D. Rosenberg,
Ph.D.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;
72 Eagle Rock Ave.</span></font><font color=3Dblack><span =
style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>Chief
Scientist&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
First Floor</span></font><font color=3Dblack><span =
style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>dynamicsoft&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=

East Hanover, NJ 07936</span></font><font color=3Dblack><span =
style=3D'color:black'>
<br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>jdrosen@dynamicsoft.com&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;
FAX:&nbsp;&nbsp; (973) 952-5050</span></font><font color=3Dblack><span
style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'><a href=3D"http://www.jdrosen.net" =
target=3D"_blank">http://www.jdrosen.net</a>&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;
PHONE: (973) 952-5000</span></font><font color=3Dblack><span =
style=3D'color:black'>
<br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'><a href=3D"http://www.dynamicsoft.com" =
target=3D"_blank">http://www.dynamicsoft.com</a></span></font><font
color=3Dblack><span style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>&nbsp;</span></font><font color=3Dblack><span =
style=3D'color:black'> </span></font><font
color=3Dnavy><span =
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

<p style=3D'margin-left:.5in'><font size=3D2 color=3Dblack =
face=3D"Times New Roman"><span
style=3D'font-size:10.0pt;color:black'>_________________________________=
______________</span></font><font
color=3Dblack><span style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>midcom mailing list</span></font><font color=3Dblack><span
style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'>midcom@ietf.org</span></font><font color=3Dblack><span
style=3D'color:black'> <br>
</span></font><font size=3D2 color=3Dblack><span =
style=3D'font-size:10.0pt;
color:black'><a href=3D"http://www1.ietf.org/mailman/listinfo/midcom"
target=3D"_blank">http://www1.ietf.org/mailman/listinfo/midcom</a></span=
></font><font
color=3Dblack><span style=3D'color:black'> </span></font><font =
color=3Dnavy><span
style=3D'color:navy;mso-color-alt:windowtext'><o:p></o:p></span></font><=
/p>

</div>

</body>

</html>

------_=_NextPart_001_01C16F6C.396B9EF0--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 11:17:24 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA26858
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 11:17:24 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA19469
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 11:17:25 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA19395;
	Sat, 17 Nov 2001 11:13:48 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA19367
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 11:13:47 -0500 (EST)
Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA26799
	for <midcom@ietf.org>; Sat, 17 Nov 2001 11:13:44 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fAHGDHl00182
	for <midcom@ietf.org>; Sat, 17 Nov 2001 08:13:17 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABZ08852;
	Sat, 17 Nov 2001 08:12:49 -0800 (PST)
Message-Id: <5.1.0.14.0.20011117111028.00a3f750@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Sat, 17 Nov 2001 11:15:49 -0500
To: midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: [midcom] Minor agenda revision
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

I am adding the Rosenberg TURN draft to the list of drafts
to read in preparation for the SLC meeting.  I realize that
this draft was prepared well after the deadline for submission
of pre-midcom candidates, but 1) it's already under discussion
on the mailing list, 2) I had been under the (mis)impression
that the charter revision had been accepted by the IAB and
that we were clear to move the work forward quickly, and 3)
most importantly, we must not allow procedural rigidity to
prevent us from doing thorough technical work.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 12:50:13 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA28014
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 12:50:13 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA21452
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 12:50:14 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA21343;
	Sat, 17 Nov 2001 12:37:39 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA21312
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 12:37:33 -0500 (EST)
Received: from protactinium (protactinium.btinternet.com [194.73.73.176])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA27909
	for <midcom@ietf.org>; Sat, 17 Nov 2001 12:37:26 -0500 (EST)
Received: from [213.122.43.55] (helo=tkw)
	by protactinium with smtp (Exim 3.22 #6)
	id 1659P7-0004qR-00; Sat, 17 Nov 2001 17:37:22 +0000
Message-ID: <005c01c16f8e$77fea1e0$0200000a@tkw>
From: "Pete Cordell" <pete@tech-know-ware.com>
To: "Jonathan Rosenberg" <jdrosen@dynamicsoft.com>,
        "'Meyer, Greg W'" <greg.w.meyer@intel.com>,
        "Steve Davies" <sdavies@ridgewaysystems.com>,
        "'Bob Penfield'" <bpenfield@acmepacket.com>,
        "'midcom'" <midcom@ietf.org>, "Melinda Shore" <mshore@cisco.com>
References: <B65B4F8437968F488A01A940B21982BF020D6F08@DYN-EXCH-001.dynamicsoft.com>
Subject: Re: [midcom] pre-midcom candidates
Date: Sat, 17 Nov 2001 17:26:51 -0000
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

----- Original Message -----
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: 'Meyer, Greg W' <greg.w.meyer@intel.com>; 'Pete Cordell'
<pete@tech-know-ware.com>; Steve Davies <sdavies@ridgewaysystems.com>; 'Bob
Penfield' <bpenfield@acmepacket.com>; 'midcom' <midcom@ietf.org>; Melinda
Shore <mshore@cisco.com>
Sent: 17 November 2001 08:56
Subject: RE: [midcom] pre-midcom candidates


>
>
>
>
> > -----Original Message-----
> > From: Meyer, Greg W [mailto:greg.w.meyer@intel.com]
> > Sent: Tuesday, November 13, 2001 8:57 PM
> > To: 'Pete Cordell'; Steve Davies; 'Bob Penfield'; 'midcom'; Melinda
> > Shore
> > Subject: RE: [midcom] pre-midcom candidates
> >
> >
> > I agree with Pete; I would favor a solution that addresses
> > both firewall and
> > NAT. The trade-offs Jonathan raise about the Davies approach are very
> > acceptable given pre-midcom is temporary (until midcom is
> > deployed). Any
> > short-term solution that doesn't account for today's most
> > deployed networks
> > simply defeats the purpose.
>
> I just posted a note with far more details, but there is a really, really,
> really important point that needs to be made here.
>
> "addressing the firewall" CANNOT MEAN VIOLATING ENTERPRISE FIREWALL
POLICY.
> PERIOD. Even if this group chose to do that, I sincerely doubt that the
IESG
> would approve a protocol that would allow a client to bypass the
firewall's
> policy, unless this draft was an April Fools rfc (and there is one).
>
> So, if the firewall disallows outbound UDP, sorry, no VoIP. I wish it
wasn't
> so, but thats the policy. I am sure people will deploy hacks to get around
> this, and those hacks will be countered by smarter firewalls, and the game
> will continue. At IETF, we develop protocols that are good for the
Internet,
> not protocols that are convenient for getting around annoying policies
that
> prevent us from making money. I fully realize that this is a tough pill to
> swallow, especially these days, but I think thats the truth here.
>
> Thanks,
> Jonathan R.
>
> ---
> Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
> Chief Scientist                             First Floor
> dynamicsoft                                 East Hanover, NJ 07936
> jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
> http://www.jdrosen.net                      PHONE: (973) 952-5000
> http://www.dynamicsoft.com

Agreed, and that's what the draft says.

Pete.

=============================================
Pete Cordell
Tech-Know-Ware
pete@tech-know-ware.com
+44 1473 635863
=============================================




_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 19:37:37 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA01008
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 19:37:37 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id TAA28194
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 19:37:37 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA28137;
	Sat, 17 Nov 2001 19:35:39 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA28109
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 19:35:36 -0500 (EST)
Received: from gull.prod.itd.earthlink.net (gull.mail.pas.earthlink.net [207.217.120.84])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA00985
	for <midcom@ietf.org>; Sat, 17 Nov 2001 19:35:35 -0500 (EST)
Received: from pool0851.cvx19-bradley.dialup.earthlink.net ([209.179.247.86] helo=saqibj)
	by gull.prod.itd.earthlink.net with smtp (Exim 3.33 #1)
	id 165Fve-0007Ir-00; Sat, 17 Nov 2001 16:35:22 -0800
Message-ID: <001d01c16fc9$c6d2d4e0$56f7b3d1@vip.best.com>
Reply-To: "Saqib Jang" <saqibj1@earthlink.net>
From: "Saqib Jang" <saqibj1@earthlink.net>
To: "Jonathan Rosenberg" <jdrosen@dynamicsoft.com>,
        "'Meyer, Greg W'" <greg.w.meyer@intel.com>,
        "'Pete Cordell'" <pete@tech-know-ware.com>,
        "Steve Davies" <sdavies@ridgewaysystems.com>,
        "'Bob Penfield'" <bpenfield@acmepacket.com>,
        "'midcom'" <midcom@ietf.org>, "Melinda Shore" <mshore@cisco.com>
References: <B65B4F8437968F488A01A940B21982BF020D6F08@DYN-EXCH-001.dynamicsoft.com>
Subject: Re: [midcom] pre-midcom candidates
Date: Sat, 17 Nov 2001 16:41:26 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2615.200
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2615.200
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

> "addressing the firewall" CANNOT MEAN VIOLATING ENTERPRISE FIREWALL
POLICY.
> PERIOD. Even if this group chose to do that, I sincerely doubt that the
IESG
> would approve a protocol that would allow a client to bypass the
firewall's
> policy, unless this draft was an April Fools rfc (and there is one).
>
> So, if the firewall disallows outbound UDP, sorry, no VoIP. I wish it
wasn't
> so, but thats the policy. I am sure people will deploy hacks to get around
> this, and those hacks will be countered by smarter firewalls, and the game
> will continue. At IETF, we develop protocols that are good for the
Internet,
> not protocols that are convenient for getting around annoying policies
that
> prevent us from making money. I fully realize that this is a tough pill to
> swallow, especially these days, but I think thats the truth here.

This seems a rather broad generalization. A firewall is one component
of an enterprises' security policy. For example, an enterprise may choose to
use a VPN set-up in conjunction with a firewall to allow secure firewall
traversal of specific protocols to specific external endpoints. even though
the firewall may disallow generalized use of such protocols.
I the goal has to be to allow enterprises the flexibility in building
thier security policy through the use of firewalls and VPNs versus
trying to restrict their ability for security policy management to
only firewalls.


----- Original Message -----
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: 'Meyer, Greg W' <greg.w.meyer@intel.com>; 'Pete Cordell'
<pete@tech-know-ware.com>; Steve Davies <sdavies@ridgewaysystems.com>; 'Bob
Penfield' <bpenfield@acmepacket.com>; 'midcom' <midcom@ietf.org>; Melinda
Shore <mshore@cisco.com>
Sent: Saturday, November 17, 2001 12:56 AM
Subject: RE: [midcom] pre-midcom candidates


>
>
>
>
> > -----Original Message-----
> > From: Meyer, Greg W [mailto:greg.w.meyer@intel.com]
> > Sent: Tuesday, November 13, 2001 8:57 PM
> > To: 'Pete Cordell'; Steve Davies; 'Bob Penfield'; 'midcom'; Melinda
> > Shore
> > Subject: RE: [midcom] pre-midcom candidates
> >
> >
> > I agree with Pete; I would favor a solution that addresses
> > both firewall and
> > NAT. The trade-offs Jonathan raise about the Davies approach are very
> > acceptable given pre-midcom is temporary (until midcom is
> > deployed). Any
> > short-term solution that doesn't account for today's most
> > deployed networks
> > simply defeats the purpose.
>
> I just posted a note with far more details, but there is a really, really,
> really important point that needs to be made here.
>
> "addressing the firewall" CANNOT MEAN VIOLATING ENTERPRISE FIREWALL
POLICY.
> PERIOD. Even if this group chose to do that, I sincerely doubt that the
IESG
> would approve a protocol that would allow a client to bypass the
firewall's
> policy, unless this draft was an April Fools rfc (and there is one).
>
> So, if the firewall disallows outbound UDP, sorry, no VoIP. I wish it
wasn't
> so, but thats the policy. I am sure people will deploy hacks to get around
> this, and those hacks will be countered by smarter firewalls, and the game
> will continue. At IETF, we develop protocols that are good for the
Internet,
> not protocols that are convenient for getting around annoying policies
that
> prevent us from making money. I fully realize that this is a tough pill to
> swallow, especially these days, but I think thats the truth here.
>
> Thanks,
> Jonathan R.
>
> ---
> Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
> Chief Scientist                             First Floor
> dynamicsoft                                 East Hanover, NJ 07936
> jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
> http://www.jdrosen.net                      PHONE: (973) 952-5000
> http://www.dynamicsoft.com
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
>


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 19:52:56 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA01154
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 19:52:56 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id TAA28380
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 19:52:56 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA28332;
	Sat, 17 Nov 2001 19:51:34 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA28301
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 19:51:33 -0500 (EST)
Received: from gull.prod.itd.earthlink.net (gull.mail.pas.earthlink.net [207.217.120.84])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA01139
	for <midcom@ietf.org>; Sat, 17 Nov 2001 19:51:31 -0500 (EST)
Received: from pool0851.cvx19-bradley.dialup.earthlink.net ([209.179.247.86] helo=saqibj)
	by gull.prod.itd.earthlink.net with smtp (Exim 3.33 #1)
	id 165GBC-0006IH-00; Sat, 17 Nov 2001 16:51:27 -0800
Message-ID: <002301c16fcc$05a38aa0$56f7b3d1@vip.best.com>
Reply-To: "Saqib Jang" <saqibj1@earthlink.net>
From: "Saqib Jang" <saqibj1@earthlink.net>
To: "Jonathan Rosenberg" <jdrosen@dynamicsoft.com>,
        "'James Ho'" <jamesho37@hotmail.com>, <mshore@cisco.com>,
        <midcom@ietf.org>
References: <B65B4F8437968F488A01A940B21982BF020D6F09@DYN-EXCH-001.dynamicsoft.com>
Subject: Re: [midcom] pre-midcom candidates
Date: Sat, 17 Nov 2001 16:57:38 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2615.200
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2615.200
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

> It has nothing to do with processing speed at the intermediary. The
problem
> is the painfully slow speed of light. Consider two users, A and B, who
sign
> up for service with a provider foo.com. Foo has a data center in
California.
> Foo has no idea where its customers physically reside when they make
calls.
> In fact, foo may not even know the mailing address for its customers. Now,
> it so happens that A and B are in New York. A makes a VoIP call to B. The
> media for these calls is routed from A, over some kind of VPN solution to
> the foo.com data center in CA where the VPN server sits. The media then
goes
> right back into another tunnel, to B, in New York. The media, as a result,
> has done a round trip through the US, just to go across the street. That
> adds substantial latency, increases loss probabilities, and costs a lot
for
> the provider. Since media comes in and goes back out, for whatever the
> number of erlangs the provider is trying to handle, they need TWICE that
in
> access bandwidth in their data center. If the media never goes through
this
> VPN server, they need only the bandwidth to support signaling.
>
> The cost differences between these are astounding. Lets say the provider
> wants to handle a modest 4 calls a second. With signaling alone, assuming
> maybe 2kB worth of SIP messages per call, thats 64 kbps. No problem. With
> media, lets assume a 3 minute call hold time. At 4 calls per second, thats
> 720 erlangs. Lets assume G.711 plus RTP overheads, which is 80kbps. You
need
> to support that much in each direction, but each direction goes in and out
> of the provider network. Thats 115 Mbps in each direction! Thats 1800
TIMES
> as much bandwidth needed. I don't know about you, but my customers are not
> itching to pay for the access bandwidth for that, the switches, the
> operating expenses, and so on, which very much add up.
>
> Another way to think about it is this; the IP network is designed to
figure
> out the shortest route between A and B. By using VPN solutions, you are
> inserting additional hops that can result in seriously non-optimal
routing.

The above discussion assumes a completely centralized model of
service delivery which will not always be the desireable case. The typical
model of delivery  of business-grade IP services is to distribute
intelligence
to the network edge (for QoS, per-subscriber management, etc)  versus one
centralized instance of the service delivery platform. Meaning that
VPN end points could be distributed to PoPs across the network in which
case the latency issues described above would not be relevant. For example,
tthe model distributed model is being followed by all/most SPs undertaking
deployment of managed VPN services.

Saqib

>         o RSIP and VPN solutions might contradict enterprise firewall
>           policy, allowing people to run servers, to use UDP when only
>           TCP is allowed, and so on. Some would consider this a feature,
>           not a drawback. But, if the goal is consistency with IT
>           established policies, it is a drawback. Our proposal provides
>           a simple, minimalistic functionality that is consistent with
>           enterprise policy. The only feature TURN adds, is the ability
>           of a user behind the firewall/NAT to receive a single incoming
>           connection, which it has previously requested.


As I mentioned in an earlier e-mail, standards-based VPN solutions
are (in addition to firewalls) an important component of an enterprises
security policy and could be used to allow secure firewall traversal of
specific protocols to specific external endpoints. Enabling an enterprise
to make such a choice through deploying a VPN set-up (in addition to
a firewall) if it deems it acceptacle in view of its security
policy is viewed positively.

I see generalizations such as the above to be questioning the rationale
for standards such as tunnel-mode IPsec which I don't this working group
wants to get into.

Saqib

----- Original Message -----
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: 'James Ho' <jamesho37@hotmail.com>; Jonathan Rosenberg
<jdrosen@dynamicsoft.com>; <mshore@cisco.com>; <midcom@ietf.org>
Sent: Saturday, November 17, 2001 1:13 AM
Subject: RE: [midcom] pre-midcom candidates


>
>
>
>
> > -----Original Message-----
> > From: James Ho [mailto:jamesho37@hotmail.com]
> > Sent: Thursday, November 15, 2001 2:08 PM
> > To: jdrosen@dynamicsoft.com; mshore@cisco.com; midcom@ietf.org
> > Subject: RE: [midcom] pre-midcom candidates
> >
> >
> > Two issues pertaining to the pre-midcom work that I still don't
> > have clarity around.
> >
> > 1. What are the specific latency/peformance issues associated with
> > tunnelling/VPN appraoches? While admitedly there is another device
> > in the picture, as I mentioned before, there are available/evolving
> > hw solutions for integrate wire-speed IPsec processing
> > enabling tunnel de/encapsulation at wire-speeds, so theoretically
> > this should not be an issue.
>
> It has nothing to do with processing speed at the intermediary. The
problem
> is the painfully slow speed of light. Consider two users, A and B, who
sign
> up for service with a provider foo.com. Foo has a data center in
California.
> Foo has no idea where its customers physically reside when they make
calls.
> In fact, foo may not even know the mailing address for its customers. Now,
> it so happens that A and B are in New York. A makes a VoIP call to B. The
> media for these calls is routed from A, over some kind of VPN solution to
> the foo.com data center in CA where the VPN server sits. The media then
goes
> right back into another tunnel, to B, in New York. The media, as a result,
> has done a round trip through the US, just to go across the street. That
> adds substantial latency, increases loss probabilities, and costs a lot
for
> the provider. Since media comes in and goes back out, for whatever the
> number of erlangs the provider is trying to handle, they need TWICE that
in
> access bandwidth in their data center. If the media never goes through
this
> VPN server, they need only the bandwidth to support signaling.
>
> The cost differences between these are astounding. Lets say the provider
> wants to handle a modest 4 calls a second. With signaling alone, assuming
> maybe 2kB worth of SIP messages per call, thats 64 kbps. No problem. With
> media, lets assume a 3 minute call hold time. At 4 calls per second, thats
> 720 erlangs. Lets assume G.711 plus RTP overheads, which is 80kbps. You
need
> to support that much in each direction, but each direction goes in and out
> of the provider network. Thats 115 Mbps in each direction! Thats 1800
TIMES
> as much bandwidth needed. I don't know about you, but my customers are not
> itching to pay for the access bandwidth for that, the switches, the
> operating expenses, and so on, which very much add up.
>
> Another way to think about it is this; the IP network is designed to
figure
> out the shortest route between A and B. By using VPN solutions, you are
> inserting additional hops that can result in seriously non-optimal
routing.
>
>
> >
> > 2. what is the benefit of developing new/additional approaches
> > for secure tunneling when there are existing standards in place
> > for this (e.g. IPsec)? From Jonathan's e-mail, it would seem that
> > the answer to this is 'no'. Is there a concensus around this
> > (I understand there is a philosophical debate underway on this but my
> > interest is in the technical issues)?
> >
>
> There are at least a few reasons why one might want a new solution for
this
> kind of tunneling (since it is, alas, needed for symmetric cases). I
outline
> these in the TURN draft, but here they are repeated:
>
> o RSIP and the VPN solutions all allocate an entire IP address
>           to the client. This means the provider must have sufficient IP
>           addresses for all the clients which would simultaneously need
>           service. This could require significant address space. With
>           this proposal, its an IP address/port thats allocated, which
>           means very few IP addresses are needed. This is the standard
>           NAT argument.
>
>         o RSIP and VPN solutions all require tunneling. In this
>           proposal, there is no tunneling. The result is more efficient
>           bandwidth usage, which is important for media packets (RTP is
>           a likely user of this mechanism).
>
>         o RSIP and VPN solutions might contradict enterprise firewall
>           policy, allowing people to run servers, to use UDP when only
>           TCP is allowed, and so on. Some would consider this a feature,
>           not a drawback. But, if the goal is consistency with IT
>           established policies, it is a drawback. Our proposal provides
>           a simple, minimalistic functionality that is consistent with
>           enterprise policy. The only feature TURN adds, is the ability
>           of a user behind the firewall/NAT to receive a single incoming
>           connection, which it has previously requested.
>
>
> I am still on the fence, but here is at least a start on some reasons to
do
> it.
>
> Thanks,
> Jonathan R.
>
> ---
> Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
> Chief Scientist                             First Floor
> dynamicsoft                                 East Hanover, NJ 07936
> jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
> http://www.jdrosen.net                      PHONE: (973) 952-5000
> http://www.dynamicsoft.com
>
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
>


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 23:39:30 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05158
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 23:39:29 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id XAA03339
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 23:39:33 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA03260;
	Sat, 17 Nov 2001 23:38:11 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA03224
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 23:38:09 -0500 (EST)
Received: from pallas.host4u.net (pallas.host4u.net [216.71.64.48])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05140;
	Sat, 17 Nov 2001 23:38:05 -0500 (EST)
Received: from C1380748B (c1380748-b.snvl1.sfba.home.com [65.11.102.112])
	by pallas.host4u.net (8.11.6/8.11.6) with SMTP id fAI4bYA01855;
	Sat, 17 Nov 2001 22:37:34 -0600
From: "Shai Mohaban" <shai@kagoor.com>
To: "Jonathan Rosenberg" <jdrosen@dynamicsoft.com>, <sipping@ietf.org>
Cc: <midcom@ietf.org>
Subject: RE: [midcom] New I-D on SIP NAT and Firewall Scenarios and Solutions
Date: Sat, 17 Nov 2001 20:36:17 -0800
Message-ID: <NBBBKGLPAACDDACNPCCMEEEIINAA.shai@kagoor.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700
In-Reply-To: <B65B4F8437968F488A01A940B21982BF020D6EC5@DYN-EXCH-001.dynamicsoft.com>
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Jonathan,

I find this nice and simple for a change...:-)
One comment regarding the security considerations (section 11). You are
saying: "TURN has the important property that compromise of the TURN servers
cannot cause security breaches when the client is within an enterprise." and
I am not sure this is true. Correct me if I am wrong but it seems that a
malicious TURN server can decide to send to the client any traffic it likes
as long as it is coming from the mapped address and port. More than that,
the server can decide when a "call" (or whatever the data stream stands for)
starts and ends and can fake "calls" in general (one at a time, though),
including their content...
I guess we should at least add that authenticating the server is highly
recommended...


> -----Original Message-----
> From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On
> Behalf Of Jonathan Rosenberg
> Sent: Friday, November 16, 2001 8:46 AM
> To: 'sipping@ietf.org'
> Cc: 'midcom@ietf.org'
> Subject: [midcom] New I-D on SIP NAT and Firewall Scenarios and Solutions
>
>
> Folks,
>
> Rohan Mahy, myself, and Sanjoy Sen submitted a new I-D that documents
> scenarios and solutions for a whole bunch of different NAT and firewall
> scenarios for SIP. It should appear in the archives shortly, but until it
> does, you can pick it up at:
>
> http://www.jdrosen.net/papers/draft-rosenberg-sipping-nat-scenarios-00.txt
>
> It needs a lot more work, but should hopefully help people understand how
> all of the various  drafts and solutions fit together.
>
> Thanks,
> Jonathan R.
>
> ---
> Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
> Chief Scientist                             First Floor
> dynamicsoft                                 East Hanover, NJ 07936
> jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
> http://www.jdrosen.net                      PHONE: (973) 952-5000
> http://www.dynamicsoft.com
>
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sat Nov 17 23:50:51 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05352
	for <midcom-archive@odin.ietf.org>; Sat, 17 Nov 2001 23:50:51 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id XAA03474
	for midcom-archive@odin.ietf.org; Sat, 17 Nov 2001 23:50:54 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA03409;
	Sat, 17 Nov 2001 23:44:34 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA03378
	for <midcom@optimus.ietf.org>; Sat, 17 Nov 2001 23:44:32 -0500 (EST)
Received: from pallas.host4u.net (pallas.host4u.net [216.71.64.48])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA05208
	for <midcom@ietf.org>; Sat, 17 Nov 2001 23:44:28 -0500 (EST)
Received: from C1380748B (c1380748-b.snvl1.sfba.home.com [65.11.102.112])
	by pallas.host4u.net (8.11.6/8.11.6) with SMTP id fAI4hxA03046
	for <midcom@ietf.org>; Sat, 17 Nov 2001 22:43:59 -0600
From: "Shai Mohaban" <shai@kagoor.com>
To: <midcom@ietf.org>
Date: Sat, 17 Nov 2001 20:42:42 -0800
Message-ID: <NBBBKGLPAACDDACNPCCMOEEIINAA.shai@kagoor.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700
Content-Transfer-Encoding: 7bit
Subject: [midcom] NAT traversal in IPSEC
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Does anyone follow the related work in the IPSEC WG? It seems that some IDs
there are dealing with similar issues:
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-reqts-00.txt
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-t-ike-01.txt
http://www.ietf.org/internet-drafts/draft-ietf-ipsec-udp-encaps-justificatio
n-00.txt

Hope we are not trying to duplicate any of the work...


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sun Nov 18 10:02:07 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA25323
	for <midcom-archive@odin.ietf.org>; Sun, 18 Nov 2001 10:02:07 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id KAA20885
	for midcom-archive@odin.ietf.org; Sun, 18 Nov 2001 10:02:11 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA20510;
	Sun, 18 Nov 2001 09:58:10 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA20481
	for <midcom@optimus.ietf.org>; Sun, 18 Nov 2001 09:58:08 -0500 (EST)
Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA25217
	for <midcom@ietf.org>; Sun, 18 Nov 2001 09:58:04 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fAIEval15813;
	Sun, 18 Nov 2001 06:57:36 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABZ14239;
	Sun, 18 Nov 2001 06:57:08 -0800 (PST)
Message-Id: <5.1.0.14.0.20011118095812.00a53da0@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Sun, 18 Nov 2001 10:00:09 -0500
To: "Shai Mohaban" <shai@kagoor.com>, <midcom@ietf.org>
From: Melinda Shore <mshore@cisco.com>
Subject: Re: [midcom] NAT traversal in IPSEC
In-Reply-To: <NBBBKGLPAACDDACNPCCMOEEIINAA.shai@kagoor.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 08:42 PM 11/17/01 -0800, Shai Mohaban wrote:
>Does anyone follow the related work in the IPSEC WG? It seems that some IDs
>there are dealing with similar issues:
>http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-reqts-00.txt
>http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-t-ike-01.txt
>http://www.ietf.org/internet-drafts/draft-ietf-ipsec-udp-encaps-justificatio
>n-00.txt

They're dealing with a different set of problems - it's not
that they don't know where to send the traffic, it's that
header rewrites break the HMAC.

Melinda



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sun Nov 18 17:50:59 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA29484
	for <midcom-archive@odin.ietf.org>; Sun, 18 Nov 2001 17:50:59 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id RAA28303
	for midcom-archive@odin.ietf.org; Sun, 18 Nov 2001 17:51:04 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28139;
	Sun, 18 Nov 2001 17:49:33 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28108
	for <midcom@optimus.ietf.org>; Sun, 18 Nov 2001 17:49:31 -0500 (EST)
Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA29447
	for <midcom@ietf.org>; Sun, 18 Nov 2001 17:49:25 -0500 (EST)
Received: from airborne.cisco.com (airborne.cisco.com [171.71.154.32])
	by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fAIMmxE11060
	for <midcom@ietf.org>; Sun, 18 Nov 2001 14:48:59 -0800 (PST)
Received: from SBRIM-W2K (sjc-vpn2-593.cisco.com [10.21.114.81])
	by airborne.cisco.com (Mirapoint)
	with SMTP id AAF21415;
	Sun, 18 Nov 2001 14:48:55 -0800 (PST)
Received: by SBRIM-W2K (sSMTP sendmail emulation); Sun, 18 Nov 2001 17:48:58 -0500
Date: Sun, 18 Nov 2001 17:48:58 -0500
From: Scott Brim <swb@employees.org>
To: midcom@ietf.org
Subject: Re: [midcom] Minor agenda revision
Message-ID: <20011118174858.C1544@SBRIM-W2K>
Mail-Followup-To: Scott Brim <swb@employees.org>, midcom@ietf.org
References: <5.1.0.14.0.20011117111028.00a3f750@localhost>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
User-Agent: Mutt/1.2.5i
In-Reply-To: <5.1.0.14.0.20011117111028.00a3f750@localhost>; from mshore@cisco.com on Sat, Nov 17, 2001 at 11:15:49AM -0500
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

On Sat, Nov 17, 2001 11:15:49AM -0500, Melinda Shore wrote:
> I am adding the Rosenberg TURN draft to the list of drafts
> to read in preparation for the SLC meeting.  I realize that
> this draft was prepared well after the deadline for submission
> of pre-midcom candidates, but 1) it's already under discussion
> on the mailing list, 2) I had been under the (mis)impression
> that the charter revision had been accepted by the IAB and
> that we were clear to move the work forward quickly, and 3)
> most importantly, we must not allow procedural rigidity to
> prevent us from doing thorough technical work.

I can't find the charter revision.  Pointers?

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sun Nov 18 18:08:41 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA29639
	for <midcom-archive@odin.ietf.org>; Sun, 18 Nov 2001 18:08:41 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id SAA29116
	for midcom-archive@odin.ietf.org; Sun, 18 Nov 2001 18:08:46 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA28923;
	Sun, 18 Nov 2001 18:01:52 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA28892
	for <midcom@optimus.ietf.org>; Sun, 18 Nov 2001 18:01:50 -0500 (EST)
Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA29563
	for <midcom@ietf.org>; Sun, 18 Nov 2001 18:01:45 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fAIN1IE13869;
	Sun, 18 Nov 2001 15:01:18 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABZ16383;
	Sun, 18 Nov 2001 15:00:50 -0800 (PST)
Message-Id: <5.1.0.14.0.20011118180140.00a58e80@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Sun, 18 Nov 2001 18:03:48 -0500
To: Scott Brim <swb@employees.org>, midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Subject: Re: [midcom] Minor agenda revision
In-Reply-To: <20011118174858.C1544@SBRIM-W2K>
References: <5.1.0.14.0.20011117111028.00a3f750@localhost>
 <5.1.0.14.0.20011117111028.00a3f750@localhost>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 05:48 PM 11/18/01 -0500, Scott Brim wrote:
>On Sat, Nov 17, 2001 11:15:49AM -0500, Melinda Shore wrote:
>> I am adding the Rosenberg TURN draft to the list of drafts
>> to read in preparation for the SLC meeting.  I realize that
>> this draft was prepared well after the deadline for submission
>> of pre-midcom candidates, but 1) it's already under discussion
>> on the mailing list, 2) I had been under the (mis)impression
>> that the charter revision had been accepted by the IAB and
>> that we were clear to move the work forward quickly, and 3)
>> most importantly, we must not allow procedural rigidity to
>> prevent us from doing thorough technical work.
>I can't find the charter revision.  Pointers?

The deliverable was added to the charter but the revision
was not (go figure).  The text has been sent out several times,
but one more time can't hurt (much):

Ubiquitous deployment of midcom in all middleboxes could take many years.
In the interim, a solution is needed that allows applications to operate
in the presence of midcom-unaware middleboxes. To support this, the
midcom group will develop or document a protocol or approach that allows
clients to indirectly obtain address bindings from midcom-unaware
middleboxes, through communications with server elements on the public
side of the middlebox. The key goals for this effort are rapid delivery of
a simple solution (since it is an interim solution), consistency with the
midcom framework, and security.


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sun Nov 18 23:32:06 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA04240
	for <midcom-archive@odin.ietf.org>; Sun, 18 Nov 2001 23:32:06 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id XAA07165
	for midcom-archive@odin.ietf.org; Sun, 18 Nov 2001 23:31:58 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA06341;
	Sun, 18 Nov 2001 23:20:00 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id XAA06288
	for <midcom@optimus.ietf.org>; Sun, 18 Nov 2001 23:19:58 -0500 (EST)
Received: from mail1.dynamicsoft.com ([63.113.40.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA03769;
	Sun, 18 Nov 2001 23:19:53 -0500 (EST)
Received: from DYN-EXCH-001.dynamicsoft.com (dyn-exch-001 [63.113.44.7])
	by mail1.dynamicsoft.com (8.12.0.Beta7/8.12.0.Beta7) with ESMTP id fAJ4HvCJ016667;
	Sun, 18 Nov 2001 23:17:57 -0500 (EST)
Received: by DYN-EXCH-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19)
	id <W5C2JNBR>; Sun, 18 Nov 2001 23:19:19 -0500
Message-ID: <B65B4F8437968F488A01A940B21982BF020D6F1F@DYN-EXCH-001.dynamicsoft.com>
From: Jonathan Rosenberg <jdrosen@dynamicsoft.com>
To: "'Shai Mohaban'" <shai@kagoor.com>,
        Jonathan Rosenberg
	 <jdrosen@dynamicsoft.com>, sipping@ietf.org
Cc: midcom@ietf.org
Subject: RE: [midcom] New I-D on SIP NAT and Firewall Scenarios and Soluti
	ons
Date: Sun, 18 Nov 2001 23:19:11 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
	charset="iso-8859-1"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



 

> -----Original Message-----
> From: Shai Mohaban [mailto:shai@kagoor.com]
> Sent: Saturday, November 17, 2001 11:36 PM
> To: Jonathan Rosenberg; sipping@ietf.org
> Cc: midcom@ietf.org
> Subject: RE: [midcom] New I-D on SIP NAT and Firewall Scenarios and
> Solutions
> 
> 
> Jonathan,
> 
> I find this nice and simple for a change...:-)
> One comment regarding the security considerations (section 
> 11). You are
> saying: "TURN has the important property that compromise of 
> the TURN servers
> cannot cause security breaches when the client is within an 
> enterprise." and
> I am not sure this is true. Correct me if I am wrong but it 
> seems that a
> malicious TURN server can decide to send to the client any 
> traffic it likes
> as long as it is coming from the mapped address and port. 

Yes, thats true. What it means is that it won't be able to attack other
hosts inside the enterprise.

> More than that,
> the server can decide when a "call" (or whatever the data 
> stream stands for)
> starts and ends and can fake "calls" in general (one at a 
> time, though),
> including their content...
> I guess we should at least add that authenticating the server 
> is highly
> recommended...

Yeah, thats why mutual authentication is provided.

-Jonathan R.


---
Jonathan D. Rosenberg, Ph.D.                72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
jdrosen@dynamicsoft.com                     FAX:   (973) 952-5050
http://www.jdrosen.net                      PHONE: (973) 952-5000
http://www.dynamicsoft.com


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 19 00:09:17 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA04694
	for <midcom-archive@odin.ietf.org>; Mon, 19 Nov 2001 00:09:16 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id AAA08470
	for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 00:09:18 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA08400;
	Mon, 19 Nov 2001 00:07:45 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA08372
	for <midcom@optimus.ietf.org>; Mon, 19 Nov 2001 00:07:41 -0500 (EST)
Received: from mgo.iij.ad.jp (root@mgo.iij.ad.jp [202.232.15.6])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA04669
	for <midcom@ietf.org>; Mon, 19 Nov 2001 00:07:38 -0500 (EST)
Received: from ns.iij.ad.jp (ns.iij.ad.jp [192.168.2.8])
	by mgo.iij.ad.jp (8.8.8/MGO1.0) with ESMTP id OAA14459;
	Mon, 19 Nov 2001 14:07:25 +0900 (JST)
Received: from zeus (h188n005.iij.ad.jp [192.168.5.188]) by ns.iij.ad.jp (8.8.5/3.5Wpl7) with ESMTP id OAA26376; Mon, 19 Nov 2001 14:07:25 +0900 (JST)
To: midcom@ietf.org
Cc: nats@ml.canonet.ne.jp, nats@bugest.net
From: Kuniaki Kondo <kuniaki@iij.ad.jp>
Message-Id: <200111191407.FAG89993.JOLJLBV@iij.ad.jp>
X-Mailer: Winbiff [Version 2.34beta3]
X-Accept-Language: ja,en
Date: Mon, 19 Nov 2001 14:07:25 +0900
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [midcom] draft-kuniaki-nats-01.txt
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Hello.

This is kuniaki KONDO, IIJ.
I submitted new two internet-drafts.

draft-kuniaki-nats-01.txt
http://www.ietf.org/internet-drafts/draft-kuniaki-nats-01.txt

draft-kuniaki-capsulated-nats-00.txt
http://www.ietf.org/internet-drafts/draft-kuniaki-capsulated-nats-00.txt

In this new draft, I would like to propose a new method which enables
internet hosts to have direct access to hosts behind NAT routers using
sub-addresses.
Under current NAT scheme, it is impossible for internet hosts to point
exact hosts behind NAT routers.
This method solves the problem by incorporating hostname to
sub-address resolution into DNS and enhancing NAT routers to handle
this resolution.

I would like to have some comments. And, I would like to explain
more detail at next midcom meeting, in no more 15 minutes.

Thank you.

--
Kuniaki Kondo
kuniaki@iij.ad.jp

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 19 03:52:00 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22632
	for <midcom-archive@odin.ietf.org>; Mon, 19 Nov 2001 03:52:00 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id DAA21989
	for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 03:52:01 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA21183;
	Mon, 19 Nov 2001 03:40:35 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA21132
	for <midcom@optimus.ietf.org>; Mon, 19 Nov 2001 03:40:33 -0500 (EST)
Received: from mgo.iij.ad.jp (root@mgo.iij.ad.jp [202.232.15.6])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA22397
	for <midcom@ietf.org>; Mon, 19 Nov 2001 03:40:30 -0500 (EST)
Received: from ns.iij.ad.jp (ns.iij.ad.jp [192.168.2.8])
	by mgo.iij.ad.jp (8.8.8/MGO1.0) with ESMTP id RAA21276;
	Mon, 19 Nov 2001 17:40:25 +0900 (JST)
Received: from zeus (h188n005.iij.ad.jp [192.168.5.188]) by ns.iij.ad.jp (8.8.5/3.5Wpl7) with ESMTP id RAA21013; Mon, 19 Nov 2001 17:40:25 +0900 (JST)
To: kuniaki@iij.ad.jp, midcom@ietf.org
Cc: nats@ml.canonet.ne.jp, nats@bugest.net
Subject: Re: [midcom] draft-kuniaki-nats-01.txt
From: Kuniaki Kondo <kuniaki@iij.ad.jp>
References: <200111191407.FAG89993.JOLJLBV@iij.ad.jp>
In-Reply-To: <200111191407.FAG89993.JOLJLBV@iij.ad.jp>
Message-Id: <200111191740.BHF16695.JLVJLOB@iij.ad.jp>
X-Mailer: Winbiff [Version 2.34beta3]
X-Accept-Language: ja,en
Date: Mon, 19 Nov 2001 17:40:25 +0900
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Hi,

 Previously, I sent about my draft.
 However, I did not say about the purpose of my draft.
 Then, I would like to say about difference between
 midcom and my draft.

 The purpose of proposal is same as my draft. However,
 approaches are different.
 According to midcom-draft, it needs to implement
 for Firewall/NAT and internal hosts. And they have to
 exchange information to use midcom.
 I think that this is one of approach for solve NAT problem.

 However, my approach is different.
 In my draft, to implement to internal host is optional in
 first step. I mean that internal hosts can try to connect to
 external hosts or other internal hosts.
 NATS router or FW distinguishes whether a destination host
 supports NATS protocol or not, and they add sub-address
 and translate IP address, instead.

 Furthermore, I think, when there are two same server in internal
 network such as WWW server which is using same port(80), 
 external host can not choice the server except using SRV RR.
 However, in my draft, the NATS router selects internal server
 depending on sub-address. Thus, those servers can use same port.


"Kuniaki Kondo <kuniaki@iij.ad.jp>" (Mon, 19 Nov 2001 14:07:25 +0900) wrote:

> Hello.
> 
> This is kuniaki KONDO, IIJ.
> I submitted new two internet-drafts.
> 
> draft-kuniaki-nats-01.txt
> http://www.ietf.org/internet-drafts/draft-kuniaki-nats-01.txt
> 
> draft-kuniaki-capsulated-nats-00.txt
> http://www.ietf.org/internet-drafts/draft-kuniaki-capsulated-nats-00.txt
> 
> In this new draft, I would like to propose a new method which enables
> internet hosts to have direct access to hosts behind NAT routers using
> sub-addresses.
> Under current NAT scheme, it is impossible for internet hosts to point
> exact hosts behind NAT routers.
> This method solves the problem by incorporating hostname to
> sub-address resolution into DNS and enhancing NAT routers to handle
> this resolution.
> 
> I would like to have some comments. And, I would like to explain
> more detail at next midcom meeting, in no more 15 minutes.
> 
> Thank you.
> 
> --
> Kuniaki Kondo
> kuniaki@iij.ad.jp
> 
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom


--
Kuniaki Kondo
kuniaki@iij.ad.jp

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 19 12:08:13 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA10075
	for <midcom-archive@odin.ietf.org>; Mon, 19 Nov 2001 12:08:13 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA09730
	for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 12:08:13 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09705;
	Mon, 19 Nov 2001 12:05:36 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09673
	for <midcom@optimus.ietf.org>; Mon, 19 Nov 2001 12:05:34 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA09980
	for <midcom@ietf.org>; Mon, 19 Nov 2001 12:05:31 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111917030514867
 ; Mon, 19 Nov 2001 17:03:05 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XB5TN744>; Mon, 19 Nov 2001 17:04:54 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639E92412@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
Subject: RE: [midcom] new I-D on "symmetric STUN"
Date: Mon, 19 Nov 2001 17:04:48 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1711C.4B8365D0"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1711C.4B8365D0
Content-Type: text/plain;
	charset="ISO-8859-1"



-----Original Message-----
From: Jonathan Rosenberg [mailto:jdrosen@dynamicsoft.com]
Sent: 15 November 2001 23:45
To: 'Steve Davies'; Jonathan Rosenberg; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric STUN"

>>... this proposal says nothing that hasn't already been proposed.

> Really? It is not bitwise or semanticwise identical to your proposal, so
how
> do you claim it has already been proposed?  

The reason I said that TURN is the same as what has been proposed elsewhere
is because it uses the following core concepts in common with other
proposals made to the list, including the Davies proposal (henceforth called
FANTOM - Firewall And NAT Traversal Overt Method). 

The common core concepts includes:
* the use of a public forwarding intermediary, 
* ensuring all connections are outbound connections, 
* use of designated ports on the intermediary to which outbound connections
are made and from which in-bound traffic comes
* a client-server protocol to dynamically map and track (a) the logical
channels the terminal/endpoint is using 
with (b) outbound connections to the intermediaries with (c) unique
transport addresses dynamically allocated on the server. 

Both TURN and FANTOM use these core concepts to build a solution. Without
them, neither would work. TURN presents as if it were a new concept for the
group, whereas the concepts have been presented in other drafts presented to
the list. These concepts have also been explained in public presentations
for the past year. As a minimum a new draft of this nature, coming after the
other drafts, should compare and contrast what it is saying with what has
already been presented.

True, at the bit level the protocols are different, but there are likely to
be many thousands of permutations using the above concepts that achieve the
similar or the same results. I do not think it is in the groups interest to
enumerate all of these individually.  Instead, it would be better to discuss
the strengths and weaknesses of the methods used to implement the concepts,
and explore those variations as a group, hopefully developing an optimal
bit-level solution (subject to the time constraints that we have).  This
isn't achieved by presenting an allegedly new solution in isolation. If it
is felt that the differences in TURN have value, then it would have been
better to present TURN as a delta to the FANTOM (or Sen) procedure, along
with a discussion of why it is better.  The debate would then have moved on,
rather just being mired even further.

The key contributors to the resulting solution would then be able to present
a combined draft that included the insight of the whole group.  After all,
given the short time scale we have, collaborating and working together, with
proper respect for each parties contributions, is going to be the fastest
way to get to a deployable solution.

Steve

------_=_NextPart_001_01C1711C.4B8365D0
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] new I-D on &quot;symmetric STUN&quot;</TITLE>
</HEAD>
<BODY>
<BR>
<BR>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Jonathan Rosenberg [<A =
HREF=3D"mailto:jdrosen@dynamicsoft.com">mailto:jdrosen@dynamicsoft.com</=
A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 15 November 2001 23:45</FONT>
<BR><FONT SIZE=3D2>To: 'Steve Davies'; Jonathan Rosenberg; =
'midcom@ietf.org'</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [midcom] new I-D on &quot;symmetric =
STUN&quot;</FONT>
</P>

<P><FONT SIZE=3D2>&gt;&gt;... this proposal says nothing that hasn't =
already been proposed.</FONT>
</P>

<P><FONT SIZE=3D2>&gt; Really? It is not bitwise or semanticwise =
identical to your proposal, so how</FONT>
<BR><FONT SIZE=3D2>&gt; do you claim it has already been =
proposed?&nbsp; </FONT>
</P>

<P><FONT SIZE=3D2>The reason I said that TURN is the same as what has =
been proposed elsewhere is because it uses the following core concepts =
in common with other proposals made to the list, including the Davies =
proposal (henceforth called FANTOM - Firewall And NAT Traversal Overt =
Method). </FONT></P>

<P><FONT SIZE=3D2>The common core concepts includes:</FONT>
<BR><FONT SIZE=3D2>* the use of a public forwarding intermediary, =
</FONT>
<BR><FONT SIZE=3D2>* ensuring all connections are outbound connections, =
</FONT>
<BR><FONT SIZE=3D2>* use of designated ports on the intermediary to =
which outbound connections are made and from which in-bound traffic =
comes</FONT></P>

<P><FONT SIZE=3D2>* a client-server protocol to dynamically map and =
track (a) the logical channels the terminal/endpoint is using </FONT>
<BR><FONT SIZE=3D2>with (b) outbound connections to the intermediaries =
with (c) unique transport addresses dynamically allocated on the =
server. </FONT></P>

<P><FONT SIZE=3D2>Both TURN and FANTOM use these core concepts to build =
a solution. Without them, neither would work. TURN presents as if it =
were a new concept for the group, whereas the concepts have been =
presented in other drafts presented to the list. These concepts have =
also been explained in public presentations for the past year. As a =
minimum a new draft of this nature, coming after the other drafts, =
should compare and contrast what it is saying with what has already =
been presented.</FONT></P>

<P><FONT SIZE=3D2>True, at the bit level the protocols are different, =
but there are likely to be many thousands of permutations using the =
above concepts that achieve the similar or the same results. I do not =
think it is in the groups interest to enumerate all of these =
individually.&nbsp; Instead, it would be better to discuss the =
strengths and weaknesses of the methods used to implement the concepts, =
and explore those variations as a group, hopefully developing an =
optimal bit-level solution (subject to the time constraints that we =
have).&nbsp; This isn't achieved by presenting an allegedly new =
solution in isolation. If it is felt that the differences in TURN have =
value, then it would have been better to present TURN as a delta to the =
FANTOM (or Sen) procedure, along with a discussion of why it is =
better.&nbsp; The debate would then have moved on, rather just being =
mired even further.</FONT></P>

<P><FONT SIZE=3D2>The key contributors to the resulting solution would =
then be able to present a combined draft that included the insight of =
the whole group.&nbsp; After all, given the short time scale we have, =
collaborating and working together, with proper respect for each =
parties contributions, is going to be the fastest way to get to a =
deployable solution.</FONT></P>

<P><FONT SIZE=3D2>Steve</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C1711C.4B8365D0--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 19 12:12:18 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA10304
	for <midcom-archive@odin.ietf.org>; Mon, 19 Nov 2001 12:12:18 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA09830
	for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 12:12:20 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09773;
	Mon, 19 Nov 2001 12:08:50 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA09742
	for <midcom@optimus.ietf.org>; Mon, 19 Nov 2001 12:08:45 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA10119
	for <midcom@ietf.org>; Mon, 19 Nov 2001 12:08:42 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001111917062626380
 for <midcom@ietf.org>; Mon, 19 Nov 2001 17:06:26 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XB5TN74X>; Mon, 19 Nov 2001 17:08:14 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639E92413@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'midcom@ietf.org'" <midcom@ietf.org>
Subject: Re: [midcom] pre-midcom candidates - Protocol Name for Davies Pro
	posal
Date: Mon, 19 Nov 2001 17:08:09 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1711C.C34CD560"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1711C.C34CD560
Content-Type: text/plain;
	charset="ISO-8859-1"

The protocol and method described in the Davies proposal is now referred to
as FANTOM - Firewall And NAT Traversal Overt Method. Please refer to it as
such.

Thanks

Steve 



------_=_NextPart_001_01C1711C.C34CD560
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>Re: [midcom] pre-midcom candidates - Protocol Name for Davies =
Proposal</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>The protocol and method described in the Davies =
proposal is now referred to as FANTOM - Firewall And NAT Traversal =
Overt Method. Please refer to it as such.</FONT></P>

<P><FONT SIZE=3D2>Thanks</FONT>
</P>

<P><FONT SIZE=3D2>Steve </FONT>
</P>
<BR>

</BODY>
</HTML>
------_=_NextPart_001_01C1711C.C34CD560--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 19 12:41:37 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11978
	for <midcom-archive@odin.ietf.org>; Mon, 19 Nov 2001 12:41:37 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA10923
	for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 12:41:37 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA10827;
	Mon, 19 Nov 2001 12:34:12 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA10796
	for <midcom@optimus.ietf.org>; Mon, 19 Nov 2001 12:34:10 -0500 (EST)
Received: from mail5.microsoft.com (mail5.microsoft.com [131.107.3.121])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA11535
	for <midcom@ietf.org>; Mon, 19 Nov 2001 12:34:06 -0500 (EST)
Received: from inet-vrs-05.redmond.corp.microsoft.com ([157.54.6.148]) by mail5.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Mon, 19 Nov 2001 09:33:15 -0800
Received: from 157.54.5.25 by inet-vrs-05.redmond.corp.microsoft.com (InterScan E-Mail VirusWall NT); Mon, 19 Nov 2001 09:33:15 -0800
Received: from red-imc-02.redmond.corp.microsoft.com ([157.54.9.107]) by inet-hub-03.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Mon, 19 Nov 2001 09:33:14 -0800
Received: from win-imc-01.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.39]) by red-imc-02.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Mon, 19 Nov 2001 09:33:13 -0800
Received: from win-msg-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.134]) by win-imc-01.wingroup.windeploy.ntdev.microsoft.com with Microsoft SMTPSVC(6.0.3588.0);
	 Mon, 19 Nov 2001 09:32:32 -0800
X-MimeOLE: Produced By Microsoft Exchange V6.0.6063.0
Content-Class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies Proposal
Date: Mon, 19 Nov 2001 09:32:32 -0800
Message-ID: <F66A04C29AD9034A8205949AD0C901040194D8CA@win-msg-02.wingroup.windeploy.ntdev.microsoft.com>
Thread-Topic: [midcom] pre-midcom candidates - Protocol Name for Davies Proposal
thread-index: AcFxHNBG+VywQdnORQ2vGTtmPjrtvwAAzPqA
From: "Christian Huitema" <huitema@windows.microsoft.com>
To: "Steve Davies" <sdavies@ridgewaysystems.com>, <midcom@ietf.org>
X-OriginalArrivalTime: 19 Nov 2001 17:32:32.0901 (UTC) FILETIME=[2BB13350:01C17120]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by optimus.ietf.org id MAA10797
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 8bit

Steve,

On the ridgeway web site, one finds phrases such as "Ridgeway uses
patent-pending technology to limit H.323 traffic to Ridgeway's
well-known ports". Is your proposal covered by any of these pending
patents, and if yes what is your licensing strategy?

-- Christian Huitema

-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com] 
Sent: Monday, November 19, 2001 9:08 AM
To: 'midcom@ietf.org'
Subject: Re: [midcom] pre-midcom candidates - Protocol Name for Davies
Proposal

The protocol and method described in the Davies proposal is now referred
to as FANTOM - Firewall And NAT Traversal Overt Method. Please refer to
it as such.
Thanks 
Steve 


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 19 14:19:40 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA18494
	for <midcom-archive@odin.ietf.org>; Mon, 19 Nov 2001 14:19:35 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id OAA13360
	for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 14:19:36 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA13341;
	Mon, 19 Nov 2001 14:17:38 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA13310
	for <midcom@optimus.ietf.org>; Mon, 19 Nov 2001 14:17:36 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA18326
	for <midcom@ietf.org>; Mon, 19 Nov 2001 14:17:34 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAJJH5829385;
	Mon, 19 Nov 2001 11:17:05 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABZ31909;
	Mon, 19 Nov 2001 11:15:20 -0800 (PST)
Message-Id: <5.1.0.14.0.20011119141220.00a65840@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Mon, 19 Nov 2001 14:18:08 -0500
To: "Christian Huitema" <huitema@windows.microsoft.com>,
        "Steve Davies" <sdavies@ridgewaysystems.com>, <midcom@ietf.org>
From: Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies
  Proposal
In-Reply-To: <F66A04C29AD9034A8205949AD0C901040194D8CA@win-msg-02.wingro
 up.windeploy.ntdev.microsoft.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 09:32 AM 11/19/01 -0800, Christian Huitema wrote:
>On the ridgeway web site, one finds phrases such as "Ridgeway uses
>patent-pending technology to limit H.323 traffic to Ridgeway's
>well-known ports". Is your proposal covered by any of these pending
>patents, and if yes what is your licensing strategy?

Ridgeway posted an intellectual property rights notice against this
some time ago (http://www.ietf.org/ietf/IPR/RIDGEWAY-NAT-TRAVERSAL).
I've written them about this on several occasions and gotten answers,
but the answers have not been posted to the midcom mailing list.  I
think this is somewhat unfortunate, since we are trying to select from
among several proposed protocols and the IETF policy is that a 
technology with IPR claims against it will only be preferred against
competing technology when it's clearly superior.  

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 19 15:17:23 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22320
	for <midcom-archive@odin.ietf.org>; Mon, 19 Nov 2001 15:17:23 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA15060
	for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 15:17:25 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA14764;
	Mon, 19 Nov 2001 15:03:30 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA14736
	for <midcom@optimus.ietf.org>; Mon, 19 Nov 2001 15:03:29 -0500 (EST)
Received: from Mitel.COM ([216.191.234.70])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA21487
	for <midcom@ietf.org>; Mon, 19 Nov 2001 15:03:26 -0500 (EST)
From: Tom_Gray@mitel.com
Received: from kanmta01.software.mitel.com (kanmta01 [134.199.37.58]) 
	by Mitel.COM (V8/MAIL-RELAY-2.1) with SMTP id PAA20522;
	Mon, 19 Nov 2001 15:00:46 -0500 (EST)
Received: by kanmta01.software.mitel.com(Lotus SMTP MTA v4.6.7  (934.1 12-30-1999))  id 85256B09.006DEAF5 ; Mon, 19 Nov 2001 15:00:35 -0500
X-Lotus-FromDomain: MITEL
To: Melinda Shore <mshore@cisco.com>
cc: "Christian Huitema" <huitema@windows.microsoft.com>,
        "Steve Davies" <sdavies@ridgewaysystems.com>, midcom@ietf.org
Message-ID: <85256B09.006DE8DE.00@kanmta01.software.mitel.com>
Date: Mon, 19 Nov 2001 15:00:33 -0500
Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies
	 Proposal
Mime-Version: 1.0
Content-type: text/plain; charset=us-ascii
Content-Disposition: inline
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



From:  Tom Gray@MITEL on 11/19/2001 03:00 PM

Since the claim is that the Davies proposal is fundamentally the same as that of
the new TURN proposal, wouldn't this issue be also important for it as well.






Melinda Shore <mshore@cisco.com> on 11/19/2001 02:18:08 PM

To:   "Christian Huitema" <huitema@windows.microsoft.com>, "Steve Davies"
      <sdavies@ridgewaysystems.com>, midcom@ietf.org
cc:    (bcc: Tom Gray/Kan/Mitel)

Subject:  RE: [midcom] pre-midcom candidates - Protocol Name for Davies
      Proposal



At 09:32 AM 11/19/01 -0800, Christian Huitema wrote:
>On the ridgeway web site, one finds phrases such as "Ridgeway uses
>patent-pending technology to limit H.323 traffic to Ridgeway's
>well-known ports". Is your proposal covered by any of these pending
>patents, and if yes what is your licensing strategy?

Ridgeway posted an intellectual property rights notice against this
some time ago (http://www.ietf.org/ietf/IPR/RIDGEWAY-NAT-TRAVERSAL).
I've written them about this on several occasions and gotten answers,
but the answers have not been posted to the midcom mailing list.  I
think this is somewhat unfortunate, since we are trying to select from
among several proposed protocols and the IETF policy is that a
technology with IPR claims against it will only be preferred against
competing technology when it's clearly superior.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom





_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 19 16:55:35 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA28264
	for <midcom-archive@odin.ietf.org>; Mon, 19 Nov 2001 16:55:35 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id QAA17590
	for midcom-archive@odin.ietf.org; Mon, 19 Nov 2001 16:55:36 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA17409;
	Mon, 19 Nov 2001 16:43:19 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA17378
	for <midcom@optimus.ietf.org>; Mon, 19 Nov 2001 16:43:17 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA27548
	for <midcom@ietf.org>; Mon, 19 Nov 2001 16:43:15 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAJLgl817130;
	Mon, 19 Nov 2001 13:42:47 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABZ37468;
	Mon, 19 Nov 2001 13:42:20 -0800 (PST)
Message-Id: <5.1.0.14.0.20011119164355.00a52ad0@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Mon, 19 Nov 2001 16:45:01 -0500
To: <Tom_Gray@mitel.com>
From: Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies
  Proposal
Cc: "Steve Davies" <sdavies@ridgewaysystems.com>, midcom@ietf.org
In-Reply-To: <85256B09.006DE8DE.00@kanmta01.software.mitel.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 03:00 PM 11/19/01 -0500, Tom_Gray@Mitel.COM wrote:
>Since the claim is that the Davies proposal is fundamentally the same as that of
>the new TURN proposal, wouldn't this issue be also important for it as well.

Are you asking if Ridgeway is intending to assert that TURN is
using Ridgeway-patented technology?

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 20 07:28:05 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA05418
	for <midcom-archive@odin.ietf.org>; Tue, 20 Nov 2001 07:28:04 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id HAA15001
	for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 07:28:08 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id HAA14903;
	Tue, 20 Nov 2001 07:25:30 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id HAA14870
	for <midcom@optimus.ietf.org>; Tue, 20 Nov 2001 07:25:23 -0500 (EST)
Received: from Mitel.COM ([216.191.234.70])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA05333
	for <midcom@ietf.org>; Tue, 20 Nov 2001 07:25:19 -0500 (EST)
From: Tom_Gray@mitel.com
Received: from kanmta01.software.mitel.com (kanmta01 [134.199.37.58]) 
	by Mitel.COM (V8/MAIL-RELAY-2.1) with SMTP id HAA03035;
	Tue, 20 Nov 2001 07:24:11 -0500 (EST)
Received: by kanmta01.software.mitel.com(Lotus SMTP MTA v4.6.7  (934.1 12-30-1999))  id 85256B0A.00441FC2 ; Tue, 20 Nov 2001 07:24:05 -0500
X-Lotus-FromDomain: MITEL
To: Melinda Shore <mshore@cisco.com>
cc: "Steve Davies" <sdavies@ridgewaysystems.com>, midcom@ietf.org
Message-ID: <85256B0A.00441EEE.00@kanmta01.software.mitel.com>
Date: Tue, 20 Nov 2001 07:24:07 -0500
Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies
	 Proposal
Mime-Version: 1.0
Content-type: text/plain; charset=us-ascii
Content-Disposition: inline
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org



From:  Tom Gray@MITEL on 11/20/2001 07:24 AM

I think that that would be a valid question given the discussion about the
equivalence of TURN and Davies.





Melinda Shore <mshore@cisco.com> on 11/19/2001 04:45:01 PM

To:   Tom Gray/Kan/Mitel@Mitel
cc:   "Steve Davies" <sdavies@ridgewaysystems.com>, midcom@ietf.org

Subject:  RE: [midcom] pre-midcom candidates - Protocol Name for Davies
      Proposal



At 03:00 PM 11/19/01 -0500, Tom_Gray@Mitel.COM wrote:
>Since the claim is that the Davies proposal is fundamentally the same as that
of
>the new TURN proposal, wouldn't this issue be also important for it as well.

Are you asking if Ridgeway is intending to assert that TURN is
using Ridgeway-patented technology?

Melinda






_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Tue Nov 20 12:31:13 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA22116
	for <midcom-archive@odin.ietf.org>; Tue, 20 Nov 2001 12:31:13 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA27511
	for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 12:31:17 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA27155;
	Tue, 20 Nov 2001 12:28:02 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA27126
	for <midcom@ns.ietf.org>; Tue, 20 Nov 2001 12:28:01 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA21866
	for <midcom@ietf.org>; Tue, 20 Nov 2001 12:27:55 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112017245123144
 for <midcom@ietf.org>; Tue, 20 Nov 2001 17:24:51 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XB5TN8YS>; Tue, 20 Nov 2001 17:27:28 -0000
Message-ID: <00533D13955AD411AF3800A0C9B426390EC4E8@ThisAddressDoesNotExist>
From: Barry Scott <bscott@ridgewaysystems.com>
To: midcom@ietf.org
Date: Tue, 20 Nov 2001 17:27:25 -0000
X-Mailer: Internet Mail Service (5.5.2653.19)
Subject: [midcom] pre-midcom solutions != VPN
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

We see VPNs as different from the technology that pre-midcom solutions will
require. 

Pre-midcom goal: the pre-midcom solution allows users in a private network
to use voice and video IP terminals to communicate with users outside their
private network. It has to allow private to public network transition
without compromising security.

VPN goal: a VPN allows users at remote locations to use resources within a
private network as if they are locally connected. The VPN extends the
boundary of the private network to that remote location, but it remains a
private network. Tunneling happens to be the technique used to make that
extension. No crossing of the boundary from the private network to the
public network occurs. VPN technology often incorporates firewall technology
to ensure the private boundary remains protected through the extension to
the remote location. 

A VPN is a good choice when you wish to allow a trusted remote user or
remote site to be added to your network from outside. Examples: a home
worker, a branch office.

There may be superficial similarities between VPN and pre-midcom technology,
but fundamentally the functionality is diametrically opposed.

	BArry

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Tue Nov 20 12:36:25 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA22453
	for <midcom-archive@odin.ietf.org>; Tue, 20 Nov 2001 12:36:24 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA27623
	for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 12:36:27 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA26982;
	Tue, 20 Nov 2001 12:18:37 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA26951
	for <midcom@ns.ietf.org>; Tue, 20 Nov 2001 12:18:35 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA21274
	for <midcom@ietf.org>; Tue, 20 Nov 2001 12:18:30 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112017151130576
 ; Tue, 20 Nov 2001 17:15:11 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XB5TN8X7>; Tue, 20 Nov 2001 17:17:48 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639172481@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'John LaCour'" <jlacour@netscreen.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
Cc: "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>
Subject: RE: [midcom] new I-D on "symmetric STUN"
Date: Tue, 20 Nov 2001 17:17:41 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C171E7.42C64A40"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C171E7.42C64A40
Content-Type: text/plain;
	charset="ISO-8859-1"

John,

You are quite right. This email didn't help move the debate forward much.
I'm afraid I got a little frustrated with the politics. Nevertheless, I
stick by my statements so let me give you a couple of examples of the flaws
I see. 

* FANTOM uses an out-of-band signalling method 'Create Media Flow' to assign
transport addresses on the remote server/public intemediary. It then sends
outbound UDP Probes (with a session identifier) to create the dynamic NAT
assignment and to complete the mapping between the resultant random source
port the probe came from, and the transport addresses the Create Media Flow
method assigned, and the call. The first probe effectively creates an
outbound UDP connection down which media may flow in either direction for
that call. Please note that media is NOT tunneled in FANTOM.

TURN tries to simplify this approach by combining the 'probe' (the method to
create the dynamic NAT assignment) with an in-band signalling method to
assign transport addresses on the public intermediary. This is the ALLOCATE
method in TURN. 

One of the main reasons FANTOM has out-of-band signalling was to conform to
the spirit of RTP/RTCP by assigning consecutive port pairs to represent the
receive RTP/RTCP addresses at the intermediary. A single method 'Create
Media Flow' does that. Having grabbed a port pair, 2 UDP outbound
connections are needed to the intermediary to receive the respective RTP and
RTCP flows. Hence the Probes. 

TURN cannot conform to the spirit of RTP in this way because the ALLOCATE
method only reserves a single transport address on the intermediary. If it
requested 2 transport addresses, a probe or very similar mechanism would be
required to establish the second outbound UDP connection. Even worse, the
way TURN is specified, there is a good chance that as a TURN server runs out
of resource the associated RTP and RTCP transport addresses could have
different IP addresses. NOT ALLOWED.

There are many other advantages to using a separate Probe message. One very
good use of probes is to keep NAT bindings assigned, i.e. they are sent at
regular intervals to prevent the NAT from timing out. TURN has no probe or
NAT keep-alive methods which breaks the solution on at least 2 counts. In
one case, a terminal may make an ALLOCATE to obtain an address with which to
register with a public SIP proxy. It then sits there waiting to receive
incoming calls. However, without some traffic such as a probe or a NAT keep
alive, the NAT assignment created by the ALLOCATE times out, which means the
terminal won't receive incoming call notifications. A second case when the
NAT binding may time out is when the remote party is not talking and their
terminal implements silence suppression. 

FANTOM uses probes to ensure this doesn't happen. In FANTOM probes are
designed to be easily recognisable in order to help the implementation of an
efficient forwarding intermediary.

* TURN doesn't use a tunnel. FANTOM does. Some think that this implies
FANTOM is a VPN variant. FANTOM is most definitely not, but we'll deal with
that separately. FANTOM uses a tunnel for multiplexing out-of-band call
control and the out-of-band FANTOM client-server protocol into a single
connection. The connection is TCP because we valued reliability and the
life-time is more easily managed by the NAT. It could be UDP but we didn't
feel we needed to re-invent a UDP session with TCP characteristics. 

We envisaged that the client end of FANTOM would be implemented in severals
ways. For example, it could be implemented in a standalone system, serving
many terminals in a single enterprise. In Centrex applications there would
be no local proxy. In this case the FANTOM client would have to handle
multiple simultaneous call setups and cleardowns. We judged a single
persistant tunnel for all call control from the FANTOM client to FANTOM
server was the most efficient use of resources. 

To avoid tunnels, a similar TURN implementation would require the standalone
client to create many UDP connections to the intermediary - one for each
terminal wanting to receive incoming calls. As we remarked above, these UDP
connections need to keep NAT bindings through some sort of NAT-keep-alive
messages. The SEN proposal implemented a similar technique and found it to
be too resource intensive - hence their SIP proposal extensions. 

Having a tunnel in FANTOM has further advantages, not least in allowing
out-of-band signalling and control. The benefit here is that the protocol
can be extended to include other functions such as network management
without breaking the architecture. We want FANTOM to be extensible.

This email is getting quite long so I'll conclude by remarking that I hope
that these explanations indicate that while  FANTOM appears more complex
than TURN, there is a reason behind each method FANTOM implements. We
haven't made it complex for complexity's sake. FANTOM may be unfamiliar, but
that's no reason to start from scratch which I fear TURN is. 

Steve

-----Original Message-----
From: John LaCour [mailto:jlacour@netscreen.com]
Sent: 15 November 2001 21:58
To: 'Steve Davies'; 'Jonathan Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric STUN"


Steve,
 
You may or may not be correct, but this message does next to nothing
to help any of us evaluate the merits of either proposal.
 
Just because something was created earlier or even implemented doesn't
make it inherently better.
 
Rather than try to strong-arm us, you really need to enumerate the many
flaws and how your proposal addresses them.  If you want to be
completely forthcoming coming you should also discuss the weaknesses
of your own proposal and why you've made those trade-offs.
 
In fairness to you and Jonathan, I haven't done a thorough review of
either proposal yet.  This message should not be misconstrued
as  supporting either proposal.  Rather I'm trying to encourage
you to tell us something useful.
 
-John
-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: Thursday, November 15, 2001 1:42 PM
To: 'Jonathan Rosenberg'; 'midcom@ietf.org'
Subject: RE: [midcom] new I-D on "symmetric STUN"


Interesting TURN of events or should I say 'U TURN'. 
Puns aside, this proposal says nothing that hasn't already been proposed.
While I am pleased to see TURN uses IDENTICAL concepts to the Davies
proposal, it contains many flaws (too numerous to go into here). Fix those
flaws and you end up with the Davies proposal. Not only does TURN come a
month after the deadline set in Melinda's rules of engagement, but the
development of such a new and immature proposal is by definition not in the
best interests of a pre-midcom solution. If we agree on the concepts and
Jonathan et al are interested in a quick solution, then surely it makes
sense to jointly work on the most mature incarnation of those concepts. Why
re-invent the wheel?
Steve 

------_=_NextPart_001_01C171E7.42C64A40
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] new I-D on &quot;symmetric STUN&quot;</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>John,</FONT>
</P>

<P><FONT SIZE=3D2>You are quite right. This email didn't help move the =
debate forward much. I'm afraid I got a little frustrated with the =
politics. Nevertheless, I stick by my statements so let me give you a =
couple of examples of the flaws I see. </FONT></P>

<P><FONT SIZE=3D2>* FANTOM uses an out-of-band signalling method =
'Create Media Flow' to assign transport addresses on the remote =
server/public intemediary. It then sends outbound UDP Probes (with a =
session identifier) to create the dynamic NAT assignment and to =
complete the mapping between the resultant random source port the probe =
came from, and the transport addresses the Create Media Flow method =
assigned, and the call. The first probe effectively creates an outbound =
UDP connection down which media may flow in either direction for that =
call. Please note that media is NOT tunneled in FANTOM.</FONT></P>

<P><FONT SIZE=3D2>TURN tries to simplify this approach by combining the =
'probe' (the method to create the dynamic NAT assignment) with an =
in-band signalling method to assign transport addresses on the public =
intermediary. This is the ALLOCATE method in TURN. </FONT></P>

<P><FONT SIZE=3D2>One of the main reasons FANTOM has out-of-band =
signalling was to conform to the spirit of RTP/RTCP by assigning =
consecutive port pairs to represent the receive RTP/RTCP addresses at =
the intermediary. A single method 'Create Media Flow' does that. Having =
grabbed a port pair, 2 UDP outbound connections are needed to the =
intermediary to receive the respective RTP and RTCP flows. Hence the =
Probes. </FONT></P>

<P><FONT SIZE=3D2>TURN cannot conform to the spirit of RTP in this way =
because the ALLOCATE method only reserves a single transport address on =
the intermediary. If it requested 2 transport addresses, a probe or =
very similar mechanism would be required to establish the second =
outbound UDP connection. Even worse, the way TURN is specified, there =
is a good chance that as a TURN server runs out of resource the =
associated RTP and RTCP transport addresses could have different IP =
addresses. NOT ALLOWED.</FONT></P>

<P><FONT SIZE=3D2>There are many other advantages to using a separate =
Probe message. One very good use of probes is to keep NAT bindings =
assigned, i.e. they are sent at regular intervals to prevent the NAT =
from timing out. TURN has no probe or NAT keep-alive methods which =
breaks the solution on at least 2 counts. In one case, a terminal may =
make an ALLOCATE to obtain an address with which to register with a =
public SIP proxy. It then sits there waiting to receive incoming calls. =
However, without some traffic such as a probe or a NAT keep alive, the =
NAT assignment created by the ALLOCATE times out, which means the =
terminal won't receive incoming call notifications. A second case when =
the NAT binding may time out is when the remote party is not talking =
and their terminal implements silence suppression. </FONT></P>

<P><FONT SIZE=3D2>FANTOM uses probes to ensure this doesn't happen. In =
FANTOM probes are designed to be easily recognisable in order to help =
the implementation of an efficient forwarding intermediary.</FONT></P>

<P><FONT SIZE=3D2>* TURN doesn't use a tunnel. FANTOM does. Some think =
that this implies FANTOM is a VPN variant. FANTOM is most definitely =
not, but we'll deal with that separately. FANTOM uses a tunnel for =
multiplexing out-of-band call control and the out-of-band FANTOM =
client-server protocol into a single connection. The connection is TCP =
because we valued reliability and the life-time is more easily managed =
by the NAT. It could be UDP but we didn't feel we needed to re-invent a =
UDP session with TCP characteristics. </FONT></P>

<P><FONT SIZE=3D2>We envisaged that the client end of FANTOM would be =
implemented in severals ways. For example, it could be implemented in a =
standalone system, serving many terminals in a single enterprise. In =
Centrex applications there would be no local proxy. In this case the =
FANTOM client would have to handle multiple simultaneous call setups =
and cleardowns. We judged a single persistant tunnel for all call =
control from the FANTOM client to FANTOM server was the most efficient =
use of resources. </FONT></P>

<P><FONT SIZE=3D2>To avoid tunnels, a similar TURN implementation would =
require the standalone client to create many UDP connections to the =
intermediary - one for each terminal wanting to receive incoming calls. =
As we remarked above, these UDP connections need to keep NAT bindings =
through some sort of NAT-keep-alive messages. The SEN proposal =
implemented a similar technique and found it to be too resource =
intensive - hence their SIP proposal extensions. </FONT></P>

<P><FONT SIZE=3D2>Having a tunnel in FANTOM has further advantages, not =
least in allowing out-of-band signalling and control. The benefit here =
is that the protocol can be extended to include other functions such as =
network management without breaking the architecture. We want FANTOM to =
be extensible.</FONT></P>

<P><FONT SIZE=3D2>This email is getting quite long so I'll conclude by =
remarking that I hope that these explanations indicate that while&nbsp; =
FANTOM appears more complex than TURN, there is a reason behind each =
method FANTOM implements. We haven't made it complex for complexity's =
sake. FANTOM may be unfamiliar, but that's no reason to start from =
scratch which I fear TURN is. </FONT></P>

<P><FONT SIZE=3D2>Steve</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: John LaCour [<A =
HREF=3D"mailto:jlacour@netscreen.com">mailto:jlacour@netscreen.com</A>]<=
/FONT>
<BR><FONT SIZE=3D2>Sent: 15 November 2001 21:58</FONT>
<BR><FONT SIZE=3D2>To: 'Steve Davies'; 'Jonathan Rosenberg'; =
'midcom@ietf.org'</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [midcom] new I-D on &quot;symmetric =
STUN&quot;</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Steve,</FONT>
<BR><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>You may or may not be correct, but this message does =
next to nothing</FONT>
<BR><FONT SIZE=3D2>to help any of us evaluate the merits of either =
proposal.</FONT>
<BR><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>Just because something was created earlier or even =
implemented doesn't</FONT>
<BR><FONT SIZE=3D2>make it inherently better.</FONT>
<BR><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>Rather than try to strong-arm us, you really need to =
enumerate the many</FONT>
<BR><FONT SIZE=3D2>flaws and how your proposal addresses them.&nbsp; If =
you want to be</FONT>
<BR><FONT SIZE=3D2>completely forthcoming coming you should also =
discuss the weaknesses</FONT>
<BR><FONT SIZE=3D2>of your own proposal and why you've made those =
trade-offs.</FONT>
<BR><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>In fairness to you and Jonathan, I haven't done a =
thorough review of</FONT>
<BR><FONT SIZE=3D2>either proposal yet.&nbsp; This message should not =
be misconstrued</FONT>
<BR><FONT SIZE=3D2>as&nbsp; supporting either proposal.&nbsp; Rather =
I'm trying to encourage</FONT>
<BR><FONT SIZE=3D2>you to tell us something useful.</FONT>
<BR><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>-John</FONT>
<BR><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Steve Davies [<A =
HREF=3D"mailto:sdavies@ridgewaysystems.com">mailto:sdavies@ridgewaysyste=
ms.com</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: Thursday, November 15, 2001 1:42 PM</FONT>
<BR><FONT SIZE=3D2>To: 'Jonathan Rosenberg'; 'midcom@ietf.org'</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [midcom] new I-D on &quot;symmetric =
STUN&quot;</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Interesting TURN of events or should I say 'U TURN'. =
</FONT>
<BR><FONT SIZE=3D2>Puns aside, this proposal says nothing that hasn't =
already been proposed. While I am pleased to see TURN uses IDENTICAL =
concepts to the Davies proposal, it contains many flaws (too numerous =
to go into here). Fix those flaws and you end up with the Davies =
proposal. Not only does TURN come a month after the deadline set in =
Melinda's rules of engagement, but the development of such a new and =
immature proposal is by definition not in the best interests of a =
pre-midcom solution. If we agree on the concepts and Jonathan et al are =
interested in a quick solution, then surely it makes sense to jointly =
work on the most mature incarnation of those concepts. Why re-invent =
the wheel?</FONT></P>

<P><FONT SIZE=3D2>Steve </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C171E7.42C64A40--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Tue Nov 20 12:43:29 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA22922
	for <midcom-archive@odin.ietf.org>; Tue, 20 Nov 2001 12:43:29 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA27760
	for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 12:43:32 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA27566;
	Tue, 20 Nov 2001 12:34:25 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA27535
	for <midcom@ns.ietf.org>; Tue, 20 Nov 2001 12:34:23 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id MAA22379
	for <midcom@ietf.org>; Tue, 20 Nov 2001 12:34:20 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112017310115699
 ; Tue, 20 Nov 2001 17:31:01 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XB5TN8ZC>; Tue, 20 Nov 2001 17:33:38 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639172482@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'Melinda Shore'" <mshore@cisco.com>,
        Christian Huitema<huitema@windows.microsoft.com>, midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates - On IPR
Date: Tue, 20 Nov 2001 17:33:35 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C171E9.7B58F270"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C171E9.7B58F270
Content-Type: text/plain;
	charset="ISO-8859-1"

This is the email I sent to Melinda on the topic of IPR.


-----Original Message-----
From: Steve Davies 
Sent: 12 October 2001 20:57
To: Melinda Shore
Cc: Steve Davies; Barry Scott; Pete Cordell
Subject: RE: ID Submission - draft-davies-fw-nat-traversal-01.txt


Melinda,

In making this second contribution, draft-davies-fw-nat-traversal-01.txt,
Ridgeway stands by the declaration made to the IETF on 21st March, 2001,
regarding intellectual property claims. 

Ridgeway has applied for one or more patents on the technology related to
the traversal of firewalls and NATs. To date no patents have been awarded to
Ridgeway.

Ridgeway remains willing to disclose any patents awarded in this area and to
license them under openly specified, fair and non-discriminatory terms
should one of our patents be required to implement any standard associated
with the traversal of firewalls and NATs.

I hope this clarifies our position and the status of our claims, but please
ask if you need further information.

Kindest regards

Steve 

Steve Davies
Chief Technical Officer
Ridgeway Systems and Software
Email: mailto:sdavies@ridgewaysystems.com 
Web:  www.ridgewaysystems.com
Tel W: +44 (0)118 938 1114
Tel H: +44 (0)1285 770979 


-----Original Message-----
From: Melinda Shore [mailto:mshore@cisco.com]
Sent: 19 November 2001 19:18
To: Christian Huitema; Steve Davies; midcom@ietf.org
Subject: RE: [midcom] pre-midcom candidates - Protocol Name for Davies
Proposal


At 09:32 AM 11/19/01 -0800, Christian Huitema wrote:
>On the ridgeway web site, one finds phrases such as "Ridgeway uses
>patent-pending technology to limit H.323 traffic to Ridgeway's
>well-known ports". Is your proposal covered by any of these pending
>patents, and if yes what is your licensing strategy?

Ridgeway posted an intellectual property rights notice against this
some time ago (http://www.ietf.org/ietf/IPR/RIDGEWAY-NAT-TRAVERSAL).
I've written them about this on several occasions and gotten answers,
but the answers have not been posted to the midcom mailing list.  I
think this is somewhat unfortunate, since we are trying to select from
among several proposed protocols and the IETF policy is that a 
technology with IPR claims against it will only be preferred against
competing technology when it's clearly superior.  

Melinda

------_=_NextPart_001_01C171E9.7B58F270
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] pre-midcom candidates - On IPR</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>This is the email I sent to Melinda on the topic of =
IPR.</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Steve Davies </FONT>
<BR><FONT SIZE=3D2>Sent: 12 October 2001 20:57</FONT>
<BR><FONT SIZE=3D2>To: Melinda Shore</FONT>
<BR><FONT SIZE=3D2>Cc: Steve Davies; Barry Scott; Pete Cordell</FONT>
<BR><FONT SIZE=3D2>Subject: RE: ID Submission - =
draft-davies-fw-nat-traversal-01.txt</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Melinda,</FONT>
</P>

<P><FONT SIZE=3D2>In making this second contribution, =
draft-davies-fw-nat-traversal-01.txt, Ridgeway stands by the =
declaration made to the IETF on 21st March, 2001, regarding =
intellectual property claims. </FONT></P>

<P><FONT SIZE=3D2>Ridgeway has applied for one or more patents on the =
technology related to the traversal of firewalls and NATs. To date no =
patents have been awarded to Ridgeway.</FONT></P>

<P><FONT SIZE=3D2>Ridgeway remains willing to disclose any patents =
awarded in this area and to license them under openly specified, fair =
and non-discriminatory terms should one of our patents be required to =
implement any standard associated with the traversal of firewalls and =
NATs.</FONT></P>

<P><FONT SIZE=3D2>I hope this clarifies our position and the status of =
our claims, but please ask if you need further information.</FONT>
</P>

<P><FONT SIZE=3D2>Kindest regards</FONT>
</P>

<P><FONT SIZE=3D2>Steve </FONT>
</P>

<P><FONT SIZE=3D2>Steve Davies</FONT>
<BR><FONT SIZE=3D2>Chief Technical Officer</FONT>
<BR><FONT SIZE=3D2>Ridgeway Systems and Software</FONT>
<BR><FONT SIZE=3D2>Email: <A =
HREF=3D"mailto:sdavies@ridgewaysystems.com">mailto:sdavies@ridgewaysyste=
ms.com</A> </FONT>
<BR><FONT SIZE=3D2>Web:&nbsp; www.ridgewaysystems.com</FONT>
<BR><FONT SIZE=3D2>Tel W: +44 (0)118 938 1114</FONT>
<BR><FONT SIZE=3D2>Tel H: +44 (0)1285 770979 </FONT>
</P>
<BR>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Melinda Shore [<A =
HREF=3D"mailto:mshore@cisco.com">mailto:mshore@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 19 November 2001 19:18</FONT>
<BR><FONT SIZE=3D2>To: Christian Huitema; Steve Davies; =
midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [midcom] pre-midcom candidates - =
Protocol Name for Davies</FONT>
<BR><FONT SIZE=3D2>Proposal</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>At 09:32 AM 11/19/01 -0800, Christian Huitema =
wrote:</FONT>
<BR><FONT SIZE=3D2>&gt;On the ridgeway web site, one finds phrases such =
as &quot;Ridgeway uses</FONT>
<BR><FONT SIZE=3D2>&gt;patent-pending technology to limit H.323 traffic =
to Ridgeway's</FONT>
<BR><FONT SIZE=3D2>&gt;well-known ports&quot;. Is your proposal covered =
by any of these pending</FONT>
<BR><FONT SIZE=3D2>&gt;patents, and if yes what is your licensing =
strategy?</FONT>
</P>

<P><FONT SIZE=3D2>Ridgeway posted an intellectual property rights =
notice against this</FONT>
<BR><FONT SIZE=3D2>some time ago (<A =
HREF=3D"http://www.ietf.org/ietf/IPR/RIDGEWAY-NAT-TRAVERSAL" =
TARGET=3D"_blank">http://www.ietf.org/ietf/IPR/RIDGEWAY-NAT-TRAVERSAL</A=
>).</FONT>
<BR><FONT SIZE=3D2>I've written them about this on several occasions =
and gotten answers,</FONT>
<BR><FONT SIZE=3D2>but the answers have not been posted to the midcom =
mailing list.&nbsp; I</FONT>
<BR><FONT SIZE=3D2>think this is somewhat unfortunate, since we are =
trying to select from</FONT>
<BR><FONT SIZE=3D2>among several proposed protocols and the IETF policy =
is that a </FONT>
<BR><FONT SIZE=3D2>technology with IPR claims against it will only be =
preferred against</FONT>
<BR><FONT SIZE=3D2>competing technology when it's clearly superior.&nbsp=
; </FONT>
</P>

<P><FONT SIZE=3D2>Melinda</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C171E9.7B58F270--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Tue Nov 20 12:58:41 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23938
	for <midcom-archive@odin.ietf.org>; Tue, 20 Nov 2001 12:58:41 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA28078
	for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 12:58:43 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA28052;
	Tue, 20 Nov 2001 12:56:53 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA28021
	for <midcom@ns.ietf.org>; Tue, 20 Nov 2001 12:56:51 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23773
	for <midcom@ietf.org>; Tue, 20 Nov 2001 12:56:48 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAKHuL807125;
	Tue, 20 Nov 2001 09:56:21 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABZ59760;
	Tue, 20 Nov 2001 09:55:52 -0800 (PST)
Message-Id: <5.1.0.14.0.20011120125804.00a68390@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Tue, 20 Nov 2001 12:58:52 -0500
To: Barry Scott <bscott@ridgewaysystems.com>, midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Subject: Re: [midcom] pre-midcom solutions != VPN
In-Reply-To: <00533D13955AD411AF3800A0C9B426390EC4E8@ThisAddressDoesNotE
 xist>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 05:27 PM 11/20/01 +0000, Barry Scott wrote:
>Pre-midcom goal: the pre-midcom solution allows users in a private network
>to use voice and video IP terminals to communicate with users outside their
>private network. It has to allow private to public network transition
>without compromising security.

I'd amend that to say "within the midcom framework."  Ideally we'd
like endpoints to be able to get their public address for signaling
purposes.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Tue Nov 20 13:19:22 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA25828
	for <midcom-archive@odin.ietf.org>; Tue, 20 Nov 2001 13:19:21 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id NAA29014
	for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 13:19:23 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA28815;
	Tue, 20 Nov 2001 13:09:22 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA28784
	for <midcom@ns.ietf.org>; Tue, 20 Nov 2001 13:09:20 -0500 (EST)
Received: from pop.mainstreet.net (smtp.mainstreet.net [207.5.0.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA25008
	for <midcom@ietf.org>; Tue, 20 Nov 2001 13:09:16 -0500 (EST)
Received: from vip (saqibj.mainstreet.net [207.5.1.168])
	by pop.mainstreet.net (8.11.3/8.11.3) with SMTP id fAKI9FP06942;
	Tue, 20 Nov 2001 10:09:15 -0800 (PST)
Reply-To: <saqibj@margallacomm.com>
From: "Saqib Jang" <saqibj@margallacomm.com>
To: "Barry Scott" <bscott@ridgewaysystems.com>, <midcom@ietf.org>
Subject: RE: [midcom] pre-midcom solutions != VPN
Date: Tue, 20 Nov 2001 10:16:20 -0800
Message-ID: <NDBBLPEJFLKHBNKPNJJPOEGCDDAA.saqibj@margallacomm.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
In-Reply-To: <00533D13955AD411AF3800A0C9B426390EC4E8@ThisAddressDoesNotExist>
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

IPsec is a IETF standard protocol that can and is being used
to create secure communication channels between protected enterprise
networks and public networks for specific (e.g. voice, video, storage)
or all protocols, which is clearly the goal behind pre-midcom
work (i.e. how can media protocols securely traverse
private/public network boundries of existing networks). IPsec
end-points support crypto-based authentication and optional
encryption allowing for the security of the IPsec-based channels
to be beyond the capabilities of the proposed drafts.

While IPsec has been used for site-to-site and remote access
VPN deployment, its use is not limited to VPNs. For example,
IP storage folks view IPsec as a critical enabler for use of iSCSI
over metro or long-haul networks.

I'm not convinced that that there are clear-cut technical advantages
of the proposed drafts over tunnel-mode IPsec. Plus, IPR issues are
another reason why it would be preferable to look to an existing standard.

Saqib

Saqib Jang
Margalla Communications, Inc.
3301 El Camino Real, Suite 220
Atherton, CA 94027
Ph: 650 298 8462
Fax: 650 368 8198
www.margallacomm.com


-----Original Message-----
From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of
Barry Scott
Sent: Tuesday, November 20, 2001 9:27 AM
To: midcom@ietf.org
Subject: [midcom] pre-midcom solutions != VPN


We see VPNs as different from the technology that pre-midcom solutions will
require.

Pre-midcom goal: the pre-midcom solution allows users in a private network
to use voice and video IP terminals to communicate with users outside their
private network. It has to allow private to public network transition
without compromising security.

VPN goal: a VPN allows users at remote locations to use resources within a
private network as if they are locally connected. The VPN extends the
boundary of the private network to that remote location, but it remains a
private network. Tunneling happens to be the technique used to make that
extension. No crossing of the boundary from the private network to the
public network occurs. VPN technology often incorporates firewall technology
to ensure the private boundary remains protected through the extension to
the remote location.

A VPN is a good choice when you wish to allow a trusted remote user or
remote site to be added to your network from outside. Examples: a home
worker, a branch office.

There may be superficial similarities between VPN and pre-midcom technology,
but fundamentally the functionality is diametrically opposed.

	BArry

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Tue Nov 20 13:44:23 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27756
	for <midcom-archive@odin.ietf.org>; Tue, 20 Nov 2001 13:44:18 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id NAA00184
	for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 13:44:22 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA29998;
	Tue, 20 Nov 2001 13:39:09 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA29918
	for <midcom@ns.ietf.org>; Tue, 20 Nov 2001 13:39:05 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id NAA27378
	for <midcom@ietf.org>; Tue, 20 Nov 2001 13:39:01 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112018353309254
 ; Tue, 20 Nov 2001 18:35:33 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XB5TN87H>; Tue, 20 Nov 2001 18:38:09 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639172486@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'saqibj@margallacomm.com'" <saqibj@margallacomm.com>, midcom@ietf.org
Cc: Barry Scott <bscott@ridgewaysystems.com>
Subject: RE: [midcom] pre-midcom solutions != VPN
Date: Tue, 20 Nov 2001 18:38:03 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C171F2.7CAD96E0"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C171F2.7CAD96E0
Content-Type: text/plain;
	charset="ISO-8859-1"

Of course tunnels can be used between trusted parties. But a
pre-midcom/midcom solution must support open communications - the ability
for anyone to call anyone else. VPN technology or tunnel-mode IPSEC (they're
equivalent in this context) cannot be used to construct a pre-midcom/midcom
solution. Any attempt will leave gaping holes in the private/public network
boundary. Plugging the hole requires firewalls and NATs that require a
pre-midcom/midcom solution - catch-22! 

The catch goes something like this:

To use VPN technology for inter-enterprise communication, a service provider
or communications broker would be required to connect to every VPN. An
application-aware NAT function is required that can map all private IP
addresses to unique IP addresses in a shared address space, otherwise
inter-enterprise calls will fail. This requires a signalling proxy to NAT
the signalling, and an RTP Proxy to NAT the media.  For security reasons,
the service provider or enterprise must also provide a firewall on every VPN
to prevent malicious attacks and unauthorized access from other enterprises
or from the public network. These firewalls will have the same problems as
enterprise firewalls that wish to allow through voice over IP protocols,
without allowing through other undesired protocols.

Which brings us back to the firewall/NAT problem and the need for
pre-midcom/midcom solution! 

Steve

-----Original Message-----
From: Saqib Jang [mailto:saqibj@margallacomm.com]
Sent: 20 November 2001 18:16
To: Barry Scott; midcom@ietf.org
Subject: RE: [midcom] pre-midcom solutions != VPN


IPsec is a IETF standard protocol that can and is being used
to create secure communication channels between protected enterprise
networks and public networks for specific (e.g. voice, video, storage)
or all protocols, which is clearly the goal behind pre-midcom
work (i.e. how can media protocols securely traverse
private/public network boundries of existing networks). IPsec
end-points support crypto-based authentication and optional
encryption allowing for the security of the IPsec-based channels
to be beyond the capabilities of the proposed drafts.

While IPsec has been used for site-to-site and remote access
VPN deployment, its use is not limited to VPNs. For example,
IP storage folks view IPsec as a critical enabler for use of iSCSI
over metro or long-haul networks.

I'm not convinced that that there are clear-cut technical advantages
of the proposed drafts over tunnel-mode IPsec. Plus, IPR issues are
another reason why it would be preferable to look to an existing standard.

Saqib

Saqib Jang
Margalla Communications, Inc.
3301 El Camino Real, Suite 220
Atherton, CA 94027
Ph: 650 298 8462
Fax: 650 368 8198
www.margallacomm.com


-----Original Message-----
From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of
Barry Scott
Sent: Tuesday, November 20, 2001 9:27 AM
To: midcom@ietf.org
Subject: [midcom] pre-midcom solutions != VPN


We see VPNs as different from the technology that pre-midcom solutions will
require.

Pre-midcom goal: the pre-midcom solution allows users in a private network
to use voice and video IP terminals to communicate with users outside their
private network. It has to allow private to public network transition
without compromising security.

VPN goal: a VPN allows users at remote locations to use resources within a
private network as if they are locally connected. The VPN extends the
boundary of the private network to that remote location, but it remains a
private network. Tunneling happens to be the technique used to make that
extension. No crossing of the boundary from the private network to the
public network occurs. VPN technology often incorporates firewall technology
to ensure the private boundary remains protected through the extension to
the remote location.

A VPN is a good choice when you wish to allow a trusted remote user or
remote site to be added to your network from outside. Examples: a home
worker, a branch office.

There may be superficial similarities between VPN and pre-midcom technology,
but fundamentally the functionality is diametrically opposed.

	BArry

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C171F2.7CAD96E0
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] pre-midcom solutions !=3D VPN</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Of course tunnels can be used between trusted =
parties. But a pre-midcom/midcom solution must support open =
communications - the ability for anyone to call anyone else. VPN =
technology or tunnel-mode IPSEC (they're equivalent in this context) =
cannot be used to construct a pre-midcom/midcom solution. Any attempt =
will leave gaping holes in the private/public network boundary. =
Plugging the hole requires firewalls and NATs that require a =
pre-midcom/midcom solution - catch-22! </FONT></P>

<P><FONT SIZE=3D2>The catch goes something like this:</FONT>
</P>

<P><FONT SIZE=3D2>To use VPN technology for inter-enterprise =
communication, a service provider or communications broker would be =
required to connect to every VPN. An application-aware NAT function is =
required that can map all private IP addresses to unique IP addresses =
in a shared address space, otherwise inter-enterprise calls will fail. =
This requires a signalling proxy to NAT the signalling, and an RTP =
Proxy to NAT the media.&nbsp; For security reasons, the service =
provider or enterprise must also provide a firewall on every VPN to =
prevent malicious attacks and unauthorized access from other =
enterprises or from the public network. These firewalls will have the =
same problems as enterprise firewalls that wish to allow through voice =
over IP protocols, without allowing through other undesired =
protocols.</FONT></P>

<P><FONT SIZE=3D2>Which brings us back to the firewall/NAT problem and =
the need for pre-midcom/midcom solution! </FONT>
</P>

<P><FONT SIZE=3D2>Steve</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Saqib Jang [<A =
HREF=3D"mailto:saqibj@margallacomm.com">mailto:saqibj@margallacomm.com</=
A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 20 November 2001 18:16</FONT>
<BR><FONT SIZE=3D2>To: Barry Scott; midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [midcom] pre-midcom solutions !=3D =
VPN</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>IPsec is a IETF standard protocol that can and is =
being used</FONT>
<BR><FONT SIZE=3D2>to create secure communication channels between =
protected enterprise</FONT>
<BR><FONT SIZE=3D2>networks and public networks for specific (e.g. =
voice, video, storage)</FONT>
<BR><FONT SIZE=3D2>or all protocols, which is clearly the goal behind =
pre-midcom</FONT>
<BR><FONT SIZE=3D2>work (i.e. how can media protocols securely =
traverse</FONT>
<BR><FONT SIZE=3D2>private/public network boundries of existing =
networks). IPsec</FONT>
<BR><FONT SIZE=3D2>end-points support crypto-based authentication and =
optional</FONT>
<BR><FONT SIZE=3D2>encryption allowing for the security of the =
IPsec-based channels</FONT>
<BR><FONT SIZE=3D2>to be beyond the capabilities of the proposed =
drafts.</FONT>
</P>

<P><FONT SIZE=3D2>While IPsec has been used for site-to-site and remote =
access</FONT>
<BR><FONT SIZE=3D2>VPN deployment, its use is not limited to VPNs. For =
example,</FONT>
<BR><FONT SIZE=3D2>IP storage folks view IPsec as a critical enabler =
for use of iSCSI</FONT>
<BR><FONT SIZE=3D2>over metro or long-haul networks.</FONT>
</P>

<P><FONT SIZE=3D2>I'm not convinced that that there are clear-cut =
technical advantages</FONT>
<BR><FONT SIZE=3D2>of the proposed drafts over tunnel-mode IPsec. Plus, =
IPR issues are</FONT>
<BR><FONT SIZE=3D2>another reason why it would be preferable to look to =
an existing standard.</FONT>
</P>

<P><FONT SIZE=3D2>Saqib</FONT>
</P>

<P><FONT SIZE=3D2>Saqib Jang</FONT>
<BR><FONT SIZE=3D2>Margalla Communications, Inc.</FONT>
<BR><FONT SIZE=3D2>3301 El Camino Real, Suite 220</FONT>
<BR><FONT SIZE=3D2>Atherton, CA 94027</FONT>
<BR><FONT SIZE=3D2>Ph: 650 298 8462</FONT>
<BR><FONT SIZE=3D2>Fax: 650 368 8198</FONT>
<BR><FONT SIZE=3D2>www.margallacomm.com</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: midcom-admin@ietf.org [<A =
HREF=3D"mailto:midcom-admin@ietf.org">mailto:midcom-admin@ietf.org</A>]O=
n Behalf Of</FONT>
<BR><FONT SIZE=3D2>Barry Scott</FONT>
<BR><FONT SIZE=3D2>Sent: Tuesday, November 20, 2001 9:27 AM</FONT>
<BR><FONT SIZE=3D2>To: midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>Subject: [midcom] pre-midcom solutions !=3D =
VPN</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>We see VPNs as different from the technology that =
pre-midcom solutions will</FONT>
<BR><FONT SIZE=3D2>require.</FONT>
</P>

<P><FONT SIZE=3D2>Pre-midcom goal: the pre-midcom solution allows users =
in a private network</FONT>
<BR><FONT SIZE=3D2>to use voice and video IP terminals to communicate =
with users outside their</FONT>
<BR><FONT SIZE=3D2>private network. It has to allow private to public =
network transition</FONT>
<BR><FONT SIZE=3D2>without compromising security.</FONT>
</P>

<P><FONT SIZE=3D2>VPN goal: a VPN allows users at remote locations to =
use resources within a</FONT>
<BR><FONT SIZE=3D2>private network as if they are locally connected. =
The VPN extends the</FONT>
<BR><FONT SIZE=3D2>boundary of the private network to that remote =
location, but it remains a</FONT>
<BR><FONT SIZE=3D2>private network. Tunneling happens to be the =
technique used to make that</FONT>
<BR><FONT SIZE=3D2>extension. No crossing of the boundary from the =
private network to the</FONT>
<BR><FONT SIZE=3D2>public network occurs. VPN technology often =
incorporates firewall technology</FONT>
<BR><FONT SIZE=3D2>to ensure the private boundary remains protected =
through the extension to</FONT>
<BR><FONT SIZE=3D2>the remote location.</FONT>
</P>

<P><FONT SIZE=3D2>A VPN is a good choice when you wish to allow a =
trusted remote user or</FONT>
<BR><FONT SIZE=3D2>remote site to be added to your network from =
outside. Examples: a home</FONT>
<BR><FONT SIZE=3D2>worker, a branch office.</FONT>
</P>

<P><FONT SIZE=3D2>There may be superficial similarities between VPN and =
pre-midcom technology,</FONT>
<BR><FONT SIZE=3D2>but fundamentally the functionality is diametrically =
opposed.</FONT>
</P>

<P>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT =
SIZE=3D2>BArry</FONT>
</P>

<P><FONT =
SIZE=3D2>_______________________________________________</FONT>
<BR><FONT SIZE=3D2>midcom mailing list</FONT>
<BR><FONT SIZE=3D2>midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://www1.ietf.org/mailman/listinfo/midcom" =
TARGET=3D"_blank">http://www1.ietf.org/mailman/listinfo/midcom</A></FONT=
>
</P>
<BR>

<P><FONT =
SIZE=3D2>_______________________________________________</FONT>
<BR><FONT SIZE=3D2>midcom mailing list</FONT>
<BR><FONT SIZE=3D2>midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://www1.ietf.org/mailman/listinfo/midcom" =
TARGET=3D"_blank">http://www1.ietf.org/mailman/listinfo/midcom</A></FONT=
>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C171F2.7CAD96E0--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Tue Nov 20 14:53:36 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA01916
	for <midcom-archive@odin.ietf.org>; Tue, 20 Nov 2001 14:53:35 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id OAA02849
	for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 14:53:39 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA02760;
	Tue, 20 Nov 2001 14:46:08 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA02733
	for <midcom@ns.ietf.org>; Tue, 20 Nov 2001 14:46:06 -0500 (EST)
Received: from pop.mainstreet.net (smtp.mainstreet.net [207.5.0.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA01619
	for <midcom@ietf.org>; Tue, 20 Nov 2001 14:46:01 -0500 (EST)
Received: from vip (saqibj.mainstreet.net [207.5.1.168])
	by pop.mainstreet.net (8.11.3/8.11.3) with SMTP id fAKJjwP13680;
	Tue, 20 Nov 2001 11:45:59 -0800 (PST)
Reply-To: <saqibj@margallacomm.com>
From: "Saqib Jang" <saqibj@margallacomm.com>
To: "Steve Davies" <sdavies@ridgewaysystems.com>, <midcom@ietf.org>
Cc: "Barry Scott" <bscott@ridgewaysystems.com>
Subject: RE: [midcom] pre-midcom solutions != VPN
Date: Tue, 20 Nov 2001 11:53:10 -0800
Message-ID: <NDBBLPEJFLKHBNKPNJJPEEGHDDAA.saqibj@margallacomm.com>
MIME-Version: 1.0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_001E_01C171B9.ECF433C0"
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
In-Reply-To: <00533D13955AD411AF3800A0C9B42639172486@ThisAddressDoesNotExist>
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This is a multi-part message in MIME format.

------=_NextPart_000_001E_01C171B9.ECF433C0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

RE: [midcom] pre-midcom solutions != VPNThe focus of the thread is on
pre-midcom work (i.e. secure
media traversal of *existing* firewalls/NATs that may or may not
have media intelligence) not on the midcom framework, so I think
it would be helpful to not lump both aspects together.

1. Implementing IPsec across firewalls should not/does not leave 'gaping
holes' within firewalls. From my standpoint, implement a tunnelling
protocol  that is a widespread standard and one that has strong
security capabilities makes for much more simplified enterprise security
policy management.

2. I don't see a problem with providers having the choice of deploying
application-aware firewall and NAT services within the 'cloud'. Is
it a pre-midcom goal to prevent SPs from from doing this? As I
understood it, the goal of the pre-midcom work was to remove the
compatibility issues that installed *enterprise* firewalls have with media
protocols.

Saqib

  -----Original Message-----
  From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of
Steve Davies
  Sent: Tuesday, November 20, 2001 10:38 AM
  To: 'saqibj@margallacomm.com'; midcom@ietf.org
  Cc: Barry Scott
  Subject: RE: [midcom] pre-midcom solutions != VPN


  Of course tunnels can be used between trusted parties. But a
pre-midcom/midcom solution must support open communications - the ability
for anyone to call anyone else. VPN technology or tunnel-mode IPSEC (they're
equivalent in this context) cannot be used to construct a pre-midcom/midcom
solution. Any attempt will leave gaping holes in the private/public network
boundary. Plugging the hole requires firewalls and NATs that require a
pre-midcom/midcom solution - catch-22!

  The catch goes something like this:

  To use VPN technology for inter-enterprise communication, a service
provider or communications broker would be required to connect to every VPN.
An application-aware NAT function is required that can map all private IP
addresses to unique IP addresses in a shared address space, otherwise
inter-enterprise calls will fail. This requires a signalling proxy to NAT
the signalling, and an RTP Proxy to NAT the media.  For security reasons,
the service provider or enterprise must also provide a firewall on every VPN
to prevent malicious attacks and unauthorized access from other enterprises
or from the public network. These firewalls will have the same problems as
enterprise firewalls that wish to allow through voice over IP protocols,
without allowing through other undesired protocols.

  Which brings us back to the firewall/NAT problem and the need for
pre-midcom/midcom solution!

  Steve

  -----Original Message-----
  From: Saqib Jang [mailto:saqibj@margallacomm.com]
  Sent: 20 November 2001 18:16
  To: Barry Scott; midcom@ietf.org
  Subject: RE: [midcom] pre-midcom solutions != VPN



  IPsec is a IETF standard protocol that can and is being used
  to create secure communication channels between protected enterprise
  networks and public networks for specific (e.g. voice, video, storage)
  or all protocols, which is clearly the goal behind pre-midcom
  work (i.e. how can media protocols securely traverse
  private/public network boundries of existing networks). IPsec
  end-points support crypto-based authentication and optional
  encryption allowing for the security of the IPsec-based channels
  to be beyond the capabilities of the proposed drafts.

  While IPsec has been used for site-to-site and remote access
  VPN deployment, its use is not limited to VPNs. For example,
  IP storage folks view IPsec as a critical enabler for use of iSCSI
  over metro or long-haul networks.

  I'm not convinced that that there are clear-cut technical advantages
  of the proposed drafts over tunnel-mode IPsec. Plus, IPR issues are
  another reason why it would be preferable to look to an existing standard.

  Saqib

  Saqib Jang
  Margalla Communications, Inc.
  3301 El Camino Real, Suite 220
  Atherton, CA 94027
  Ph: 650 298 8462
  Fax: 650 368 8198
  www.margallacomm.com



  -----Original Message-----
  From: midcom-admin@ietf.org [mailto:midcom-admin@ietf.org]On Behalf Of
  Barry Scott
  Sent: Tuesday, November 20, 2001 9:27 AM
  To: midcom@ietf.org
  Subject: [midcom] pre-midcom solutions != VPN



  We see VPNs as different from the technology that pre-midcom solutions
will
  require.

  Pre-midcom goal: the pre-midcom solution allows users in a private network
  to use voice and video IP terminals to communicate with users outside
their
  private network. It has to allow private to public network transition
  without compromising security.

  VPN goal: a VPN allows users at remote locations to use resources within a
  private network as if they are locally connected. The VPN extends the
  boundary of the private network to that remote location, but it remains a
  private network. Tunneling happens to be the technique used to make that
  extension. No crossing of the boundary from the private network to the
  public network occurs. VPN technology often incorporates firewall
technology
  to ensure the private boundary remains protected through the extension to
  the remote location.

  A VPN is a good choice when you wish to allow a trusted remote user or
  remote site to be added to your network from outside. Examples: a home
  worker, a branch office.

  There may be superficial similarities between VPN and pre-midcom
technology,
  but fundamentally the functionality is diametrically opposed.

          BArry

  _______________________________________________
  midcom mailing list
  midcom@ietf.org
  http://www1.ietf.org/mailman/listinfo/midcom



  _______________________________________________
  midcom mailing list
  midcom@ietf.org
  http://www1.ietf.org/mailman/listinfo/midcom


------=_NextPart_000_001E_01C171B9.ECF433C0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE>RE: [midcom] pre-midcom solutions !=3D VPN</TITLE>
<META content=3D"text/html; charset=3DISO-8859-1" =
http-equiv=3DContent-Type>
<META content=3D"MSHTML 5.00.2314.1000" name=3DGENERATOR></HEAD>
<BODY>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN =
class=3D160233519-20112001>The=20
focus of the thread is on pre-midcom work (i.e. secure =
</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN =
class=3D160233519-20112001>media=20
traversal of *existing* firewalls/NATs that may or may =
</SPAN></FONT><FONT=20
color=3D#0000ff face=3DArial size=3D2><SPAN=20
class=3D160233519-20112001>not</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN =
class=3D160233519-20112001>have=20
media intelligence) not on the </SPAN></FONT><FONT color=3D#0000ff =
face=3DArial=20
size=3D2><SPAN class=3D160233519-20112001>midcom framework, so I think=20
</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN =
class=3D160233519-20112001>it=20
would be helpful to no</SPAN></FONT><FONT color=3D#0000ff face=3DArial =
size=3D2><SPAN=20
class=3D160233519-20112001>t lump both aspects =
together.</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN=20
class=3D160233519-20112001></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN =
class=3D160233519-20112001>1.=20
Implementing IPsec across firewalls should not/does not leave=20
'gaping</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN =
class=3D160233519-20112001>holes'=20
within firewalls. From my standpoint, implement a =
tunnelling</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN=20
class=3D160233519-20112001>protocol&nbsp; that is a widespread standard =
and one=20
that has strong</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN=20
class=3D160233519-20112001>security capabilities makes for much more =
simplified=20
enterprise security </SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN =
class=3D160233519-20112001>policy=20
management.</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN=20
class=3D160233519-20112001></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN =
class=3D160233519-20112001>2. I=20
don't see a problem with providers having&nbsp;the choice of=20
deploying</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN=20
class=3D160233519-20112001>application-aware firewall and NAT services =
within the=20
'cloud'. Is</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN =
class=3D160233519-20112001>it a=20
pre-midcom goal to prevent SPs from from doing this? As =
I</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN=20
class=3D160233519-20112001>understood it, the goal of the pre-midcom =
work was to=20
remove the</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN=20
class=3D160233519-20112001>compatibility issues that installed =
*enterprise*=20
firewalls have with media </SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN=20
class=3D160233519-20112001>protocols.</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN=20
class=3D160233519-20112001></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN=20
class=3D160233519-20112001>Saqib</SPAN></FONT></DIV>
<DIV><FONT color=3D#0000ff face=3DArial size=3D2><SPAN=20
class=3D160233519-20112001></SPAN></FONT>&nbsp;</DIV>
<BLOCKQUOTE style=3D"MARGIN-RIGHT: 0px">
  <DIV align=3Dleft class=3DOutlookMessageHeader dir=3Dltr><FONT =
face=3DTahoma=20
  size=3D2>-----Original Message-----<BR><B>From:</B> =
midcom-admin@ietf.org=20
  [mailto:midcom-admin@ietf.org]<B>On Behalf Of </B>Steve =
Davies<BR><B>Sent:</B>=20
  Tuesday, November 20, 2001 10:38 AM<BR><B>To:</B> =
'saqibj@margallacomm.com';=20
  midcom@ietf.org<BR><B>Cc:</B> Barry Scott<BR><B>Subject:</B> RE: =
[midcom]=20
  pre-midcom solutions !=3D VPN<BR><BR></DIV></FONT>
  <P><FONT size=3D2>Of course tunnels can be used between trusted =
parties. But a=20
  pre-midcom/midcom solution must support open communications - the =
ability for=20
  anyone to call anyone else. VPN technology or tunnel-mode IPSEC =
(they're=20
  equivalent in this context) cannot be used to construct a =
pre-midcom/midcom=20
  solution. Any attempt will leave gaping holes in the private/public =
network=20
  boundary. Plugging the hole requires firewalls and NATs that require a =

  pre-midcom/midcom solution - catch-22! </FONT></P>
  <P><FONT size=3D2>The catch goes something like this:</FONT> </P>
  <P><FONT size=3D2>To use VPN technology for inter-enterprise =
communication, a=20
  service provider or communications broker would be required to connect =
to=20
  every VPN. An application-aware NAT function is required that can map =
all=20
  private IP addresses to unique IP addresses in a shared address space, =

  otherwise inter-enterprise calls will fail. This requires a signalling =
proxy=20
  to NAT the signalling, and an RTP Proxy to NAT the media.&nbsp; For =
security=20
  reasons, the service provider or enterprise must also provide a =
firewall on=20
  every VPN to prevent malicious attacks and unauthorized access from =
other=20
  enterprises or from the public network. These firewalls will have the =
same=20
  problems as enterprise firewalls that wish to allow through voice over =
IP=20
  protocols, without allowing through other undesired =
protocols.</FONT></P>
  <P><FONT size=3D2>Which brings us back to the firewall/NAT problem and =
the need=20
  for pre-midcom/midcom solution! </FONT></P>
  <P><FONT size=3D2>Steve</FONT> </P>
  <P><FONT size=3D2>-----Original Message-----</FONT> <BR><FONT =
size=3D2>From: Saqib=20
  Jang [<A=20
  =
href=3D"mailto:saqibj@margallacomm.com">mailto:saqibj@margallacomm.com</A=
>]</FONT>=20
  <BR><FONT size=3D2>Sent: 20 November 2001 18:16</FONT> <BR><FONT =
size=3D2>To:=20
  Barry Scott; midcom@ietf.org</FONT> <BR><FONT size=3D2>Subject: RE: =
[midcom]=20
  pre-midcom solutions !=3D VPN</FONT> </P><BR>
  <P><FONT size=3D2>IPsec is a IETF standard protocol that can and is =
being=20
  used</FONT> <BR><FONT size=3D2>to create secure communication channels =
between=20
  protected enterprise</FONT> <BR><FONT size=3D2>networks and public =
networks for=20
  specific (e.g. voice, video, storage)</FONT> <BR><FONT size=3D2>or all =

  protocols, which is clearly the goal behind pre-midcom</FONT> =
<BR><FONT=20
  size=3D2>work (i.e. how can media protocols securely traverse</FONT> =
<BR><FONT=20
  size=3D2>private/public network boundries of existing networks). =
IPsec</FONT>=20
  <BR><FONT size=3D2>end-points support crypto-based authentication and=20
  optional</FONT> <BR><FONT size=3D2>encryption allowing for the =
security of the=20
  IPsec-based channels</FONT> <BR><FONT size=3D2>to be beyond the =
capabilities of=20
  the proposed drafts.</FONT> </P>
  <P><FONT size=3D2>While IPsec has been used for site-to-site and =
remote=20
  access</FONT> <BR><FONT size=3D2>VPN deployment, its use is not =
limited to VPNs.=20
  For example,</FONT> <BR><FONT size=3D2>IP storage folks view IPsec as =
a critical=20
  enabler for use of iSCSI</FONT> <BR><FONT size=3D2>over metro or =
long-haul=20
  networks.</FONT> </P>
  <P><FONT size=3D2>I'm not convinced that that there are clear-cut =
technical=20
  advantages</FONT> <BR><FONT size=3D2>of the proposed drafts over =
tunnel-mode=20
  IPsec. Plus, IPR issues are</FONT> <BR><FONT size=3D2>another reason =
why it=20
  would be preferable to look to an existing standard.</FONT> </P>
  <P><FONT size=3D2>Saqib</FONT> </P>
  <P><FONT size=3D2>Saqib Jang</FONT> <BR><FONT size=3D2>Margalla =
Communications,=20
  Inc.</FONT> <BR><FONT size=3D2>3301 El Camino Real, Suite 220</FONT> =
<BR><FONT=20
  size=3D2>Atherton, CA 94027</FONT> <BR><FONT size=3D2>Ph: 650 298 =
8462</FONT>=20
  <BR><FONT size=3D2>Fax: 650 368 8198</FONT> <BR><FONT=20
  size=3D2>www.margallacomm.com</FONT> </P><BR>
  <P><FONT size=3D2>-----Original Message-----</FONT> <BR><FONT =
size=3D2>From:=20
  midcom-admin@ietf.org [<A=20
  =
href=3D"mailto:midcom-admin@ietf.org">mailto:midcom-admin@ietf.org</A>]On=
 Behalf=20
  Of</FONT> <BR><FONT size=3D2>Barry Scott</FONT> <BR><FONT =
size=3D2>Sent: Tuesday,=20
  November 20, 2001 9:27 AM</FONT> <BR><FONT size=3D2>To: =
midcom@ietf.org</FONT>=20
  <BR><FONT size=3D2>Subject: [midcom] pre-midcom solutions !=3D =
VPN</FONT> </P><BR>
  <P><FONT size=3D2>We see VPNs as different from the technology that =
pre-midcom=20
  solutions will</FONT> <BR><FONT size=3D2>require.</FONT> </P>
  <P><FONT size=3D2>Pre-midcom goal: the pre-midcom solution allows =
users in a=20
  private network</FONT> <BR><FONT size=3D2>to use voice and video IP =
terminals to=20
  communicate with users outside their</FONT> <BR><FONT size=3D2>private =
network.=20
  It has to allow private to public network transition</FONT> <BR><FONT=20
  size=3D2>without compromising security.</FONT> </P>
  <P><FONT size=3D2>VPN goal: a VPN allows users at remote locations to =
use=20
  resources within a</FONT> <BR><FONT size=3D2>private network as if =
they are=20
  locally connected. The VPN extends the</FONT> <BR><FONT =
size=3D2>boundary of the=20
  private network to that remote location, but it remains a</FONT> =
<BR><FONT=20
  size=3D2>private network. Tunneling happens to be the technique used =
to make=20
  that</FONT> <BR><FONT size=3D2>extension. No crossing of the boundary =
from the=20
  private network to the</FONT> <BR><FONT size=3D2>public network =
occurs. VPN=20
  technology often incorporates firewall technology</FONT> <BR><FONT =
size=3D2>to=20
  ensure the private boundary remains protected through the extension =
to</FONT>=20
  <BR><FONT size=3D2>the remote location.</FONT> </P>
  <P><FONT size=3D2>A VPN is a good choice when you wish to allow a =
trusted remote=20
  user or</FONT> <BR><FONT size=3D2>remote site to be added to your =
network from=20
  outside. Examples: a home</FONT> <BR><FONT size=3D2>worker, a branch=20
  office.</FONT> </P>
  <P><FONT size=3D2>There may be superficial similarities between VPN =
and=20
  pre-midcom technology,</FONT> <BR><FONT size=3D2>but fundamentally the =

  functionality is diametrically opposed.</FONT> </P>
  <P>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <FONT =
size=3D2>BArry</FONT> </P>
  <P><FONT =
size=3D2>_______________________________________________</FONT>=20
  <BR><FONT size=3D2>midcom mailing list</FONT> <BR><FONT=20
  size=3D2>midcom@ietf.org</FONT> <BR><FONT size=3D2><A=20
  href=3D"http://www1.ietf.org/mailman/listinfo/midcom"=20
  =
target=3D_blank>http://www1.ietf.org/mailman/listinfo/midcom</A></FONT> =
</P><BR>
  <P><FONT =
size=3D2>_______________________________________________</FONT>=20
  <BR><FONT size=3D2>midcom mailing list</FONT> <BR><FONT=20
  size=3D2>midcom@ietf.org</FONT> <BR><FONT size=3D2><A=20
  href=3D"http://www1.ietf.org/mailman/listinfo/midcom"=20
  =
target=3D_blank>http://www1.ietf.org/mailman/listinfo/midcom</A></FONT>=20
</P></BLOCKQUOTE></BODY></HTML>

------=_NextPart_000_001E_01C171B9.ECF433C0--


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Tue Nov 20 15:52:00 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05041
	for <midcom-archive@odin.ietf.org>; Tue, 20 Nov 2001 15:52:00 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA04543
	for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 15:52:04 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA04239;
	Tue, 20 Nov 2001 15:39:00 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA04202
	for <midcom@ns.ietf.org>; Tue, 20 Nov 2001 15:38:59 -0500 (EST)
Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA04115
	for <midcom@ietf.org>; Tue, 20 Nov 2001 15:38:54 -0500 (EST)
Received: from BobP [63.67.143.2] by acmepacket.com
  (SMTPD32-7.04) id AF5F198101FE; Tue, 20 Nov 2001 15:38:55 -0500
Message-ID: <00f801c17202$de1f9f80$2300000a@acmepacket.com>
From: "Bob Penfield" <bpenfield@acmepacket.com>
To: "Steve Davies" <sdavies@ridgewaysystems.com>,
        "'John LaCour'" <jlacour@netscreen.com>, <midcom@ietf.org>
Cc: "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>
References: <00533D13955AD411AF3800A0C9B42639172481@ThisAddressDoesNotExist>
Subject: Re: [midcom] new I-D on "symmetric STUN"
Date: Tue, 20 Nov 2001 15:35:18 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit


----- Original Message -----
From: "Steve Davies" <sdavies@ridgewaysystems.com>
<snip>
> One of the main reasons FANTOM has out-of-band signalling was to conform
to
> the spirit of RTP/RTCP by assigning consecutive port pairs to represent
the
> receive RTP/RTCP addresses at the intermediary. A single method 'Create
> Media Flow' does that. Having grabbed a port pair, 2 UDP outbound
> connections are needed to the intermediary to receive the respective RTP
and
> RTCP flows. Hence the Probes.
>
> TURN cannot conform to the spirit of RTP in this way because the ALLOCATE
> method only reserves a single transport address on the intermediary. If it
> requested 2 transport addresses, a probe or very similar mechanism would
be
> required to establish the second outbound UDP connection. Even worse, the
> way TURN is specified, there is a good chance that as a TURN server runs
out
> of resource the associated RTP and RTCP transport addresses could have
> different IP addresses. NOT ALLOWED.

The ALLOCATE method could be modified to include a "number of ports"
attribute to request an allocation of 2 consecutive ports.

>
> There are many other advantages to using a separate Probe message. One
very
> good use of probes is to keep NAT bindings assigned, i.e. they are sent at
> regular intervals to prevent the NAT from timing out. TURN has no probe or
> NAT keep-alive methods which breaks the solution on at least 2 counts.

The STUN document does mention that "the application can periodically
retransmit the query in order to keep the binding fresh". The client will
need to send STUN "Request" type messages to the TURN server to keep the
binding alive. The STUN "Request" could be sent to the 2nd allocated port to
establish the binding.

> In
> one case, a terminal may make an ALLOCATE to obtain an address with which
to
> register with a public SIP proxy. It then sits there waiting to receive
> incoming calls. However, without some traffic such as a probe or a NAT
keep
> alive, the NAT assignment created by the ALLOCATE times out, which means
the
> terminal won't receive incoming call notifications.

Not a real good example, since a terminal will send REGISTER requests to the
SIP proxy on a regular basis (This will keep the NAT binding alive if the
registration interval is short enough). But you are correct that "keep
alives" will be required.

> A second case when the
> NAT binding may time out is when the remote party is not talking and their
> terminal implements silence suppression.
>
> FANTOM uses probes to ensure this doesn't happen. In FANTOM probes are
> designed to be easily recognisable in order to help the implementation of
an
> efficient forwarding intermediary.

Again, STUN explicitly mentions these keep alives and they could be used
once the TURN allocation is done.

>
> * TURN doesn't use a tunnel. FANTOM does. Some think that this implies
> FANTOM is a VPN variant. FANTOM is most definitely not, but we'll deal
with
> that separately. FANTOM uses a tunnel for multiplexing out-of-band call
> control and the out-of-band FANTOM client-server protocol into a single
> connection. The connection is TCP because we valued reliability and the
> life-time is more easily managed by the NAT. It could be UDP but we didn't
> feel we needed to re-invent a UDP session with TCP characteristics.
>
> We envisaged that the client end of FANTOM would be implemented in
severals
> ways. For example, it could be implemented in a standalone system, serving
> many terminals in a single enterprise. In Centrex applications there would
> be no local proxy. In this case the FANTOM client would have to handle
> multiple simultaneous call setups and cleardowns. We judged a single
> persistant tunnel for all call control from the FANTOM client to FANTOM
> server was the most efficient use of resources.

Isn't this really the same as putting a proxy in the exterprise and having
it connect to the proxy in the public network over TCP? Why is FANTOM better
than adding a proxy? If FANTOM is present in the terminal, you have a tunnel
for every terminal. If you have a FANTOM client, then all the terminals need
to send signalling to the FANTOM client. Doesn't that make it a proxy?

>
> To avoid tunnels, a similar TURN implementation would require the
standalone
> client to create many UDP connections to the intermediary - one for each
> terminal wanting to receive incoming calls. As we remarked above, these
UDP
> connections need to keep NAT bindings through some sort of NAT-keep-alive
> messages. The SEN proposal implemented a similar technique and found it to
> be too resource intensive - hence their SIP proposal extensions.

For residential and small enterprises, there won't be too many UDP
connections. Alternatively, they can use TCP connections. For larger
enterprises or networks, for the same cost as a FANTOM client, a proxy could
be installed which accepts the UDP connections and connects to the public
proxy with TCP (or even a single UDP connection).

>
> Having a tunnel in FANTOM has further advantages, not least in allowing
> out-of-band signalling and control. The benefit here is that the protocol
> can be extended to include other functions such as network management
> without breaking the architecture. We want FANTOM to be extensible.

I don't think there is a need for a tunnel. With STUN/TURN, setup of the
media binding occurs inband so there is no need for extra "signalling" to do
that. The applications can use TCP or STUN to make signalling connections.
With that, there is no need for a tunnel.

>
> This email is getting quite long so I'll conclude by remarking that I hope
> that these explanations indicate that while  FANTOM appears more complex
> than TURN, there is a reason behind each method FANTOM implements. We
> haven't made it complex for complexity's sake. FANTOM may be unfamiliar,
but
> that's no reason to start from scratch which I fear TURN is.

I don't think that TURN is starting from scratch. The basic concepts have
been presented in a couple of IDs for several months now.

STUN and TURN give us relatively simple tools that can be combined in
various ways to solve a number of different problems. Because they are so
simple, they will be easy to implement and add into existing products.






_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Tue Nov 20 15:53:35 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05178
	for <midcom-archive@odin.ietf.org>; Tue, 20 Nov 2001 15:53:35 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA04616
	for midcom-archive@odin.ietf.org; Tue, 20 Nov 2001 15:53:39 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA04583;
	Tue, 20 Nov 2001 15:52:16 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA04556
	for <midcom@ns.ietf.org>; Tue, 20 Nov 2001 15:52:15 -0500 (EST)
Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA05057
	for <midcom@ietf.org>; Tue, 20 Nov 2001 15:52:09 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fAKKlvE26389;
	Tue, 20 Nov 2001 12:47:57 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ABZ66771;
	Tue, 20 Nov 2001 12:47:29 -0800 (PST)
Message-Id: <5.1.0.14.0.20011120154728.00a661a0@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Tue, 20 Nov 2001 15:50:12 -0500
To: "Bob Penfield" <bpenfield@acmepacket.com>,
        "Steve Davies" <sdavies@ridgewaysystems.com>,
        "'John LaCour'" <jlacour@netscreen.com>, <midcom@ietf.org>
From: Melinda Shore <mshore@cisco.com>
Subject: Re: [midcom] new I-D on "symmetric STUN"
Cc: "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>
In-Reply-To: <00f801c17202$de1f9f80$2300000a@acmepacket.com>
References: <00533D13955AD411AF3800A0C9B42639172481@ThisAddressDoesNotExist>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

I think that this is a good discussion.  One thing that might
help us make progress towards getting this done quickly would 
be to start identifying points on which there is agreement and
making them explicit/on the record/etc.  

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Wed Nov 21 00:04:41 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA18564
	for <midcom-archive@odin.ietf.org>; Wed, 21 Nov 2001 00:04:40 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id AAA15978
	for midcom-archive@odin.ietf.org; Wed, 21 Nov 2001 00:04:40 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA15956;
	Wed, 21 Nov 2001 00:03:15 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id AAA15927
	for <midcom@optimus.ietf.org>; Wed, 21 Nov 2001 00:03:14 -0500 (EST)
Received: from mgo.iij.ad.jp (root@mgo.iij.ad.jp [202.232.15.6])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id AAA18556
	for <midcom@ietf.org>; Wed, 21 Nov 2001 00:03:13 -0500 (EST)
Received: from ns.iij.ad.jp (ns.iij.ad.jp [192.168.2.8])
	by mgo.iij.ad.jp (8.8.8/MGO1.0) with ESMTP id OAA09900;
	Wed, 21 Nov 2001 14:02:11 +0900 (JST)
Received: from zeus (h188n005.iij.ad.jp [192.168.5.188]) by ns.iij.ad.jp (8.8.5/3.5Wpl7) with ESMTP id OAA01893; Wed, 21 Nov 2001 14:02:11 +0900 (JST)
To: bscott@ridgewaysystems.com, midcom@ietf.org
Subject: Re: [midcom] pre-midcom solutions != VPN
From: Kuniaki Kondo <kuniaki@iij.ad.jp>
References: <00533D13955AD411AF3800A0C9B426390EC4E8@ThisAddressDoesNotExist>
In-Reply-To: <00533D13955AD411AF3800A0C9B426390EC4E8@ThisAddressDoesNotExist>
Message-Id: <200111211402.GBI04005.VJLOJBL@iij.ad.jp>
X-Mailer: Winbiff [Version 2.34beta3]
X-Accept-Language: ja,en
Date: Wed, 21 Nov 2001 14:02:11 +0900
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Hi,

"Barry Scott <bscott@ridgewaysystems.com>" (Tue, 20 Nov 2001 17:27:25 -0000) wrote:

> We see VPNs as different from the technology that pre-midcom solutions will
> require. 
> 
> Pre-midcom goal: the pre-midcom solution allows users in a private network
> to use voice and video IP terminals to communicate with users outside their
> private network. It has to allow private to public network transition
> without compromising security.
> 
> VPN goal: a VPN allows users at remote locations to use resources within a
> private network as if they are locally connected. The VPN extends the
> boundary of the private network to that remote location, but it remains a
> private network. Tunneling happens to be the technique used to make that
> extension. No crossing of the boundary from the private network to the
> public network occurs. VPN technology often incorporates firewall technology
> to ensure the private boundary remains protected through the extension to
> the remote location. 
> 
> A VPN is a good choice when you wish to allow a trusted remote user or
> remote site to be added to your network from outside. Examples: a home
> worker, a branch office.
> 
> There may be superficial similarities between VPN and pre-midcom technology,
> but fundamentally the functionality is diametrically opposed.

 I agree with you.
 VPN solution might need for enterprise user or some branch office.
 However, I think that VPN solution is very complex solution for end-users
 such as home user.
 
 I think that end-user needs more simple solution. For example, 
 end-user want to communicate between private network to private network
 without changing applications or OSes.
 (Private network means that hosts are placed the network behind NAT.)
 And, End users need a solution as soon as possible, I think.

 I mean that enterprise user and home user(end-user) have different requirements
 for communicating through NATs/FWs.
 Do we consider to separate those situation?


--
Kuniaki Kondo
kuniaki@iij.ad.jp

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov 22 04:31:48 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA11333
	for <midcom-archive@odin.ietf.org>; Thu, 22 Nov 2001 04:31:48 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id EAA15917
	for midcom-archive@odin.ietf.org; Thu, 22 Nov 2001 04:31:50 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA15488;
	Thu, 22 Nov 2001 04:22:54 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id EAA15459
	for <midcom@optimus.ietf.org>; Thu, 22 Nov 2001 04:22:53 -0500 (EST)
Received: from rhenium (rhenium.btinternet.com [194.73.73.93])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA11228
	for <midcom@ietf.org>; Thu, 22 Nov 2001 04:22:50 -0500 (EST)
Received: from [213.122.105.59] (helo=tkw)
	by rhenium with smtp (Exim 3.22 #8)
	id 166q4H-0006hv-00; Thu, 22 Nov 2001 09:22:50 +0000
Message-ID: <002f01c1732a$1cf4a3e0$0200000a@tkw>
From: "Pete Cordell" <pete@tech-know-ware.com>
To: "Bob Penfield" <bpenfield@acmepacket.com>, <midcom@ietf.org>
Date: Thu, 22 Nov 2001 07:46:31 -0000
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Content-Transfer-Encoding: 7bit
Subject: [midcom] 2 x ALLOCATE == FANTOM
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Bob,

You have raised a number of issues here which I think it would be useful to
address.  I've taken the liberty of breaking them out into a number of
separate threads so that they're easier to keep track of.  Hope you don't
mind.

Steve Davies wrote:
>> TURN cannot conform to the spirit of RTP in this way because the ALLOCATE
>> method only reserves a single transport address on the intermediary. If
>> it
>> requested 2 transport addresses, a probe or very similar mechanism would
>> be
>> required to establish the second outbound UDP connection. Even worse, the
>> way TURN is specified, there is a good chance that as a TURN server runs
>> out
>> of resource the associated RTP and RTCP transport addresses could have
>> different IP addresses. NOT ALLOWED.

To which Bob replied:
> The ALLOCATE method could be modified to include a "number of ports"
> attribute to request an allocation of 2 consecutive ports.

and:
> The STUN "Request" could be sent to the 2nd allocated port to
> establish the binding.

This line of reasoning basically leads to FANTOM (or something similar!) as
follows.

If you use TURN to allocate two ports in one message, you need a way to
associate the second port with the original allocation message.  In FANTOM
we do this by returning an identifier in the equivalent of the allocate
response.  We then include that identifier in a probe (equivalent to the
STUN request in Bob's suggestion) sent to the server.  This allows the
server to do the association.

With this method, the second port is effectively being set up using
out-of-band signalling.

Having the second port requiring out-of-band signalling, removes any benefit
of having in-band signalling for the first port.  We have also found that
there are many benefits to having an out-of-band signalling method.  For
example, we are also able to explicitly close the forwarding operation.  The
latter is a great comfort to a number of network administrators!

We can also see the many benefits that out-of-band signalling allows in many
other technology areas, such as the telephony network.  The adoption of
out-of-band signalling has allowed many new features to be added to such
systems in response to customer requirements.  Put simply, it allows for
extensibility.

We suggested TCP for the control channel because that gives us the
reliability we need, simplifying the operation of the code.  It also means
that we could readily reuse things like TLS for security.

Pete.

=============================================
Pete Cordell
Tech-Know-Ware
pete@tech-know-ware.com
+44 1473 635863
=============================================



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov 22 11:16:06 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA18057
	for <midcom-archive@odin.ietf.org>; Thu, 22 Nov 2001 11:16:06 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA26474
	for midcom-archive@odin.ietf.org; Thu, 22 Nov 2001 11:16:08 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA26369;
	Thu, 22 Nov 2001 11:08:32 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA26338
	for <midcom@optimus.ietf.org>; Thu, 22 Nov 2001 11:08:30 -0500 (EST)
Received: from gadolinium.btinternet.com (gadolinium.btinternet.com [194.73.73.111])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA17913
	for <midcom@ietf.org>; Thu, 22 Nov 2001 11:08:27 -0500 (EST)
Received: from [213.122.21.54] (helo=tkw)
	by gadolinium.btinternet.com with smtp (Exim 3.22 #8)
	id 166wOc-0005VU-00; Thu, 22 Nov 2001 16:08:15 +0000
Message-ID: <005e01c1736f$b477d1c0$0200000a@tkw>
From: "Pete Cordell" <pete@tech-know-ware.com>
To: "Bob Penfield" <bpenfield@acmepacket.com>, <midcom@ietf.org>
Date: Thu, 22 Nov 2001 16:05:10 -0000
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Content-Transfer-Encoding: 7bit
Subject: [midcom] Proxy + Traversal => FANTOM
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Bob,

This addresses another of the threads you raised.

Steve Davies wrote:
>> In this case the FANTOM client would have to handle
>> multiple simultaneous call setups and cleardowns. We judged a single
>> persistant tunnel for all call control from the FANTOM client to FANTOM
>> server was the most efficient use of resources.

To which Bob replied:
> Isn't this really the same as putting a proxy in the exterprise and having
> it connect to the proxy in the public network over TCP? Why is FANTOM
> better than adding a proxy? If FANTOM is present in the terminal, you have
> a tunnel for every terminal. If you have a FANTOM client, then all the
terminals
> need to send signalling to the FANTOM client. Doesn't that make it a
proxy?


The problem is that a proxy on its own is not sufficient to traverse the
firewall and NAT combination.  What you need is proxy + traversal solution.
In our case, proxy + traversal solution => FANTOM (as does client +
traversal solution => FANTOM).

This is why we multiplex the control channel.  We need both the native
signalling protocol (e.g. SIP) and the out-of-band traversal control
protocol (see previous e-mail for why we have it out-of-band) to pass
between the private and public proxies.  Muxing them over the same
connection reduces the number of rules required in the firewall, and saves
resources.  As the TCP connection will have already been established to make
the call, then there is also no over-head associated with establishing a new
TCP connection for the traversal control protocol.

Pete.

=============================================
Pete Cordell
Tech-Know-Ware
pete@tech-know-ware.com
+44 1473 635863
=============================================



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov 22 11:17:40 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA18081
	for <midcom-archive@odin.ietf.org>; Thu, 22 Nov 2001 11:17:40 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA26521
	for midcom-archive@odin.ietf.org; Thu, 22 Nov 2001 11:17:42 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA26418;
	Thu, 22 Nov 2001 11:10:23 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA26389
	for <midcom@optimus.ietf.org>; Thu, 22 Nov 2001 11:10:21 -0500 (EST)
Received: from carbon.btinternet.com (carbon.btinternet.com [194.73.73.92])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA17928
	for <midcom@ietf.org>; Thu, 22 Nov 2001 11:10:18 -0500 (EST)
Received: from [213.122.21.54] (helo=tkw)
	by carbon.btinternet.com with smtp (Exim 3.22 #8)
	id 166wQd-00066D-00; Thu, 22 Nov 2001 16:10:19 +0000
Message-ID: <005f01c1736f$fe8cf7e0$0200000a@tkw>
From: "Pete Cordell" <pete@tech-know-ware.com>
To: "Bob Penfield" <bpenfield@acmepacket.com>, <midcom@ietf.org>
Date: Thu, 22 Nov 2001 16:08:55 -0000
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Content-Transfer-Encoding: 7bit
Subject: [midcom] Client Vs. Proxy Traversal
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Bob,

This thread brings out something else...

Steve Davies wrote:
>> In this case the FANTOM client would have to handle
>> multiple simultaneous call setups and cleardowns. We judged a single
>> persistant tunnel for all call control from the FANTOM client to FANTOM
>> server was the most efficient use of resources.

To which Bob replied:
> Isn't this really the same as putting a proxy in the exterprise and having
> it connect to the proxy in the public network over TCP? Why is FANTOM
> better than adding a proxy? If FANTOM is present in the terminal, you have
> a tunnel for every terminal. If you have a FANTOM client, then all the
terminals
> need to send signalling to the FANTOM client. Doesn't that make it a
proxy?


By mentioning a proxy you raise an interesting issue.  In the enterprise
case,
FANTOM sits well where an ordinary proxy might sit, that is within the
boundary of the firewall installation (hence the name Application Proxy).
In
this respect it is augmenting the functionality of the firewall
installation.

This is not a pleasant thought if you only want end-to-end working.
However, the firewall has already broken that.  What it does mean though is
that the firewall is able to allow packets to/from the application proxy
to pass through that it might not otherwise allow from clients.  It can do
this in
the knowledge that the Application Proxy is forwarding only one
particular protocol, and the Application Proxy can also do all sorts of
other
stateful inspection exercises in order to check that things are as they
should
be.

It's much like adding an ALG to the firewall and NAT, except that in this
case it is located external to them.  As such it complements the firewall /
NAT functionality, but does not require the firewall / NAT itself to be
upgraded.  Therefore it can be quickly deployed, and is an ideal approach
for a pre-midcom solution.

On the other hand, if you deploy TURN or FANTOM on the clients, the
administrator has no way of knowing what they will be used for.  For a
number of environments this will not be acceptable, and won't lead to the
deployment of desktop VoIP.

Pete.

=============================================
Pete Cordell
Tech-Know-Ware
pete@tech-know-ware.com
+44 1473 635863
=============================================



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov 23 11:45:02 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA19217
	for <midcom-archive@odin.ietf.org>; Fri, 23 Nov 2001 11:45:02 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA03430
	for midcom-archive@odin.ietf.org; Fri, 23 Nov 2001 11:45:05 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA03372;
	Fri, 23 Nov 2001 11:35:55 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA03341
	for <midcom@optimus.ietf.org>; Fri, 23 Nov 2001 11:35:53 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id LAA19128
	for <midcom@ietf.org>; Fri, 23 Nov 2001 11:35:48 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112316324625792
 ; Fri, 23 Nov 2001 16:32:46 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XB5T3AMT>; Fri, 23 Nov 2001 16:34:48 -0000
Message-ID: <00533D13955AD411AF3800A0C9B426390EC4FA@ThisAddressDoesNotExist>
From: Barry Scott <bscott@ridgewaysystems.com>
To: "'Saqib Jang'" <saqibj@margallacomm.com>, midcom@ietf.org
Subject: RE: [midcom] pre-midcom solutions != VPN
Date: Fri, 23 Nov 2001 16:34:39 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1743C.BED7D480"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1743C.BED7D480
Content-Type: text/plain;
	charset="ISO-8859-1"

Saqib, 

Maybe we are talking at cross purposes. I think that IPsec is used to add 
authentication and encryption to IP data. Which is a different topic from 
a VPN routing data between two parts of a private network over a public 
network. (Or indeed two parts of the public network over a private network).

Of course when someone wants a secure VPN solution that solution may use 
IPsec. IPsec has its own set of problems with NAPT that stop it working 
today, but I understand that solutions are in development. 

I wanted to point out that pre-midcom work is different to a traditional 
VPN, because each end of a VPN shares the same address space, 10.0.0.0/8 
for example. Where each end of a pre-midcom is in a different address 
space, one end in the public internet the other in a 10.0.0.0/8 for example.


I cannot see how to use a VPN to make VOIP protocols work between private
IP address space and a shared public IP address space.

        Barry 


www.ridgewaysystems.com 

------_=_NextPart_001_01C1743C.BED7D480
Content-Type: text/html;
	charset="ISO-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=ISO-8859-1">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2653.12">
<TITLE>RE: [midcom] pre-midcom solutions != VPN</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=2>Saqib, </FONT>
</P>

<P><FONT SIZE=2>Maybe we are talking at cross purposes. I think that IPsec is used to add </FONT>
<BR><FONT SIZE=2>authentication and encryption to IP data. Which is a different topic from </FONT>
<BR><FONT SIZE=2>a VPN routing data between two parts of a private network over a public </FONT>
<BR><FONT SIZE=2>network. (Or indeed two parts of the public network over a private network).</FONT>
</P>

<P><FONT SIZE=2>Of course when someone wants a secure VPN solution that solution may use </FONT>
<BR><FONT SIZE=2>IPsec. IPsec has its own set of problems with NAPT that stop it working </FONT>
<BR><FONT SIZE=2>today, but I understand that solutions are in development. </FONT>
</P>

<P><FONT SIZE=2>I wanted to point out that pre-midcom work is different to a traditional </FONT>
<BR><FONT SIZE=2>VPN, because each end of a VPN shares the same address space, 10.0.0.0/8 </FONT>
<BR><FONT SIZE=2>for example. Where each end of a pre-midcom is in a different address </FONT>
<BR><FONT SIZE=2>space, one end in the public internet the other in a 10.0.0.0/8 for example. </FONT>
</P>

<P><FONT SIZE=2>I cannot see how to use a VPN to make VOIP protocols work between private</FONT>
<BR><FONT SIZE=2>IP address space and a shared public IP address space.</FONT>
</P>

<P><FONT SIZE=2>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Barry </FONT>
</P>
<BR>

<P><FONT SIZE=2>www.ridgewaysystems.com </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C1743C.BED7D480--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov 23 15:05:58 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22730
	for <midcom-archive@odin.ietf.org>; Fri, 23 Nov 2001 15:05:58 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA07586
	for midcom-archive@odin.ietf.org; Fri, 23 Nov 2001 15:06:02 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA07526;
	Fri, 23 Nov 2001 15:04:50 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA07499
	for <midcom@optimus.ietf.org>; Fri, 23 Nov 2001 15:04:49 -0500 (EST)
Received: from sj-msg-core-4.cisco.com (sj-msg-core-4.cisco.com [171.71.163.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22720
	for <midcom@ietf.org>; Fri, 23 Nov 2001 15:04:44 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-4.cisco.com (8.11.3/8.9.1) with ESMTP id fANK4Gl16376;
	Fri, 23 Nov 2001 12:04:17 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ACA22032;
	Fri, 23 Nov 2001 12:03:48 -0800 (PST)
Message-Id: <5.1.0.14.0.20011123150254.00a5e200@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Fri, 23 Nov 2001 15:06:51 -0500
To: Barry Scott <bscott@ridgewaysystems.com>,
        "'Saqib Jang'" <saqibj@margallacomm.com>, midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] pre-midcom solutions != VPN
In-Reply-To: <00533D13955AD411AF3800A0C9B426390EC4FA@ThisAddressDoesNotE
 xist>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 04:34 PM 11/23/01 +0000, Barry Scott wrote:
>I cannot see how to use a VPN to make VOIP protocols work between private 
>IP address space and a shared public IP address space. 

VPNs don't always use separate address spaces.  Also, it's not
that endpoints on a VPN already all share an address space - it's
more typically the case that an address that's routable within
the VPN is *loaned* to the endpoint when it joins the VPN.

The pre-midcom work is intended address cases that are not
currently handled by existing technology.  Let's move on, please.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov 23 15:06:30 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22748
	for <midcom-archive@odin.ietf.org>; Fri, 23 Nov 2001 15:06:29 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA07601
	for midcom-archive@odin.ietf.org; Fri, 23 Nov 2001 15:06:34 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA07571;
	Fri, 23 Nov 2001 15:05:55 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA07542
	for <midcom@optimus.ietf.org>; Fri, 23 Nov 2001 15:05:53 -0500 (EST)
Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22726
	for <midcom@ietf.org>; Fri, 23 Nov 2001 15:05:48 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fANK5LE23661
	for <midcom@ietf.org>; Fri, 23 Nov 2001 12:05:21 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ACA22034;
	Fri, 23 Nov 2001 12:04:53 -0800 (PST)
Message-Id: <5.1.0.14.0.20011123150654.00a69030@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Fri, 23 Nov 2001 15:07:55 -0500
To: midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: [midcom] Last call reminder
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This is a reminder that working group last call for the midcom
framework document ends on the 27th.  If you haven't yet given 
the document a good read, please do.

Thanks,

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Sun Nov 25 09:21:15 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA20388
	for <midcom-archive@odin.ietf.org>; Sun, 25 Nov 2001 09:21:15 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id JAA04383
	for midcom-archive@odin.ietf.org; Sun, 25 Nov 2001 09:21:18 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA03738;
	Sun, 25 Nov 2001 08:36:34 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA03710
	for <midcom@optimus.ietf.org>; Sun, 25 Nov 2001 08:36:33 -0500 (EST)
Received: from web14107.mail.yahoo.com (web14107.mail.yahoo.com [216.136.172.137])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id IAA20075
	for <midcom@ietf.org>; Sun, 25 Nov 2001 08:36:30 -0500 (EST)
Message-ID: <20011125133632.72754.qmail@web14107.mail.yahoo.com>
Received: from [209.226.122.26] by web14107.mail.yahoo.com via HTTP; Sun, 25 Nov 2001 05:36:32 PST
Date: Sun, 25 Nov 2001 05:36:32 -0800 (PST)
From: Mark Taylor <m_taylorus@yahoo.com>
To: Jonathan Rosenberg <jdrosen@dynamicsoft.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
In-Reply-To: <B65B4F8437968F488A01A940B21982BF020D6F06@DYN-EXCH-001.dynamicsoft.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [midcom] STUN/TURN vs Davies (FANTOM)
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

 STUN/TURN and the Davies (FANTOM) proposals are
marked by different emphaisises in achieving the same
objective.

STUN/TURN emphasizes simplicity. Davies emphasizes
security with its addressing of firewall issues. The
other differences between the protocols seem only to
be variations on a theme and not consequential to the
overall problem.

I asked a security specialist about the Davies
proposal's firewall claims. He found them to be
unconvincing with the observation that many people
have inflated ideas about what firewalls can do.

If the Davies firewall strategy is, as with this view,
ineffective, it only adds complexity and cost without
providing real benefit. STUN/TURN will provide the
same level of security with a simpler and less costly
proposal.

Is this view correct?

__________________________________________________
Do You Yahoo!?
Yahoo! GeoCities - quick and easy web site hosting, just $8.95/month.
http://geocities.yahoo.com/ps/info1

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 06:23:45 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA19884
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 06:23:41 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id GAA04878
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 06:22:47 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id GAA04630;
	Mon, 26 Nov 2001 06:18:24 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id GAA04599
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 06:18:22 -0500 (EST)
Received: from CNRI.Reston.VA.US (localhost [127.0.0.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA19597;
	Mon, 26 Nov 2001 06:18:19 -0500 (EST)
Message-Id: <200111261118.GAA19597@ietf.org>
Mime-Version: 1.0
Content-Type: Multipart/Mixed; Boundary="NextPart"
To: IETF-Announce: ;
Cc: midcom@ietf.org
From: Internet-Drafts@ietf.org
Reply-to: Internet-Drafts@ietf.org
Date: Mon, 26 Nov 2001 06:18:18 -0500
Subject: [midcom] I-D ACTION:draft-ietf-midcom-requirements-04.txt
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

--NextPart

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Middlebox Communication Working Group of the IETF.

	Title		: Middlebox Communications (MIDCOM) Protocol 
                          Requirements
	Author(s)	: R. Swale, P. Mart, P. Sijben, S. Brim, M. Shore
	Filename	: draft-ietf-midcom-requirements-04.txt
	Pages		: 10
	Date		: 21-Nov-01
	
This document specifies the requirements that the Middlebox Commu-
nication (midcom) protocol must satisfy in order to meet the needs
of applications wishing to influence middlebox function.  These
requirements were developed with a specific focus on network
address translation and firewall middleboxes.

A URL for this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-midcom-requirements-04.txt

To remove yourself from the IETF Announcement list, send a message to 
ietf-announce-request with the word unsubscribe in the body of the message.

Internet-Drafts are also available by anonymous FTP. Login with the username
"anonymous" and a password of your e-mail address. After logging in,
type "cd internet-drafts" and then
	"get draft-ietf-midcom-requirements-04.txt".

A list of Internet-Drafts directories can be found in
http://www.ietf.org/shadow.html 
or ftp://ftp.ietf.org/ietf/1shadow-sites.txt


Internet-Drafts can also be obtained by e-mail.

Send a message to:
	mailserv@ietf.org.
In the body type:
	"FILE /internet-drafts/draft-ietf-midcom-requirements-04.txt".
	
NOTE:	The mail server at ietf.org can return the document in
	MIME-encoded form by using the "mpack" utility.  To use this
	feature, insert the command "ENCODING mime" before the "FILE"
	command.  To decode the response(s), you will need "munpack" or
	a MIME-compliant mail reader.  Different MIME-compliant mail readers
	exhibit different behavior, especially when dealing with
	"multipart" MIME messages (i.e. documents which have been split
	up into multiple messages), so check your local documentation on
	how to manipulate these messages.
		
		
Below is the data which will enable a MIME compliant mail reader
implementation to automatically retrieve the ASCII version of the
Internet-Draft.

--NextPart
Content-Type: Multipart/Alternative; Boundary="OtherAccess"

--OtherAccess
Content-Type: Message/External-body;
	access-type="mail-server";
	server="mailserv@ietf.org"

Content-Type: text/plain
Content-ID:	<20011121141934.I-D@ietf.org>

ENCODING mime
FILE /internet-drafts/draft-ietf-midcom-requirements-04.txt

--OtherAccess
Content-Type: Message/External-body;
	name="draft-ietf-midcom-requirements-04.txt";
	site="ftp.ietf.org";
	access-type="anon-ftp";
	directory="internet-drafts"

Content-Type: text/plain
Content-ID:	<20011121141934.I-D@ietf.org>

--OtherAccess--

--NextPart--



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 09:26:08 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA28561
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 09:26:08 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id JAA08843
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 09:26:12 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA08724;
	Mon, 26 Nov 2001 09:22:18 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA08697
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 09:22:17 -0500 (EST)
Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA28309
	for <midcom@ietf.org>; Mon, 26 Nov 2001 09:22:11 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fAQELdH20002
	for <midcom@ietf.org>; Mon, 26 Nov 2001 06:21:39 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ACB18920;
	Mon, 26 Nov 2001 06:20:47 -0800 (PST)
Message-Id: <5.1.0.14.0.20011126092248.00a737b0@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Mon, 26 Nov 2001 09:24:22 -0500
To: midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Subject: Fwd: [midcom] I-D ACTION:draft-ietf-midcom-requirements-04.txt
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

We are starting working group last call for the requirements
document today.  Last call ends on 10 December (which is also
the date of our meeting in Salt Lake City).

Melinda


>To: IETF-Announce: ;
>Cc: midcom@ietf.org
>From: Internet-Drafts@ietf.org
>Reply-to: Internet-Drafts@ietf.org
>Date: Mon, 26 Nov 2001 06:18:18 -0500
>Subject: [midcom] I-D ACTION:draft-ietf-midcom-requirements-04.txt
>Sender: midcom-admin@ietf.org
>X-Mailman-Version: 1.0
>List-Id:  <midcom.ietf.org>
>X-BeenThere: midcom@ietf.org
>
>A New Internet-Draft is available from the on-line Internet-Drafts directories.
>This draft is a work item of the Middlebox Communication Working Group of the IETF.
>
>        Title           : Middlebox Communications (MIDCOM) Protocol 
>                          Requirements
>        Author(s)       : R. Swale, P. Mart, P. Sijben, S. Brim, M. Shore
>        Filename        : draft-ietf-midcom-requirements-04.txt
>        Pages           : 10
>        Date            : 21-Nov-01
>        
>This document specifies the requirements that the Middlebox Commu-
>nication (midcom) protocol must satisfy in order to meet the needs
>of applications wishing to influence middlebox function.  These
>requirements were developed with a specific focus on network
>address translation and firewall middleboxes.
>
>A URL for this Internet-Draft is:
>http://www.ietf.org/internet-drafts/draft-ietf-midcom-requirements-04.txt
>
>To remove yourself from the IETF Announcement list, send a message to 
>ietf-announce-request with the word unsubscribe in the body of the message.
>
>Internet-Drafts are also available by anonymous FTP. Login with the username
>"anonymous" and a password of your e-mail address. After logging in,
>type "cd internet-drafts" and then
>        "get draft-ietf-midcom-requirements-04.txt".
>
>A list of Internet-Drafts directories can be found in
>http://www.ietf.org/shadow.html 
>or ftp://ftp.ietf.org/ietf/1shadow-sites.txt
>
>
>Internet-Drafts can also be obtained by e-mail.
>
>Send a message to:
>        mailserv@ietf.org.
>In the body type:
>        "FILE /internet-drafts/draft-ietf-midcom-requirements-04.txt".
>        
>NOTE:   The mail server at ietf.org can return the document in
>        MIME-encoded form by using the "mpack" utility.  To use this
>        feature, insert the command "ENCODING mime" before the "FILE"
>        command.  To decode the response(s), you will need "munpack" or
>        a MIME-compliant mail reader.  Different MIME-compliant mail readers
>        exhibit different behavior, especially when dealing with
>        "multipart" MIME messages (i.e. documents which have been split
>        up into multiple messages), so check your local documentation on
>        how to manipulate these messages.
>                
>                
>Below is the data which will enable a MIME compliant mail reader
>implementation to automatically retrieve the ASCII version of the
>Internet-Draft.
>Content-Type: text/plain
>Content-ID:     <20011121141934.I-D@ietf.org>
>
>ENCODING mime
>FILE /internet-drafts/draft-ietf-midcom-requirements-04.txt
>
><ftp://ftp.ietf.org/internet-drafts/draft-ietf-midcom-requirements-04.txt>


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 10:52:19 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA05533
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 10:52:19 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id KAA12207
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 10:52:22 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA11569;
	Mon, 26 Nov 2001 10:46:07 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA11538
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 10:46:05 -0500 (EST)
Received: from argyre.fr.uu.net (mail.fr.uu.net [194.98.0.9])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA04730
	for <midcom@ietf.org>; Mon, 26 Nov 2001 10:46:01 -0500 (EST)
From: annuaire@annuairefrancais.com
Received: from [213.11.39.71] ([213.11.39.71])
	by argyre.fr.uu.net (8.9.3/8.8.7) with SMTP id QAA16494
	for <midcom@ietf.org>; Mon, 26 Nov 2001 16:52:41 +0100 (MET)
Message-Id: <200111261552.QAA16494@argyre.fr.uu.net>
Mime-Version: 1.0
Content-Type: text/plain;charset="us-ascii"
Content-Transfer-Encoding: 7bit
Date: Mon, 26 Nov 2001 16:45:01 +0100
To: midcom@ietf.org
Content-Transfer-Encoding: 7bit
Subject: [midcom] Info : L'Annuaire Francais par Departement facilite vos recherches
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Bonjour,

L'annuaire Francais Par departement http://www.annuairefrancais.com integre desormais un moteur de recherche pour affiner vos recherches sur le web.

L'inscription reste gratuite et la validation toujours manuelle. L'adresse d'inscription est desormais http://inscrip.annuairefrancais.com

Pour toutes suggestions contactez par mail :
direction : laurent@annuairefrancais.com
validation : validation@annuairefrancais.com
publicite : publicite@annuairefrancais.com
partenariat : partenariat@annuairefrancais.com

INFORMATIONS :
retrait de notre liste d'info : http://supressinfo.annuairefrancais.com
(L'annuaire francais envoi 2 infos par an)

L'annuaire Francais
119 Rue des Pyrenees
75020 PARIS
+33 (0)1 43 67 00 74

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 12:19:52 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA13894
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 12:19:51 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA18572
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 12:19:55 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA14569;
	Mon, 26 Nov 2001 11:29:18 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA14167
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 11:28:56 -0500 (EST)
Received: from relay4.kornet.net ([211.48.62.164])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA08552
	for <midcom@ietf.org>; Mon, 26 Nov 2001 11:28:47 -0500 (EST)
Received: from localhost (61.72.136.249) by relay4.kornet.net; 27 Nov 2001 01:28:38 +0900
Message-ID: <3c026db63c1ecea8@relay4.kornet.net> (added by relay4.kornet.net)
Reply-To: salearea3@airtkcketauction.co.kr
From: (ÁÖ)Ç×°ø±Ç°æ¸Å<happydawn@orgio.net>
To: midcom@ietf.org
Mime-Version: 1.0
Content-Type: text/html; charset="ks_c_5601-1987"
Date: Tue, 27 Nov 2001 01:34:47 +0900
Subject: [midcom] [±¤°í]°¡Àå Àú·ÅÇÑ Ç×°ø±ÇÀº Ç×°ø±Ç°æ¸Å¸¦ ÀÌ¿ëÇÏ¼¼¿ä.
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

<!-- saved from url=(0022)http://internet.e-mail -->
<html>

<head>
<meta http-equiv="content-type" content="text/html; charset=euc-kr">
<title>¡Ø ÀÌ ¸ÞÀÏÀº °Ô½ÃÆÇ¿¡¼­ ÀÓÀÇ·Î »ÌÀº °ÍÀÌ¿À´Ï,ÀÌ¸ÞÀÏ ÀÌ¿Ü´Â ¾î¶°ÇÑ °³ÀÎÀÚ·áµµ ¾ËÁö ¸ø</title>
<meta name="generator" content="Namo WebEditor v5.0">
<style>

body {font-size:12px;}

p  {font-size:12px;}

td  {font-size:12px;}

a  {TEXT-DECORATION: NONE; COLOR:#000099}

a:hover {TEXT-DECORATION: NONE;  COLOR:#0000ff}

text {font-size:12px;}

select {font-size:9pt; line-height:9pt;}



</style>
</head>

<body bgcolor="white" text="black" link="blue" vlink="purple" alink="red" style="font-size:9pt;">
<table border="1" cellspacing="0" width="548" bordercolordark="white" bordercolorlight="#CCCCCC">
    <tr>
        <td width="749">
            <p><img src="http://www.airticketauction.co.kr/mcm_event.gif" width="548" height="363" border="0"></p>
            <table align="center">

<TR>
<TD>&nbsp;&nbsp;¡Ø ÀÌ ¸ÞÀÏÀº °Ô½ÃÆÇ¿¡¼­ ÀÓÀÇ·Î »ÌÀº °ÍÀÌ¿À´Ï,ÀÌ¸ÞÀÏ ÀÌ¿Ü´Â ¾î¶°ÇÑ °³ÀÎÀÚ·áµµ ¾ËÁö ¸ø<BR>&nbsp;&nbsp;&nbsp;&nbsp;ÇÕ´Ï´Ù.ÀÓÀÇÀûÀ¸·Î Ã³¸®ÇÑ ¸ÞÀÏ¿¡ ´ëÇØ¼­´Â 
¼ö½Å°ÅºÎÇÏ¿© ÁÖ½Ã¸é ¸ÞÀÏÀ» ¹ß¼ÛÇÏÁö ¾Êµµ·Ï<BR>&nbsp;&nbsp;&nbsp;&nbsp;ÇÏ°Ú½À´Ï´Ù. </TD></TR>
<TR>
<FORM name=event action=form6.cgi method=post>
<TD align=middle height=54>¢Ñ <a href='mailto:delmail@airticketauction.co.kr?subject=¼ö½Å°ÅºÎ&amp;body=¸ÞÀÏ¼ö½ÅÀ»°ÅºÎÇÕ´Ï´Ù">'>¼ö½Å°ÅºÎ</a> </TD></FORM></TR>
        </table>
    </td>
    </tr>
</table>
<p>&nbsp;</p>
</body>

</html>

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 13:03:57 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA16997
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 13:03:57 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id NAA20505
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 13:04:00 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA20445;
	Mon, 26 Nov 2001 13:02:40 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA20416
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 13:02:38 -0500 (EST)
Received: from sj-msg-core-2.cisco.com (sj-msg-core-2.cisco.com [171.69.24.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA16923
	for <midcom@ietf.org>; Mon, 26 Nov 2001 13:02:35 -0500 (EST)
Received: from imop.cisco.com (imop.cisco.com [171.69.11.44])
	by sj-msg-core-2.cisco.com (8.11.3/8.9.1) with ESMTP id fAQI1WE08743;
	Mon, 26 Nov 2001 10:01:32 -0800 (PST)
Received: from rmahy-home-nt (ssh-sj1.cisco.com [171.68.225.134])
	by imop.cisco.com (Mirapoint)
	with ESMTP id ACB99690;
	Mon, 26 Nov 2001 10:01:31 -0800 (PST)
Message-Id: <4.2.0.58.20011126093005.023975d0@lint.cisco.com>
X-Sender: rmahy@lint.cisco.com (Unverified)
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.0.58 
Date: Mon, 26 Nov 2001 09:54:56 -0800
To: midcom@ietf.org
From: Rohan Mahy <rohan@cisco.com>
Cc: pete@tech-know-ware.com
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Subject: [midcom] client vs. proxy traversal
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Hi,

I have a few comments inline...

 >    * To: "Bob Penfield" <bpenfield@acmepacket.com>, <midcom@ietf.org>
 >    * Subject: [midcom] Client Vs. Proxy Traversal
 >    * From: "Pete Cordell" <pete@tech-know-ware.com>
 >    * Date: Thu, 22 Nov 2001 16:08:55 -0000
 >    * List-Id: <midcom.ietf.org>
 >    * Sender: midcom-admin@ietf.org
 >
 >Bob,
 >
 >This thread brings out something else...
 >
 >Steve Davies wrote:
 >>> In this case the FANTOM client would have to handle
 >>> multiple simultaneous call setups and cleardowns. We judged a single
 >>> persistant tunnel for all call control from the FANTOM client to FANTOM
 >>> server was the most efficient use of resources.
 >
 >To which Bob replied:
 >> Isn't this really the same as putting a proxy in the exterprise and having
 >> it connect to the proxy in the public network over TCP? Why is FANTOM
 >> better than adding a proxy? If FANTOM is present in the terminal, you have
 >> a tunnel for every terminal. If you have a FANTOM client, then all the
 >terminals
 >> need to send signalling to the FANTOM client. Doesn't that make it a
 >proxy?
 >
 >
 >By mentioning a proxy you raise an interesting issue.  In the enterprise
 >case, FANTOM sits well where an ordinary proxy might sit, that is within the
 >boundary of the firewall installation (hence the name Application Proxy).
 >In this respect it is augmenting the functionality of the firewall
 >installation.
 >
 >This is not a pleasant thought if you only want end-to-end working.
 >However, the firewall has already broken that.

As Melinda stated, our focus for pre-midcom is NAT traversal, not firewall 
traversal.  TURN takes advantantage of the "symmetric UDP" behavior of NATs 
to allow one end to talk to another without *control* of an intermediary.

The fact that many firewalls also exhibit "symmetric UDP" behavior is just 
an added bonus.

 >What it does mean though is
 >that the firewall is able to allow packets to/from the application proxy
 >to pass through that it might not otherwise allow from clients.

If the firewall administrator is willing to do this, it shouldn't be hard 
to allow symmetric UDP with a timeout.

 >It can do this in
 >the knowledge that the Application Proxy is forwarding only one
 >particular protocol, and the Application Proxy can also do all sorts of
 >other
 >stateful inspection exercises in order to check that things are as they
 >should
 >be.

I think the market will decide if they want this functionality vs. the 
complexity that it adds.  Probably not a single market here.

 >It's much like adding an ALG to the firewall and NAT, except that in this
 >case it is located external to them.  As such it complements the firewall /
 >NAT functionality, but does not require the firewall / NAT itself to be
 >upgraded.  Therefore it can be quickly deployed, and is an ideal approach
 >for a pre-midcom solution.
 >
 >On the other hand, if you deploy TURN or FANTOM on the clients, the
 >administrator has no way of knowing what they will be used for.  For a
 >number of environments this will not be acceptable, and won't lead to the
 >deployment of desktop VoIP.

I disagree.  This is not new support that has to be added in most 
cases.  Many firewalls are *already configured* to allow symmetric 
UDP.  Users behind these firewalls take advantage of streaming content and 
other UDP applications today.  Apparently this is OK with the 
administrators.  I believe a TURN-style solution for peer-to-peer RTP would 
be acceptable to them as well.

thanks,
-rohan

 >Pete.
 >
 >=============================================
 >Pete Cordell
 >Tech-Know-Ware
 >pete@tech-know-ware.com
 >+44 1473 635863
 >=============================================


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 13:04:30 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA17040
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 13:04:30 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id NAA20522
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 13:04:32 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA20488;
	Mon, 26 Nov 2001 13:02:45 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA20456
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 13:02:43 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA16924
	for <midcom@ietf.org>; Mon, 26 Nov 2001 13:02:35 -0500 (EST)
Received: from imop.cisco.com (imop.cisco.com [171.69.11.44])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAQI1YI09963;
	Mon, 26 Nov 2001 10:01:34 -0800 (PST)
Received: from rmahy-home-nt (ssh-sj1.cisco.com [171.68.225.134])
	by imop.cisco.com (Mirapoint)
	with ESMTP id ACB99691;
	Mon, 26 Nov 2001 10:01:33 -0800 (PST)
Message-Id: <4.2.0.58.20011126095518.0239aac0@lint.cisco.com>
X-Sender: rmahy@lint.cisco.com (Unverified)
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.0.58 
Date: Mon, 26 Nov 2001 10:01:54 -0800
To: midcom@ietf.org
From: Rohan Mahy <rohan@cisco.com>
Cc: pete@tech-know-ware.com, rohan@cisco.com
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Subject: [midcom] 2x allocate vs FANTOM
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Hi,

Comments inline...

 >    * To: "Bob Penfield" <bpenfield@acmepacket.com>, <midcom@ietf.org>
 >    * Subject: [midcom] 2 x ALLOCATE == FANTOM
 >    * From: "Pete Cordell" <pete@tech-know-ware.com>
 >    * Date: Thu, 22 Nov 2001 07:46:31 -0000
 >    * List-Id: <midcom.ietf.org>
 >    * Sender: midcom-admin@ietf.org
 >
 >Steve Davies wrote:
 >>> TURN cannot conform to the spirit of RTP in this way because the ALLOCATE
 >>> method only reserves a single transport address on the intermediary. If
 >>> it
 >>> requested 2 transport addresses, a probe or very similar mechanism would
 >>> be
 >>> required to establish the second outbound UDP connection. Even worse, the
 >>> way TURN is specified, there is a good chance that as a TURN server runs
 >>> out
 >>> of resource the associated RTP and RTCP transport addresses could have
 >>> different IP addresses. NOT ALLOWED.
 >
 >To which Bob replied:
 >> The ALLOCATE method could be modified to include a "number of ports"
 >> attribute to request an allocation of 2 consecutive ports.
 >
 >and:
 >> The STUN "Request" could be sent to the 2nd allocated port to
 >> establish the binding.
 >
 >This line of reasoning basically leads to FANTOM (or something similar!) as
 >follows.
 >
 >If you use TURN to allocate two ports in one message, you need a way to
 >associate the second port with the original allocation message.  In FANTOM
 >we do this by returning an identifier in the equivalent of the allocate
 >response.  We then include that identifier in a probe (equivalent to the
 >STUN request in Bob's suggestion) sent to the server.  This allows the
 >server to do the association.
 >
 >With this method, the second port is effectively being set up using
 >out-of-band signalling.

This is incorrect.  A second TURN request would still send traffic from and 
receive traffic on the same port it uses for an Allocate 
Request/Response.  You would just include an extra identifier in-band.

 >Having the second port requiring out-of-band signalling, removes any benefit
 >of having in-band signalling for the first port.

see above.

 >We have also found that
 >there are many benefits to having an out-of-band signalling method.  For
 >example, we are also able to explicitly close the forwarding operation.  The
 >latter is a great comfort to a number of network administrators!
[snip]

Understood.  This is another classic simplicity vs. functionality tradeoff.

thanks,
-rohan



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 13:36:05 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA19328
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 13:36:05 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id NAA21782
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 13:36:08 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA21207;
	Mon, 26 Nov 2001 13:25:48 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA21174
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 13:25:46 -0500 (EST)
Received: from localhost.localdomain (dsl081-118-200.dfw1.dsl.speakeasy.net [64.81.118.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA18558
	for <midcom@ietf.org>; Mon, 26 Nov 2001 13:25:42 -0500 (EST)
Received: from dynamicsoft.com (rocinante [127.0.0.1])
	by localhost.localdomain (8.11.6/8.11.6) with ESMTP id fAQIMYs12700
	for <midcom@ietf.org>; Mon, 26 Nov 2001 12:22:34 -0600
Message-ID: <3C02886A.2080800@dynamicsoft.com>
Date: Mon, 26 Nov 2001 12:22:34 -0600
From: Ben Campbell <bcampbell@dynamicsoft.com>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.5+) Gecko/20011115
X-Accept-Language: en-us
MIME-Version: 1.0
CC: midcom@ietf.org
Subject: Simplicity vs. generality (was Re: [midcom] 2x allocate vs FANTOM)
References: <4.2.0.58.20011126095518.0239aac0@lint.cisco.com>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit



Rohan Mahy wrote:

[snip]

> 
> Understood.  This is another classic simplicity vs. functionality tradeoff.
> 

And there lies the crux of the problem. If the pre-midcom protocol is 
expected to have a short lifespan, that is it will eventually be 
supplanted by the real midcom protocol, then I would expect that we 
would want to err on the side of simplicity.


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 14:48:27 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA24675
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 14:48:27 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id OAA23963
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 14:48:31 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA23797;
	Mon, 26 Nov 2001 14:40:54 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA23769
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 14:40:53 -0500 (EST)
Received: from mail5.microsoft.com (mail5.microsoft.com [131.107.3.121])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA24181
	for <midcom@ietf.org>; Mon, 26 Nov 2001 14:40:46 -0500 (EST)
Received: from inet-vrs-05.redmond.corp.microsoft.com ([157.54.6.148]) by mail5.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Mon, 26 Nov 2001 11:39:46 -0800
Received: from 157.54.6.150 by inet-vrs-05.redmond.corp.microsoft.com (InterScan E-Mail VirusWall NT); Mon, 26 Nov 2001 11:39:46 -0800
Received: from red-imc-01.redmond.corp.microsoft.com ([157.54.9.102]) by inet-hub-05.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Mon, 26 Nov 2001 11:39:45 -0800
Received: from win-imc-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.84]) by red-imc-01.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Mon, 26 Nov 2001 11:39:45 -0800
Received: from win-msg-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.134]) by win-imc-02.wingroup.windeploy.ntdev.microsoft.com with Microsoft SMTPSVC(6.0.3588.0);
	 Mon, 26 Nov 2001 11:39:04 -0800
X-MimeOLE: Produced By Microsoft Exchange V6.0.6063.0
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Subject: RE: Simplicity vs. generality (was Re: [midcom] 2x allocate vs FANTOM)
Date: Mon, 26 Nov 2001 11:39:04 -0800
Message-ID: <F66A04C29AD9034A8205949AD0C9010401C0E3C5@win-msg-02.wingroup.windeploy.ntdev.microsoft.com>
Thread-Topic: Simplicity vs. generality (was Re: [midcom] 2x allocate vs FANTOM)
Thread-Index: AcF2qDzHcHd9mjPLSHyM8Ng6ltO5GwACDK5w
From: "Christian Huitema" <huitema@windows.microsoft.com>
To: "Ben Campbell" <bcampbell@dynamicsoft.com>
Cc: <midcom@ietf.org>
X-OriginalArrivalTime: 26 Nov 2001 19:39:04.0991 (UTC) FILETIME=[01D272F0:01C176B2]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by optimus.ietf.org id OAA23770
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 8bit

Part of the design choice in STUN/TURN is really about allowing
deployment of applications without requiring changes on the NAT and
firewalls, and also as much as possible without incurring cost -- which
means, by minimizing the number of additional servers and the amount of
traffic routed through these servers. There are several deployment
environments that we want to serve, depending on the type of
NAT/firewall that is obstructing the communication:

1- "cone" NAT, i.e. NAT mapping is independent of the outside
destination, communication with multiple peer is not restricted.
2- "restricted cone" NAT, i.e. NAT mapping is independent of the outside
destination, communication is restricted to peers to which traffic has
been sent from the inside.
3- "symmetric" NAT, i.e. NAT mapping is dependent of the outside
destination, communication is ipso-facto restricted to peers to which
traffic has been sent from the inside.
4- "symmetric" firewall, similar to "restricted cone" but without the
mapping.
5- "full firewall", i.e. UDP communication is mostly blocked.

As Jonathan previously mentioned, we have no intention of solving the
5th case -- if the local admin wanted to allow UDP, it would have done
so. STUN solves cases 1, 2 and 4; 1 and 2, combined, cover a very large
fraction of the current "residential NAT" installations, probably around
95%. TURN covers case 3, i.e. the remaining 5% of the residential market
and a good share of the firewall deployments. 

There is a very large difference between the cost of running STUN and
the cost of running a relay: about 2 transactions per call for STUN, 50
messages per second for the duration of the call for relays, including
TURN. As Jonathan pointed out, this is a big difference on the bottom
line -- and this is also the reason why "one size fits all" is not a
good approach.

-- Christian Huitema

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 15:39:55 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA29000
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 15:39:55 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA25754
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 15:39:59 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA25736;
	Mon, 26 Nov 2001 15:38:38 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA25705
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 15:38:37 -0500 (EST)
Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA28901
	for <midcom@ietf.org>; Mon, 26 Nov 2001 15:38:32 -0500 (EST)
Received: from BobP [63.67.143.2] by acmepacket.com
  (SMTPD32-7.04) id A84B6DD001C0; Mon, 26 Nov 2001 15:38:35 -0500
Message-ID: <005b01c176b9$d4066220$2300000a@acmepacket.com>
From: "Bob Penfield" <bpenfield@acmepacket.com>
To: "Pyda Srisuresh" <srisuresh@yahoo.com>, "midcom" <midcom@ietf.org>
Date: Mon, 26 Nov 2001 15:35:03 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Content-Transfer-Encoding: 7bit
Subject: [midcom] Comments on framework-05
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Here are my comments (mostly nits) on the framework draft.

1) Section 2: This document should not use RFC 2119 requirements language.
The requirements document doesn't.

2) Figure 2 in section 5 does not show the SIP & RTSP data path outside the
firewall:

                           +-----------+
                           | Middlebox |
                           | Policy    |
                           | Server    |~~~~~~~~~~~~~|
                           +-----------+              \
                                                       \
                    +--------+                          \
                    | SIP    |___                        \
            ________| Proxy  |   \            Middlebox   \
           /        +--------+..  |        +--------------------+
          |                    :  | MIDCOM |           |        |
          |  RTSP +---------+  :..|........| MIDCOM    | POLICY |
      SIP |   ____|  RTSP   |.....|........| PROTOCOL  | INTER- |
          |  /    |  Proxy  |___  |        | INTERFACE | FACE   |
          | |     +---------+   \  \       |--------------------|
          | |                     \  \-----|                    |-----SIP
          | |                      \-------|                    |-----RTSP
          | |                           ---|     FIREWALL       |-->--
         +-----------+                 /---|                    |--<--
        +-----------+|  Data streams  //   +--------------------+
       +-----------+||---------->----//            |
       |end-hosts  ||-----------<-----             .
       +-----------+   (RTP, RTSP data, etc.)      |
                                                   .  Outside the
              Within a private domain              |  private domain


3) section 6.1, 3rd sentence. s/MUST/must/. The framework should not use
RFC-2119 requirements language.

4) section 6.2, 1st sentence. s/MUST/must/. The framework should not use
RFC-2119 requirements language.

5) In section 6.2 it says:
                                        However, it is possible to
   retain the provisioning on middlebox unchanged, by requiring MIDCOM
   agents to initiate the session to middlebox.

Since we have decided that MIDCOM is client-server with the agent initiating
the session, should "by requiring MIDCOM agents to initiate..." be changed
to "since MIDCOM agents initiate..."?

6) Since Out-of-Path agents are out-of-scope, there is no need to qualify
MIDCOM agents as "In-path". Therefore, all occurrences of "In-path" should
be removed from section 7.

7) Figure 3 is not correct. In order to match how it will really work and
the timeline flows it should be:

                         ___________
                     --->|   SIP   |<-----\
                    /    |  Proxy  |       \
                   |     |_________|       |
                  1|       |^    ^|       4|
                   |       ||    ||        |
                   |8     2||3  7||6       |5
   ______________  |       ||    ||        |   ______________
   |            |<-/      _v|____|v____     \->|            |
   | External   |    Na   |           |   Nc   | SIP Phone  |
   | SIP phone  |>------->| Middlebox |>------>| within     |
   |            |<-------<|___________|<------<| Pvt. domain|
   |____________|    Nb                   Nd   |____________|

and the second paragraph should be revised to:

   Arrows 1 and 8 in the figure below refer to SIP call setup
   exchange between the external SIP phone and the SIP proxy.
   Arrows 4 and 5 refer to SIP call setup exchange between the SIP
   proxy and the interior SIP phone and are assumed to be
   traversing the middlebox. Arrows 2,3, 6 and 7 below between the SIP
   proxy and the middlebox refer to MIDCOM communication.

8) Just for correctness, the 100Trying message should precede communication
with the middlebox in all the timeline flows (sections 7.1, 7.2 & 7.3) as
follows:

   SIP Phone      SIP Proxy              Middlebox      SIP Phone
   (External)     (MIDCOM                (FIREWALL      (private)
                   agent)                Service)          |
   |                 |                      |              |
   |----INVITE------>|                      |              |
   |                 |                      |              |
   |<---100Trying----|                      |              |
   |                 |                      |              |
   |                 |+++request to MB+++++>|              |
   |                 |<+response from MB++++|              |
   |                 |                      |              |
   |                 |--------INVITE---------------------->|
   |                 |                      |              |

The 100-Trying response will prevent the External SIP Phone from
re-transmitting the INVITE request when UDP is used.

9) Section 7.2 & 7.3: The "Modify SDP" for the BYE request and the 200-OK
response to the BYE (top of page 24, bottom of page 26 and middle of page
27) should be removed. These messages will not contain SDP.

10) section 9, 3rd para. s/MUST/must/. The framework should not use RFC-2119
requirements language.

11) Several of the items in the REFERENCES section are not explicitly
referenced in the document. H.323, RTSP, FTP, and TLS are mentioned, but
don't have a [] reference. IETF-STD, NAT-COMP, APPL-ID, RFC 1918, RFC 1700,
and REQMTS don't seem to be mentioned at all. Are these just suggested
reading or do they need to be referenced in the text? Also, REQMTS should be
referenced, but should be the latest copy of the requirements draft instead
of Scott's bullet list.

12) The document needs a copyright statement.

cheers,
(-:bob

Robert F. Penfield
Chief Software Architect
Acme Packet, Inc.
130 New Boston Street
Woburn, MA 01801
bpenfield@acmepacket.com



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 17:29:37 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07490
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 17:29:37 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id RAA28885
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 17:29:40 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28501;
	Mon, 26 Nov 2001 17:23:07 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28468
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 17:23:04 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA07014
	for <midcom@ietf.org>; Mon, 26 Nov 2001 17:23:00 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112622195116052
 ; Mon, 26 Nov 2001 22:19:51 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XQ21F5MG>; Mon, 26 Nov 2001 22:22:14 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639E92520@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: Ben Campbell <bcampbell@dynamicsoft.com>, midcom@ietf.org
Subject: RE: [midcom] pre-midcom - simplicity vs generality
Date: Mon, 26 Nov 2001 22:22:06 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C176C8.C7F08510"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C176C8.C7F08510
Content-Type: text/plain;
	charset="ISO-8859-1"

See below:

-----Original Message-----
From: Ben Campbell [mailto:bcampbell@dynamicsoft.com]
Sent: 26 November 2001 18:23
Cc: midcom@ietf.org
Subject: Simplicity vs. generality (was Re: [midcom] 2x allocate vs
FANTOM)


Rohan Mahy wrote:

[snip]

>> 
>> Understood.  This is another classic simplicity vs. functionality
tradeoff.
>> 

Ben Cringle then wrote:

> And there lies the crux of the problem. If the pre-midcom protocol is 
> expected to have a short lifespan, that is it will eventually be 
> supplanted by the real midcom protocol, then I would expect that we 
> would want to err on the side of simplicity.

FANTOM is not complex. It is unfamiliar. I've already explained that FANTOM
and TURN use identical concepts to solve the pre-midcom problem. The methods
that are in FANTOM are there for a reason. If you can show otherwise, we'll
take them out.

TURN is simple because it is unfinished. We have shown that TURN does not
handle RTP properly. A new element has to added. A method has to be devised
to stop NATs timing out and so on...

Not so long ago, SIP claimed to be simple. Look at it now. If the IETF were
just starting on a SIP-like protocol and SIP were submitted as it is today,
by this reasoning it would be dismissed as too complex. But the reason it is
large is to support the functionality it has to support, and the adoption of
such a proposal would say a lot of development effort and time to market.
The same is true of FANTOM.

Steve

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C176C8.C7F08510
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] pre-midcom - simplicity vs generality</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>See below:</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Ben Campbell [<A =
HREF=3D"mailto:bcampbell@dynamicsoft.com">mailto:bcampbell@dynamicsoft.c=
om</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 26 November 2001 18:23</FONT>
<BR><FONT SIZE=3D2>Cc: midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>Subject: Simplicity vs. generality (was Re: [midcom] =
2x allocate vs</FONT>
<BR><FONT SIZE=3D2>FANTOM)</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Rohan Mahy wrote:</FONT>
</P>

<P><FONT SIZE=3D2>[snip]</FONT>
</P>

<P><FONT SIZE=3D2>&gt;&gt; </FONT>
<BR><FONT SIZE=3D2>&gt;&gt; Understood.&nbsp; This is another classic =
simplicity vs. functionality tradeoff.</FONT>
<BR><FONT SIZE=3D2>&gt;&gt; </FONT>
</P>

<P><FONT SIZE=3D2>Ben Cringle then wrote:</FONT>
</P>

<P><FONT SIZE=3D2>&gt; And there lies the crux of the problem. If the =
pre-midcom protocol is </FONT>
<BR><FONT SIZE=3D2>&gt; expected to have a short lifespan, that is it =
will eventually be </FONT>
<BR><FONT SIZE=3D2>&gt; supplanted by the real midcom protocol, then I =
would expect that we </FONT>
<BR><FONT SIZE=3D2>&gt; would want to err on the side of =
simplicity.</FONT>
</P>

<P><FONT SIZE=3D2>FANTOM is not complex. It is unfamiliar. I've already =
explained that FANTOM and TURN use identical concepts to solve the =
pre-midcom problem. The methods that are in FANTOM are there for a =
reason. If you can show otherwise, we'll take them out.</FONT></P>

<P><FONT SIZE=3D2>TURN is simple because it is unfinished. We have =
shown that TURN does not handle RTP properly. A new element has to =
added. A method has to be devised to stop NATs timing out and so =
on...</FONT></P>

<P><FONT SIZE=3D2>Not so long ago, SIP claimed to be simple. Look at it =
now. If the IETF were just starting on a SIP-like protocol and SIP were =
submitted as it is today, by this reasoning it would be dismissed as =
too complex. But the reason it is large is to support the functionality =
it has to support, and the adoption of such a proposal would say a lot =
of development effort and time to market. The same is true of =
FANTOM.</FONT></P>

<P><FONT SIZE=3D2>Steve</FONT>
</P>

<P><FONT =
SIZE=3D2>_______________________________________________</FONT>
<BR><FONT SIZE=3D2>midcom mailing list</FONT>
<BR><FONT SIZE=3D2>midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://www1.ietf.org/mailman/listinfo/midcom" =
TARGET=3D"_blank">http://www1.ietf.org/mailman/listinfo/midcom</A></FONT=
>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C176C8.C7F08510--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 17:29:37 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07460
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 17:29:33 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id RAA28829
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 17:29:36 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28593;
	Mon, 26 Nov 2001 17:26:20 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28564
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 17:26:18 -0500 (EST)
Received: from protactinium.btinternet.com (protactinium.btinternet.com [194.73.73.176])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07198
	for <midcom@ietf.org>; Mon, 26 Nov 2001 17:26:14 -0500 (EST)
Received: from [213.122.126.53] (helo=tkw)
	by protactinium.btinternet.com with smtp (Exim 3.22 #8)
	id 168UCe-0002Bx-00; Mon, 26 Nov 2001 22:26:16 +0000
Message-ID: <00f201c176c9$2f3cc3a0$0200000a@tkw>
From: "Pete Cordell" <pete@tech-know-ware.com>
To: <midcom@ietf.org>, "Rohan Mahy" <rohan@cisco.com>
Cc: <rohan@cisco.com>
References: <4.2.0.58.20011126095518.0239aac0@lint.cisco.com>
Subject: Re: [midcom] 2x allocate vs FANTOM
Date: Mon, 26 Nov 2001 22:02:21 -0000
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

From: Rohan Mahy <rohan@cisco.com>

>  >If you use TURN to allocate two ports in one message, you need a way to
>  >associate the second port with the original allocation message.  In
FANTOM
>  >we do this by returning an identifier in the equivalent of the allocate
>  >response.  We then include that identifier in a probe (equivalent to the
>  >STUN request in Bob's suggestion) sent to the server.  This allows the
>  >server to do the association.
>  >
>  >With this method, the second port is effectively being set up using
>  >out-of-band signalling.
>
> This is incorrect.  A second TURN request would still send traffic from
and
> receive traffic on the same port it uses for an Allocate
> Request/Response.  You would just include an extra identifier in-band.
>

Please be more specific about how this would actually work.  If you are not
using the FANTOM approach, I can see lots of ways that it won't work, so
would like to see how you make it work.

>  >Having the second port requiring out-of-band signalling, removes any
benefit
>  >of having in-band signalling for the first port.
>
> see above.
>
>  >We have also found that
>  >there are many benefits to having an out-of-band signalling method.  For
>  >example, we are also able to explicitly close the forwarding operation.
The
>  >latter is a great comfort to a number of network administrators!
> [snip]
>
> Understood.  This is another classic simplicity vs. functionality
tradeoff.

Please see my response to Ben Campbell's e-mail for my view on this.

>
> thanks,
> -rohan
>

Pete.

=============================================
Pete Cordell
Tech-Know-Ware
pete@tech-know-ware.com
+44 1473 635863
=============================================





_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 17:29:39 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07475
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 17:29:35 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id RAA28866
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 17:29:38 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28464;
	Mon, 26 Nov 2001 17:23:04 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28436
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 17:23:00 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id RAA07011
	for <midcom@ietf.org>; Mon, 26 Nov 2001 17:22:56 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112622195100713
 ; Mon, 26 Nov 2001 22:19:51 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XQ21F5MH>; Mon, 26 Nov 2001 22:22:14 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639E9251F@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: Rohan Mahy <rohan@cisco.com>, midcom@ietf.org
Cc: pete@tech-know-ware.com
Subject: RE: [midcom] 2x allocate vs FANTOM
Date: Mon, 26 Nov 2001 22:22:05 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C176C8.C7616470"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C176C8.C7616470
Content-Type: text/plain;
	charset="ISO-8859-1"

Comments also inline...

-----Original Message-----
From: Rohan Mahy [mailto:rohan@cisco.com]
Sent: 26 November 2001 18:02
To: midcom@ietf.org
Cc: pete@tech-know-ware.com; rohan@cisco.com
Subject: [midcom] 2x allocate vs FANTOM


Pete Cordell wrote:

[snip]

 >> If you use TURN to allocate two ports in one message, you need a way to
 >> associate the second port with the original allocation message.  In
FANTOM
 >> we do this by returning an identifier in the equivalent of the allocate
 >> response.  We then include that identifier in a probe (equivalent to the
 >> STUN request in Bob's suggestion) sent to the server.  This allows the
 >> server to do the association.
 >>
 >> With this method, the second port is effectively being set up using
 >> out-of-band signalling.

To which Rohan Mahy replied:

>This is incorrect.  A second TURN request would still send traffic from and

>receive traffic on the same port it uses for an Allocate 
>Request/Response.  You would just include an extra identifier in-band.

This sounds remarkably like a FANTOM Probe packet! 

Steve

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

------_=_NextPart_001_01C176C8.C7616470
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] 2x allocate vs FANTOM</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Comments also inline...</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Rohan Mahy [<A =
HREF=3D"mailto:rohan@cisco.com">mailto:rohan@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 26 November 2001 18:02</FONT>
<BR><FONT SIZE=3D2>To: midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>Cc: pete@tech-know-ware.com; rohan@cisco.com</FONT>
<BR><FONT SIZE=3D2>Subject: [midcom] 2x allocate vs FANTOM</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Pete Cordell wrote:</FONT>
</P>

<P><FONT SIZE=3D2>[snip]</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&gt;&gt; If you use TURN to allocate two ports =
in one message, you need a way to</FONT>
<BR><FONT SIZE=3D2>&nbsp;&gt;&gt; associate the second port with the =
original allocation message.&nbsp; In FANTOM</FONT>
<BR><FONT SIZE=3D2>&nbsp;&gt;&gt; we do this by returning an identifier =
in the equivalent of the allocate</FONT>
<BR><FONT SIZE=3D2>&nbsp;&gt;&gt; response.&nbsp; We then include that =
identifier in a probe (equivalent to the</FONT>
<BR><FONT SIZE=3D2>&nbsp;&gt;&gt; STUN request in Bob's suggestion) =
sent to the server.&nbsp; This allows the</FONT>
<BR><FONT SIZE=3D2>&nbsp;&gt;&gt; server to do the association.</FONT>
<BR><FONT SIZE=3D2>&nbsp;&gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&nbsp;&gt;&gt; With this method, the second port is =
effectively being set up using</FONT>
<BR><FONT SIZE=3D2>&nbsp;&gt;&gt; out-of-band signalling.</FONT>
</P>

<P><FONT SIZE=3D2>To which Rohan Mahy replied:</FONT>
</P>

<P><FONT SIZE=3D2>&gt;This is incorrect.&nbsp; A second TURN request =
would still send traffic from and </FONT>
<BR><FONT SIZE=3D2>&gt;receive traffic on the same port it uses for an =
Allocate </FONT>
<BR><FONT SIZE=3D2>&gt;Request/Response.&nbsp; You would just include =
an extra identifier in-band.</FONT>
</P>

<P><FONT SIZE=3D2>This sounds remarkably like a FANTOM Probe packet! =
</FONT>
</P>

<P><FONT SIZE=3D2>Steve</FONT>
</P>

<P><FONT =
SIZE=3D2>_______________________________________________</FONT>
<BR><FONT SIZE=3D2>midcom mailing list</FONT>
<BR><FONT SIZE=3D2>midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://www1.ietf.org/mailman/listinfo/midcom" =
TARGET=3D"_blank">http://www1.ietf.org/mailman/listinfo/midcom</A></FONT=
>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C176C8.C7616470--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 17:29:58 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07577
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 17:29:58 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id RAA28930
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 17:30:01 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28762;
	Mon, 26 Nov 2001 17:28:31 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28726
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 17:28:29 -0500 (EST)
Received: from protactinium.btinternet.com (protactinium.btinternet.com [194.73.73.176])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07374
	for <midcom@ietf.org>; Mon, 26 Nov 2001 17:28:24 -0500 (EST)
Received: from [213.122.126.53] (helo=tkw)
	by protactinium.btinternet.com with smtp (Exim 3.22 #8)
	id 168UCf-0002Bx-00; Mon, 26 Nov 2001 22:26:18 +0000
Message-ID: <00f301c176c9$304029e0$0200000a@tkw>
From: "Pete Cordell" <pete@tech-know-ware.com>
To: "Ben Campbell" <bcampbell@dynamicsoft.com>
Cc: <midcom@ietf.org>, <rohan@cisco.com>
References: <4.2.0.58.20011126095518.0239aac0@lint.cisco.com> <3C02886A.2080800@dynamicsoft.com>
Subject: Re: Simplicity vs. generality (was Re: [midcom] 2x allocate vs FANTOM)
Date: Mon, 26 Nov 2001 22:13:29 -0000
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Ben (and Rohan),

I think we are getting overly seduced by this complexity debate.

For a start, complexity should never be considered purely in relative terms.

If solution A requires 5 minutes to implement and solution B requires 10
minutes to implement, that does not make A better than B even though it is
half the complexity of the other.

On the other hand, if solution A takes 6 months to implement, and solution B
takes 9 months, this is a strong case for implementing solution A, even
though B is less than twice as complex as A.

We also need to be careful about how we decide how complex something is.  In
this case the superficial approach of comparing the number of messages is
not a good guide.  Both proposals will require underlying structure to
implement the actual forwarding (receive packet, decide whether to allow it,
send it out etc.) that will look much the same for both.  Both will require
the capability to create such a forwarding instance, link it in with all the
other data structures, and how to delete it.  And they will both have to
learn where to forward data to on the public side.  The messaging aspect of
this is likely to be only a small percentage of the overall solution.

As a finger in the air figure (I hope that's not impolite in the States!) I
estimate that both TURN and FANTOM protocols themselves would take about a
week or two to implement.  When you add on code for configuration,
monitoring, and installation, then add documentation, system testing....
And if you are implementing a proxy based solution you will either have to
do SIP or H.323....  Well, you'll soon find that the actual FANTOM or TURN
parts are pretty miniscule.

So I think the relative complexity of FANTOM and TURN is not an issue.  In
that case I would go for the flexibility, and broader applicability that
FANTOM offers.

Pete.

=============================================
Pete Cordell
Tech-Know-Ware
pete@tech-know-ware.com
+44 1473 635863
=============================================

----- Original Message -----
From: Ben Campbell <bcampbell@dynamicsoft.com>
Cc: <midcom@ietf.org>
Sent: 26 November 2001 18:22
Subject: Simplicity vs. generality (was Re: [midcom] 2x allocate vs FANTOM)


>
>
> Rohan Mahy wrote:
>
> [snip]
>
> >
> > Understood.  This is another classic simplicity vs. functionality
tradeoff.
> >
>
> And there lies the crux of the problem. If the pre-midcom protocol is
> expected to have a short lifespan, that is it will eventually be
> supplanted by the real midcom protocol, then I would expect that we
> would want to err on the side of simplicity.
>
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 17:29:59 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07573
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 17:29:58 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id RAA28920
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 17:30:01 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28794;
	Mon, 26 Nov 2001 17:28:34 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28740
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 17:28:30 -0500 (EST)
Received: from protactinium.btinternet.com (protactinium.btinternet.com [194.73.73.176])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07377
	for <midcom@ietf.org>; Mon, 26 Nov 2001 17:28:25 -0500 (EST)
Received: from [213.122.126.53] (helo=tkw)
	by protactinium.btinternet.com with smtp (Exim 3.22 #8)
	id 168UCh-0002Bx-00; Mon, 26 Nov 2001 22:26:20 +0000
Message-ID: <00f401c176c9$315d80c0$0200000a@tkw>
From: "Pete Cordell" <pete@tech-know-ware.com>
To: "Mark Taylor" <m_taylorus@yahoo.com>,
        "Jonathan Rosenberg" <jdrosen@dynamicsoft.com>, <midcom@ietf.org>
References: <20011125133632.72754.qmail@web14107.mail.yahoo.com>
Subject: Re: [midcom] STUN/TURN vs Davies (FANTOM)
Date: Mon, 26 Nov 2001 22:14:22 -0000
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Mark,

Thanks for raising the security issues.  This is an important subject to us,
and one of the main reasons for getting peer review of FANTOM in the IETF.

(Mind you, security is not the only reason we think FANTOM has more to offer
than TURN - The RTP/RTCP port relationship issue is not security related.
On the other hand, being able to explicitly close a media session is.)

As for what firewalls can do, all we require from the firewall is a few
simple filtering rules.  A firewall that doesn't do that is called a
router!!!  Security is also addressed in a few other ways.

It's hard to address the issues your security specialist perceived without
concrete examples.  I would therefore welcome you enumerating these to
further the discussion.  We can then decide whether they are already
addressed by the protocol, are not important, or the protocol needs
modifying.

Pete.

=============================================
Pete Cordell
Tech-Know-Ware
pete@tech-know-ware.com
+44 1473 635863
=============================================

----- Original Message -----
From: Mark Taylor <m_taylorus@yahoo.com>
To: Jonathan Rosenberg <jdrosen@dynamicsoft.com>; <midcom@ietf.org>
Sent: 25 November 2001 13:36
Subject: [midcom] STUN/TURN vs Davies (FANTOM)


> STUN/TURN and the Davies (FANTOM) proposals are
> marked by different emphaisises in achieving the same
> objective.
>
> STUN/TURN emphasizes simplicity. Davies emphasizes
> security with its addressing of firewall issues. The
> other differences between the protocols seem only to
> be variations on a theme and not consequential to the
> overall problem.
>
> I asked a security specialist about the Davies
> proposal's firewall claims. He found them to be
> unconvincing with the observation that many people
> have inflated ideas about what firewalls can do.
>
> If the Davies firewall strategy is, as with this view,
> ineffective, it only adds complexity and cost without
> providing real benefit. STUN/TURN will provide the
> same level of security with a simpler and less costly
> proposal.
>
> Is this view correct?
>
> __________________________________________________
> Do You Yahoo!?
> Yahoo! GeoCities - quick and easy web site hosting, just $8.95/month.
> http://geocities.yahoo.com/ps/info1
>
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 17:33:22 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07825
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 17:33:22 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id RAA29400
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 17:33:26 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28683;
	Mon, 26 Nov 2001 17:26:28 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA28604
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 17:26:23 -0500 (EST)
Received: from protactinium.btinternet.com (protactinium.btinternet.com [194.73.73.176])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA07206
	for <midcom@ietf.org>; Mon, 26 Nov 2001 17:26:18 -0500 (EST)
Received: from [213.122.126.53] (helo=tkw)
	by protactinium.btinternet.com with smtp (Exim 3.22 #8)
	id 168UCj-0002Bx-00; Mon, 26 Nov 2001 22:26:21 +0000
Message-ID: <00f501c176c9$323f5540$0200000a@tkw>
From: "Pete Cordell" <pete@tech-know-ware.com>
To: <midcom@ietf.org>, "Rohan Mahy" <rohan@cisco.com>
References: <4.2.0.58.20011126093005.023975d0@lint.cisco.com>
Subject: Re: [midcom] client vs. proxy traversal
Date: Mon, 26 Nov 2001 22:21:42 -0000
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.00.2314.1300
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Rohan,

comments in-line...

From: Rohan Mahy <rohan@cisco.com>
>
> As Melinda stated, our focus for pre-midcom is NAT traversal, not firewall
> traversal.  TURN takes advantantage of the "symmetric UDP" behavior of
NATs
> to allow one end to talk to another without *control* of an intermediary.
>

Surely the TURN server is an intermediary which is being controlled by the
TURN protocol!

And I still think we're wasting our time if we don't consider firewalls as
well!

> The fact that many firewalls also exhibit "symmetric UDP" behavior is just
> an added bonus.
>
>  >What it does mean though is
>  >that the firewall is able to allow packets to/from the application proxy
>  >to pass through that it might not otherwise allow from clients.
>
> If the firewall administrator is willing to do this, it shouldn't be hard
> to allow symmetric UDP with a timeout.
>

That is the crux of the matter - what the administrator is prepared to
allow.  There is a wide range of firewall policy around the place.  Some
will not even allow web browsing, restrict it to certain times, or insist it
goes via a particular proxy.  This is all part of the power that
administrators wield!  A solution that does not allow an administrator to
wield their power over other protocols will not be as successul as one that
does.

Or put another way, the IETF should minimise the impact on the policies an
administrator can implement on their firewall when endorsing a solution in
this space.

It is therefore important to consider outbound as well as inbound
connections.

>  >It can do this in
>  >the knowledge that the Application Proxy is forwarding only one
>  >particular protocol, and the Application Proxy can also do all sorts of
>  >other
>  >stateful inspection exercises in order to check that things are as they
>  >should
>  >be.
>
> I think the market will decide if they want this functionality vs. the
> complexity that it adds.  Probably not a single market here.
>

I have a different take on the complexity issue which I shall address
elsewhere (since some Ben Campbell has kindly started up a suitable thread).

>  >It's much like adding an ALG to the firewall and NAT, except that in
this
>  >case it is located external to them.  As such it complements the
firewall /
>  >NAT functionality, but does not require the firewall / NAT itself to be
>  >upgraded.  Therefore it can be quickly deployed, and is an ideal
approach
>  >for a pre-midcom solution.
>  >
>  >On the other hand, if you deploy TURN or FANTOM on the clients, the
>  >administrator has no way of knowing what they will be used for.  For a
>  >number of environments this will not be acceptable, and won't lead to
the
>  >deployment of desktop VoIP.
>
> I disagree.  This is not new support that has to be added in most
> cases.  Many firewalls are *already configured* to allow symmetric
> UDP.  Users behind these firewalls take advantage of streaming content and
> other UDP applications today.  Apparently this is OK with the
> administrators.  I believe a TURN-style solution for peer-to-peer RTP
would
> be acceptable to them as well.
>

We might have to agree to disagree on that!!!

> thanks,
> -rohan
>

Pete.

=============================================
Pete Cordell
Tech-Know-Ware
pete@tech-know-ware.com
+44 1473 635863
=============================================




_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 19:36:54 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA16323
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 19:36:52 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id TAA02488
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 19:36:55 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA02456;
	Mon, 26 Nov 2001 19:34:39 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA02425
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 19:34:37 -0500 (EST)
Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA16195
	for <midcom@ietf.org>; Mon, 26 Nov 2001 19:34:33 -0500 (EST)
Received: from imop.cisco.com (imop.cisco.com [171.69.11.44])
	by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fAR0XtH05824;
	Mon, 26 Nov 2001 16:33:59 -0800 (PST)
Received: from rmahy-home-nt (ssh-sj1.cisco.com [171.68.225.134])
	by imop.cisco.com (Mirapoint)
	with ESMTP id ACC04966;
	Mon, 26 Nov 2001 16:33:49 -0800 (PST)
Message-Id: <4.2.0.58.20011126160322.01ed2350@lint.cisco.com>
X-Sender: rmahy@imop.cisco.com (Unverified)
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.0.58 
Date: Mon, 26 Nov 2001 16:14:31 -0800
To: "Pete Cordell" <pete@tech-know-ware.com>
From: Rohan Mahy <rohan@cisco.com>
Subject: Re: [midcom] client vs. proxy traversal
Cc: <midcom@ietf.org>
In-Reply-To: <00f501c176c9$323f5540$0200000a@tkw>
References: <4.2.0.58.20011126093005.023975d0@lint.cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 02:21 PM 11/26/01 , Pete Cordell wrote:
>Rohan,
>
>comments in-line...
>
>From: Rohan Mahy <rohan@cisco.com>
> >
> > As Melinda stated, our focus for pre-midcom is NAT traversal, not firewall
> > traversal.  TURN takes advantantage of the "symmetric UDP" behavior of
>NATs
> > to allow one end to talk to another without *control* of an intermediary.
> >
>
>Surely the TURN server is an intermediary which is being controlled by the
>TURN protocol!

My point is that the end systems are in control.  The TURN server does not 
control the endpoints.  Perhaps I should rephrase my previous sentence.

"... to allow one end to talk to another without control *BY* an intermediary."

>And I still think we're wasting our time if we don't consider firewalls as
>well!

Feel free to take this issue up with the Area Directors then.

> > The fact that many firewalls also exhibit "symmetric UDP" behavior is just
> > an added bonus.
> >
> >  >What it does mean though is
> >  >that the firewall is able to allow packets to/from the application proxy
> >  >to pass through that it might not otherwise allow from clients.
> >
> > If the firewall administrator is willing to do this, it shouldn't be hard
> > to allow symmetric UDP with a timeout.
> >
>
>That is the crux of the matter - what the administrator is prepared to
>allow.  There is a wide range of firewall policy around the place.  Some
>will not even allow web browsing, restrict it to certain times, or insist it
>goes via a particular proxy.  This is all part of the power that
>administrators wield!  A solution that does not allow an administrator to
>wield their power over other protocols will not be as successul as one that
>does.

IMO the level of complexity and control that you are describing, while a 
siutable candidate for a midcom-style protocol, is not the goal of the 
pre-midcom protocol.

thanks,
-rohan

>Or put another way, the IETF should minimise the impact on the policies an
>administrator can implement on their firewall when endorsing a solution in
>this space.
>
>It is therefore important to consider outbound as well as inbound
>connections.
>
> >  >It can do this in
> >  >the knowledge that the Application Proxy is forwarding only one
> >  >particular protocol, and the Application Proxy can also do all sorts of
> >  >other
> >  >stateful inspection exercises in order to check that things are as they
> >  >should
> >  >be.
> >
> > I think the market will decide if they want this functionality vs. the
> > complexity that it adds.  Probably not a single market here.
> >
>
>I have a different take on the complexity issue which I shall address
>elsewhere (since some Ben Campbell has kindly started up a suitable thread).
>
> >  >It's much like adding an ALG to the firewall and NAT, except that in
>this
> >  >case it is located external to them.  As such it complements the
>firewall /
> >  >NAT functionality, but does not require the firewall / NAT itself to be
> >  >upgraded.  Therefore it can be quickly deployed, and is an ideal
>approach
> >  >for a pre-midcom solution.
> >  >
> >  >On the other hand, if you deploy TURN or FANTOM on the clients, the
> >  >administrator has no way of knowing what they will be used for.  For a
> >  >number of environments this will not be acceptable, and won't lead to
>the
> >  >deployment of desktop VoIP.
> >
> > I disagree.  This is not new support that has to be added in most
> > cases.  Many firewalls are *already configured* to allow symmetric
> > UDP.  Users behind these firewalls take advantage of streaming content and
> > other UDP applications today.  Apparently this is OK with the
> > administrators.  I believe a TURN-style solution for peer-to-peer RTP
>would
> > be acceptable to them as well.
> >
>
>We might have to agree to disagree on that!!!
>
> > thanks,
> > -rohan
> >
>
>Pete.
>
>=============================================
>Pete Cordell
>Tech-Know-Ware
>pete@tech-know-ware.com
>+44 1473 635863
>=============================================
>
>


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Mon Nov 26 21:24:52 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA20066
	for <midcom-archive@odin.ietf.org>; Mon, 26 Nov 2001 21:24:52 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id VAA05437
	for midcom-archive@odin.ietf.org; Mon, 26 Nov 2001 21:24:56 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA05389;
	Mon, 26 Nov 2001 21:23:00 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA05362
	for <midcom@optimus.ietf.org>; Mon, 26 Nov 2001 21:22:58 -0500 (EST)
Received: from localhost.localdomain (dsl081-118-200.dfw1.dsl.speakeasy.net [64.81.118.200])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA20022
	for <midcom@ietf.org>; Mon, 26 Nov 2001 21:22:53 -0500 (EST)
Received: from dynamicsoft.com (rocinante [127.0.0.1])
	by localhost.localdomain (8.11.6/8.11.6) with ESMTP id fAR2JPs13380;
	Mon, 26 Nov 2001 20:19:26 -0600
Message-ID: <3C02F82D.109@dynamicsoft.com>
Date: Mon, 26 Nov 2001 20:19:25 -0600
From: Ben Campbell <bcampbell@dynamicsoft.com>
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.5+) Gecko/20011115
X-Accept-Language: en-us
MIME-Version: 1.0
To: Steve Davies <sdavies@ridgewaysystems.com>
CC: midcom@ietf.org
Subject: Re: [midcom] pre-midcom - simplicity vs generality
References: <00533D13955AD411AF3800A0C9B42639E92520@ThisAddressDoesNotExist>
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Ben Cringle? :-)

But to the meat of the matter--My apologies;I was being flip and did not 
exactly express what I was attempting to express.

I was not arguing about the relative complexity of two different ways of 
accomplishing "A". Rather, I was arguing about the complexity of 
accomplishing A, B, and C, when perhaps only A is required.

It seems to me that the primary argument in favor of FANTOM is that it 
does more than STUN/TURN. But it seems we do not have consensus on how 
much is enough. The argument that FANTOM is only a little more complex, 
and also does B and C, is not useful if the requirements are limited to A.

If we were talking about the midcom protocol itself, then it might make 
sense to add more generality than explicitly required, if it were cheap 
to do so. But for a protocol designed to solve a problem that should in 
itself go away eventually (otherwise we have failed at midcom), I think 
it makes less sense.

As for the primary in STUN/TURN you mention in this note: Bob Penfield 
pointed out that the original STUN draft does address NAT binding 
keep-alives, and the RTCP issue can be fixed with a very minor addition 
to TURN.

I have seen firewall traversal, explict closure of forwarding, and 
extensibility listed as advantages of FANTOM. I have not seen any 
general agreement that they are requirements for the pre-midcom protocol.




Steve Davies wrote:

> See below:
> 
> -----Original Message-----
> From: Ben Campbell [mailto:bcampbell@dynamicsoft.com]
> Sent: 26 November 2001 18:23
> Cc: midcom@ietf.org
> Subject: Simplicity vs. generality (was Re: [midcom] 2x allocate vs
> FANTOM)
> 
> 
> Rohan Mahy wrote:
> 
> [snip]
> 
>  >>
>  >> Understood.  This is another classic simplicity vs. functionality 
> tradeoff.
>  >>
> 
> Ben Cringle then wrote:
> 
>  > And there lies the crux of the problem. If the pre-midcom protocol is
>  > expected to have a short lifespan, that is it will eventually be
>  > supplanted by the real midcom protocol, then I would expect that we
>  > would want to err on the side of simplicity.
> 
> FANTOM is not complex. It is unfamiliar. I've already explained that 
> FANTOM and TURN use identical concepts to solve the pre-midcom problem. 
> The methods that are in FANTOM are there for a reason. If you can show 
> otherwise, we'll take them out.
> 
> TURN is simple because it is unfinished. We have shown that TURN does 
> not handle RTP properly. A new element has to added. A method has to be 
> devised to stop NATs timing out and so on...
> 
> Not so long ago, SIP claimed to be simple. Look at it now. If the IETF 
> were just starting on a SIP-like protocol and SIP were submitted as it 
> is today, by this reasoning it would be dismissed as too complex. But 
> the reason it is large is to support the functionality it has to 
> support, and the adoption of such a proposal would say a lot of 
> development effort and time to market. The same is true of FANTOM.
> 
> Steve
> 
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
> 



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 27 06:17:01 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA19600
	for <midcom-archive@odin.ietf.org>; Tue, 27 Nov 2001 06:17:01 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id GAA27346
	for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 06:17:02 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id GAA27284;
	Tue, 27 Nov 2001 06:15:08 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id GAA27255
	for <midcom@optimus.ietf.org>; Tue, 27 Nov 2001 06:15:06 -0500 (EST)
Received: from malmo.trab.se (malmo.kicore.net [131.115.48.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA19525
	for <midcom@ietf.org>; Tue, 27 Nov 2001 06:15:02 -0500 (EST)
Received: from trab-hermes.haninge.trab.se (trab-hermes.haninge.trab.se [131.115.158.15]) by malmo.trab.se (8.10.1/TRAB-primary-2) with ESMTP id fARBDBA25194 for <midcom@ietf.org>; Tue, 27 Nov 2001 12:13:11 +0100 (MET)
Received: by trab-hermes.haninge.trab.se with Internet Mail Service (5.5.2650.21)
	id <VCLPX6K0>; Tue, 27 Nov 2001 12:15:03 +0100
Message-ID: <778DFE9B4E3BD111A74E08002BA3DC0D04D8C666@trab-hermes.haninge.trab.se>
From: =?ISO-8859-1?Q?Morgan_St=E5hl?= <Morgan.A.Stahl@telia.se>
To: "'midcom@ietf.org'" <midcom@ietf.org>
Date: Tue, 27 Nov 2001 12:15:02 +0100
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="ISO-8859-1"
Subject: [midcom] Midcom questions
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Hi, I'm a computer science student from Sweden, and I had some questions
about midcom that I was hoping someone could answer or redirect me to places
where I could find answers.

I was wondering about the midcom protocol for the communication between the
middlebox and the midcom agent.
When will we see a draft for this protocol, and how much is the protocol
suppose to able to  control the middlebox, will the protocol be able to
perform some configuration of the middlebox or will it just be able to run
services on the middlebox?
(I got the feeling from the architecture that the protocol needs to be able
to configure the middlebox functionality to for example permit RTP flow
through a firewall)
Is there any beta products (firewalls or NATs) who implements the midcom
protocol, and thus can be "configured" by an agent? The reason I ask is
because we're working on a project which will produce a GUI for the user to
configure his NAT firewall through, to use midcoms protocol for configure
the firewall would please our tutor :).


Grateful for any response

Regards Morgan
-----------------------------------
I'm an pathological liar and can't be held responsible for anything I write

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 27 06:56:38 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA21341
	for <midcom-archive@odin.ietf.org>; Tue, 27 Nov 2001 06:56:38 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id GAA28643
	for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 06:56:39 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id GAA28515;
	Tue, 27 Nov 2001 06:50:07 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id GAA28485
	for <midcom@optimus.ietf.org>; Tue, 27 Nov 2001 06:50:05 -0500 (EST)
Received: from znsgs0ja.europe.nortel.com (h69s129a211n47.user.nortelnetworks.com [47.211.129.69])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA21007
	for <midcom@ietf.org>; Tue, 27 Nov 2001 06:49:54 -0500 (EST)
Received: from qnsgs000.nortel.com (znsgs016 [47.255.64.31])
	by znsgs0ja.europe.nortel.com (8.11.0/8.11.0) with ESMTP id fARBnCB23528
	for <midcom@ietf.org>; Tue, 27 Nov 2001 11:49:12 GMT
Received: from zwcwc012.europe.nortel.com by znsgs016;
          Tue, 27 Nov 2001 11:49:06 +0000
Received: by zwcwc012.europe.nortel.com 
          with Internet Mail Service (5.5.2653.19) id <XVGH7GH4>;
          Tue, 27 Nov 2001 11:48:02 -0000
Message-ID: <C76021BAF2A6D5119DE500508BCF455215F19E@zctfc004.europe.nortel.com>
From: "Cedric Aoun" <CEDRIC.AOUN@nortelnetworks.com>
To: "Midcom IETF (E-mail)" <midcom@ietf.org>,
        "Suresh (E-mail)" <srisuresh@yahoo.com>
Date: Tue, 27 Nov 2001 11:47:53 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
              boundary="----_=_NextPart_001_01C17739.59485B80"
Subject: [midcom] comments on Framework 05 draft
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C17739.59485B80
Content-Type: text/plain;
	charset="iso-8859-1"

Hi
Here are some comments on the draft, not yet discussed on the list. Most of
them are minor comments.
 I tried to avoid overlapping with Bob's comments.

section 1, page 2 line 34: "Nonetheless, the middlebox framework".
need to replace middlebox with MIDCOM.

section 1, page 3 line 29: "Section 4 describes the nature of MID COM
protocol"
typo error. should be MIDCOM

section 3, page 9 in figure 1:
"session-descriptor". It should be replaced by ruleset?

section 3, page 9 and 10:
"A session may be uniquely described by the tuple of (SessionDirection,
   SourceAddress, DestinationAddress, Protocol, SourcePort,
   DestinationPort).... a session-state may be created by the firewall
function, but
   terminated by the NAT function, when a session timer expires. "
This is from the "pre-ruleset era", it should be taken out

section 6.2, page 16 line 44:
"However, it is possible to retain the provisioning on middlebox unchanged,
by requiring MIDCOM
   agents to initiate the session to middlebox."
I think it should be something like: The Middlebox provisioning could remain
unchanged if the middlebox gets it's Midcom  agents' policies from a policy
server.

section 7.0, page 17 line 11  "we consider SIP application (Refer [SIP])to
illustrate the operation of MIDCOM protocol". Typo error forgot the "the"
should be "the MIDCOM protocol"
section 7.0, page 17 line 13: "Middlebox is assumed", typo error should be :
The middlebox.

section 7.2 and 7.3, all section.
NAT session descriptors, SIP session descriptors mentioned several times.
Terminology should be consistent with section 2.
the ruleset terminology should be used instead.

Thanks
Cedric
   


Cedric Aoun
Nortel Networks
France
mailto:cedric.aoun@nortelnetworks.com



------_=_NextPart_001_01C17739.59485B80
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2654.89">
<TITLE>comments on Framework 05 draft</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2 FACE=3D"Arial">Hi</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">Here are some comments on the draft, =
not yet discussed on the list. Most of them are minor comments.</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">&nbsp;I tried to avoid overlapping =
with Bob's comments.</FONT>
</P>

<P><FONT SIZE=3D2 FACE=3D"Arial">section 1, page 2 line 34: =
&quot;</FONT><FONT SIZE=3D2 FACE=3D"Arial">Nonetheless, the middlebox =
framework&quot;.</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">need to replace middlebox with =
MIDCOM.</FONT>
</P>

<P><FONT SIZE=3D2 FACE=3D"Arial">section 1, page 3 line 29: =
&quot;Section 4 describes the nature of MID COM protocol&quot;</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">typo error. should be MIDCOM</FONT>
</P>

<P><FONT SIZE=3D2 FACE=3D"Arial">section 3, page 9 in figure 1:</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">&quot;session-descriptor&quot;. It =
should be replaced by ruleset?</FONT>
</P>

<P><FONT SIZE=3D2 FACE=3D"Arial">section 3, page 9 and 10:</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Courier New">&quot;A session may be uniquely =
described by the tuple of (SessionDirection,</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Courier New">&nbsp;&nbsp; SourceAddress, =
DestinationAddress, Protocol, SourcePort,</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Courier New">&nbsp;&nbsp; =
DestinationPort).... a session-state may be created by the firewall =
function, but</FONT>
<BR><FONT FACE=3D"Times New Roman">&nbsp;&nbsp; terminated by the NAT =
function, when a session timer expires. &quot;</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">This is from the &quot;pre-ruleset =
era&quot;, it should be taken out</FONT>
</P>

<P><FONT SIZE=3D2 FACE=3D"Arial">section 6.2, page 16 line 44:</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Courier New">&quot;However, it is possible =
to retain the provisioning on middlebox unchanged, by requiring =
MIDCOM</FONT>
<BR><FONT FACE=3D"Times New Roman">&nbsp;&nbsp; agents to initiate the =
session to middlebox.&quot;</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">I think it should be something like: =
The Middlebox provisioning could remain unchanged if the middlebox gets =
it's Midcom&nbsp; agents' policies from a policy server.</FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">section 7.0, page 17 line =
11&nbsp;</FONT> <FONT SIZE=3D2 FACE=3D"Courier New">&quot;we consider =
SIP application (Refer [SIP])to</FONT><FONT FACE=3D"Times New Roman"> =
illustrate the operation of MIDCOM protocol&quot;.</FONT> <FONT =
SIZE=3D2 FACE=3D"Arial">Typo error forgot the &quot;the&quot; should be =
&quot;the MIDCOM protocol&quot;</FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">section 7.0, page 17 line 13: =
&quot;</FONT><FONT FACE=3D"Times New Roman">Middlebox is =
assumed&quot;,</FONT> <FONT SIZE=3D2 FACE=3D"Arial">typo error should =
be : The middlebox.</FONT>
</P>

<P><FONT SIZE=3D2 FACE=3D"Arial">section 7.2 and 7.3, all =
section.</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">NAT session descriptors, SIP session =
descriptors mentioned several times. Terminology should be consistent =
with section 2.</FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">the ruleset terminology should be used =
instead.</FONT>
</P>

<P><FONT SIZE=3D2 FACE=3D"Arial">Thanks</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">Cedric</FONT>
<BR><FONT FACE=3D"Times New Roman">&nbsp;</FONT>&nbsp;<FONT SIZE=3D2 =
FACE=3D"Arial"> </FONT>
</P>
<BR>

<P><FONT SIZE=3D2 FACE=3D"Arial">Cedric Aoun</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">Nortel Networks</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">France</FONT>
<BR><U><FONT COLOR=3D"#0000FF" FACE=3D"Times New Roman"><A =
HREF=3D"mailto:cedric.aoun@nortelnetworks.com">mailto:cedric.aoun@nortel=
networks.com</A></FONT></U>
</P>
<BR>

</BODY>
</HTML>
------_=_NextPart_001_01C17739.59485B80--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 27 13:22:44 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA15214
	for <midcom-archive@odin.ietf.org>; Tue, 27 Nov 2001 13:22:44 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id NAA11138
	for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 13:22:45 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA11111;
	Tue, 27 Nov 2001 13:20:40 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id NAA11080
	for <midcom@optimus.ietf.org>; Tue, 27 Nov 2001 13:20:33 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id NAA15071
	for <midcom@ietf.org>; Tue, 27 Nov 2001 13:20:30 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112718172329200
 ; Tue, 27 Nov 2001 18:17:23 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XQ21F6JN>; Tue, 27 Nov 2001 18:19:36 -0000
Message-ID: <00533D13955AD411AF3800A0C9B426391724A5@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'jdrosen@dynamicsoft.com'" <jdrosen@dynamicsoft.com>,
        "'rohan@cisco.com'" <rohan@cisco.com>,
        "'Christian Huitema'"<huitema@windows.microsoft.com>,
        "'jweinberger@dynamicsoft.com'" <jweinberger@dynamicsoft.com>
Cc: midcom@ietf.org
Subject: [midcom] pre-midcom - How does TURN work?
Date: Tue, 27 Nov 2001 18:19:28 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C17770.0D2B0450"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C17770.0D2B0450
Content-Type: text/plain;
	charset="ISO-8859-1"

Jonathan, Joel, Christian and Rohan,

Please explain how you expect the following to work within TURN: 

* How does a client register with a central registrar behind the TURN
server. The ALLOCATE method obtains a public transport address to represent
the client, but how does the registration request get forwarded from the
TURN server to the central registrar?

* When a call exists between 2 clients that are behind 2 different TURN
servers, there appears to be a media deadlock. It appears from the
description, that both TURN servers are waiting for the other to send them
media before each of them knows where to send media to. Is this
interpretation correct?

* What is your solution for RTP port pairing? 

* How do you expect to prevent NATs from timing out on both the 'in-bound
signaling' connection and for media in the presence of silence suppression? 

It would also really be nice to see the detail of a proper call flow - SIP
or H.323 will suffice. Until we see how TURN is expected to work it is
difficult to make a like-for-like comparison with FANTOM and have a proper
debate on the pros and cons of various methods.

Thanks. 

Steve 


------_=_NextPart_001_01C17770.0D2B0450
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>[midcom] pre-midcom - How does TURN work?</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Jonathan, Joel, Christian and Rohan,</FONT>
</P>

<P><FONT SIZE=3D2>Please explain how you expect the following to work =
within TURN: </FONT>
</P>

<P><FONT SIZE=3D2>* How does a client register with a central registrar =
behind the TURN server. The ALLOCATE method obtains a public transport =
address to represent the client, but how does the registration request =
get forwarded from the TURN server to the central registrar?</FONT></P>

<P><FONT SIZE=3D2>* When a call exists between 2 clients that are =
behind 2 different TURN servers, there appears to be a media deadlock. =
It appears from the description, that both TURN servers are waiting for =
the other to send them media before each of them knows where to send =
media to. Is this interpretation correct?</FONT></P>

<P><FONT SIZE=3D2>* What is your solution for RTP port pairing? </FONT>
</P>

<P><FONT SIZE=3D2>* How do you expect to prevent NATs from timing out =
on both the 'in-bound signaling' connection and for media in the =
presence of silence suppression? </FONT></P>

<P><FONT SIZE=3D2>It would also really be nice to see the detail of a =
proper call flow - SIP or H.323 will suffice. Until we see how TURN is =
expected to work it is difficult to make a like-for-like comparison =
with FANTOM and have a proper debate on the pros and cons of various =
methods.</FONT></P>

<P><FONT SIZE=3D2>Thanks. </FONT>
</P>

<P><FONT SIZE=3D2>Steve </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C17770.0D2B0450--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 27 15:00:51 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA22291
	for <midcom-archive@odin.ietf.org>; Tue, 27 Nov 2001 15:00:51 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA14406
	for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 15:00:53 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA14010;
	Tue, 27 Nov 2001 14:51:10 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA13981
	for <midcom@optimus.ietf.org>; Tue, 27 Nov 2001 14:51:07 -0500 (EST)
Received: from radvpost.us.radvision.com ([38.150.216.6])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA21724
	for <midcom@ietf.org>; Tue, 27 Nov 2001 14:51:04 -0500 (EST)
Received: by RADVPOST with Internet Mail Service (5.5.2650.21)
	id <X13121XB>; Tue, 27 Nov 2001 14:49:58 -0500
Message-ID: <0D5BBF5D638DD4119E3400508BD949459ED6CA@RADVPOST>
From: Orit Levin <orit@radvision.com>
To: "'Christian Huitema'" <huitema@windows.microsoft.com>,
        Ben Campbell
	 <bcampbell@dynamicsoft.com>
Cc: midcom@ietf.org
Date: Tue, 27 Nov 2001 14:49:57 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain;
	charset="iso-8859-1"
Subject: [midcom] The pre-MidCom Agenda (was: Simplicity vs. generality)
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

I definitely think that for different cases different solutions should be
used. Also, I like very much the idea of having different servers being
deployed and the ability to discover them using the SRV records.
Because of the complexity and the variety of both the problems and the
solutions, not all of the evolving solutions (i.e. various SIP/SDP
extensions, RTP modifications, etc.) would comply with the pre-MidCom
agenda. In my mind, a candidate for the "temporary" and easy deployable
pre-MidCom protocol shall comply with the following:
1. It shall be application independent. - I don't think it is a
controversial topic for the MidCom WG.
2. It should be self-contained, i.e. it should require MINIMAL additional
efforts from the application if at all! This point is crucial for any
pre-MidCom efforts. How any standard solution, requiring additions and
special application behavior, can be considered as "quickly deployed" and
"intermediate"?

The point is that the "media intermediate" technique has became the
candidate for the pre-midcom technique NOT because it can solve all the
problems (although not in the most efficient way), but because it can solve
(many of) the problem(s) in the simplest and a self-contained way.

TURN is a good candidate for solving the NAT problem but it should be able
to stay on its own without requiring any application special behavior such
as SIP/SDP extensions, SIP refreshes, RTP/RTCP changes, etc. 

Orit Levin
Chief Architect
RADVISION Inc.
TEL: +1.201.529.4300 x 230
FAX: +1.201.529.3516

 -----Original Message-----
From: 	Christian Huitema [mailto:huitema@windows.microsoft.com] 
Sent:	Monday, November 26, 2001 2:39 PM
To:	Ben Campbell
Cc:	midcom@ietf.org
Subject:	RE: Simplicity vs. generality (was Re: [midcom] 2x allocate
vs FANTOM)

Part of the design choice in STUN/TURN is really about allowing
deployment of applications without requiring changes on the NAT and
firewalls, and also as much as possible without incurring cost -- which
means, by minimizing the number of additional servers and the amount of
traffic routed through these servers. There are several deployment
environments that we want to serve, depending on the type of
NAT/firewall that is obstructing the communication:

1- "cone" NAT, i.e. NAT mapping is independent of the outside
destination, communication with multiple peer is not restricted.
2- "restricted cone" NAT, i.e. NAT mapping is independent of the outside
destination, communication is restricted to peers to which traffic has
been sent from the inside.
3- "symmetric" NAT, i.e. NAT mapping is dependent of the outside
destination, communication is ipso-facto restricted to peers to which
traffic has been sent from the inside.
4- "symmetric" firewall, similar to "restricted cone" but without the
mapping.
5- "full firewall", i.e. UDP communication is mostly blocked.

As Jonathan previously mentioned, we have no intention of solving the
5th case -- if the local admin wanted to allow UDP, it would have done
so. STUN solves cases 1, 2 and 4; 1 and 2, combined, cover a very large
fraction of the current "residential NAT" installations, probably around
95%. TURN covers case 3, i.e. the remaining 5% of the residential market
and a good share of the firewall deployments. 

There is a very large difference between the cost of running STUN and
the cost of running a relay: about 2 transactions per call for STUN, 50
messages per second for the duration of the call for relays, including
TURN. As Jonathan pointed out, this is a big difference on the bottom
line -- and this is also the reason why "one size fits all" is not a
good approach.

-- Christian Huitema

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 27 17:36:58 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA28042
	for <midcom-archive@odin.ietf.org>; Tue, 27 Nov 2001 17:36:53 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id RAA19833
	for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 17:36:55 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA19742;
	Tue, 27 Nov 2001 17:34:37 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA19713
	for <midcom@optimus.ietf.org>; Tue, 27 Nov 2001 17:34:35 -0500 (EST)
Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA27975
	for <midcom@ietf.org>; Tue, 27 Nov 2001 17:34:32 -0500 (EST)
Received: from smtprch1.nortel.com (erchg0j.us.nortel.com [47.113.64.103])
	by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id QAA15737
	for <midcom@ietf.org>; Tue, 27 Nov 2001 16:34:04 -0600 (CST)
Received: from zrchb200.us.nortel.com by smtprch1.nortel.com;
          Tue, 27 Nov 2001 16:29:18 -0600
Received: by zrchb200.us.nortel.com with Internet Mail Service (5.5.2653.19) 
          id <XRGVVK85>; Tue, 27 Nov 2001 16:32:41 -0600
Message-ID: <933FADF5E673D411B8A30002A5608A0E06F318@zrc2c012.us.nortel.com>
From: "Sanjoy Sen" <sanjoy@nortelnetworks.com>
To: "'Steve Davies'" <sdavies@ridgewaysystems.com>,
        "'John LaCour'" <jlacour@netscreen.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
Cc: "'Jonathan Rosenberg'" <jdrosen@dynamicsoft.com>
Subject: RE: [midcom] new I-D on "symmetric STUN"
Date: Tue, 27 Nov 2001 16:32:41 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
              boundary="----_=_NextPart_001_01C17793.6CB7D790"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C17793.6CB7D790
Content-Type: text/plain;
	charset="iso-8859-1"

Steve et. al., 
 
   I'm catching up with the discussions after a period out of office. Some
comments/questions on FANTOM. My apologies if they have already been
discussed.
 
1) Your App. Proxy is also an RTP Proxy. So for a simple two party call
where both are behind NAPT, the media need to traverse at least 3 RTP
proxies. Is this correct? 
 
2) Not sure what you gain by making the media go through the App. Proxy? For
example, in our proposal, we have the terminal send the empty RTP packets
(equivalent to your probes) directly to the Media intermediary in the SP
network to establish the media binds. 
 
3) For SIP services, your AP and PEA both will house a SIP Proxy function,
RTP Proxy function, as well as your control protocol+ RTP/RTCP probes. What
is the implication of putting all these functions in one box from capacity,
fault-tolerance and security p.o.v. ? For example, the AP will be doing
refreshes for all NAT binds for all RTP sessions on behalf of all terminals.
 
4) Are you planning on using a standard protocol as this control protocol?
In Sen proposal, we've used an existing device control protocol. The sen
proposal essentially needs no new protocol development.
 
5) Your requirement for always allowing traffic from some "well-known"
address/port of PEA to the AP in the private network is a big concern. This
is typically NOT done in traditional enterprise FW. Such a FW will typically
close the pin-hole after sometime, hence the need for signaling path
refreshes (using PING or REGISTER) both in our scheme and Jonathan's.
 
 
Thanks,
Sanjoy
 

-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: Tuesday, November 20, 2001 11:18 AM
To: 'John LaCour'; 'midcom@ietf.org'
Cc: 'Jonathan Rosenberg'
Subject: RE: [midcom] new I-D on "symmetric STUN"



John, 

You are quite right. This email didn't help move the debate forward much.
I'm afraid I got a little frustrated with the politics. Nevertheless, I
stick by my statements so let me give you a couple of examples of the flaws
I see. 

* FANTOM uses an out-of-band signalling method 'Create Media Flow' to assign
transport addresses on the remote server/public intemediary. It then sends
outbound UDP Probes (with a session identifier) to create the dynamic NAT
assignment and to complete the mapping between the resultant random source
port the probe came from, and the transport addresses the Create Media Flow
method assigned, and the call. The first probe effectively creates an
outbound UDP connection down which media may flow in either direction for
that call. Please note that media is NOT tunneled in FANTOM.

TURN tries to simplify this approach by combining the 'probe' (the method to
create the dynamic NAT assignment) with an in-band signalling method to
assign transport addresses on the public intermediary. This is the ALLOCATE
method in TURN. 

One of the main reasons FANTOM has out-of-band signalling was to conform to
the spirit of RTP/RTCP by assigning consecutive port pairs to represent the
receive RTP/RTCP addresses at the intermediary. A single method 'Create
Media Flow' does that. Having grabbed a port pair, 2 UDP outbound
connections are needed to the intermediary to receive the respective RTP and
RTCP flows. Hence the Probes. 

TURN cannot conform to the spirit of RTP in this way because the ALLOCATE
method only reserves a single transport address on the intermediary. If it
requested 2 transport addresses, a probe or very similar mechanism would be
required to establish the second outbound UDP connection. Even worse, the
way TURN is specified, there is a good chance that as a TURN server runs out
of resource the associated RTP and RTCP transport addresses could have
different IP addresses. NOT ALLOWED.

There are many other advantages to using a separate Probe message. One very
good use of probes is to keep NAT bindings assigned, i.e. they are sent at
regular intervals to prevent the NAT from timing out. TURN has no probe or
NAT keep-alive methods which breaks the solution on at least 2 counts. In
one case, a terminal may make an ALLOCATE to obtain an address with which to
register with a public SIP proxy. It then sits there waiting to receive
incoming calls. However, without some traffic such as a probe or a NAT keep
alive, the NAT assignment created by the ALLOCATE times out, which means the
terminal won't receive incoming call notifications. A second case when the
NAT binding may time out is when the remote party is not talking and their
terminal implements silence suppression. 

FANTOM uses probes to ensure this doesn't happen. In FANTOM probes are
designed to be easily recognisable in order to help the implementation of an
efficient forwarding intermediary.

* TURN doesn't use a tunnel. FANTOM does. Some think that this implies
FANTOM is a VPN variant. FANTOM is most definitely not, but we'll deal with
that separately. FANTOM uses a tunnel for multiplexing out-of-band call
control and the out-of-band FANTOM client-server protocol into a single
connection. The connection is TCP because we valued reliability and the
life-time is more easily managed by the NAT. It could be UDP but we didn't
feel we needed to re-invent a UDP session with TCP characteristics. 

We envisaged that the client end of FANTOM would be implemented in severals
ways. For example, it could be implemented in a standalone system, serving
many terminals in a single enterprise. In Centrex applications there would
be no local proxy. In this case the FANTOM client would have to handle
multiple simultaneous call setups and cleardowns. We judged a single
persistant tunnel for all call control from the FANTOM client to FANTOM
server was the most efficient use of resources. 

To avoid tunnels, a similar TURN implementation would require the standalone
client to create many UDP connections to the intermediary - one for each
terminal wanting to receive incoming calls. As we remarked above, these UDP
connections need to keep NAT bindings through some sort of NAT-keep-alive
messages. The SEN proposal implemented a similar technique and found it to
be too resource intensive - hence their SIP proposal extensions. 

Having a tunnel in FANTOM has further advantages, not least in allowing
out-of-band signalling and control. The benefit here is that the protocol
can be extended to include other functions such as network management
without breaking the architecture. We want FANTOM to be extensible.

This email is getting quite long so I'll conclude by remarking that I hope
that these explanations indicate that while  FANTOM appears more complex
than TURN, there is a reason behind each method FANTOM implements. We
haven't made it complex for complexity's sake. FANTOM may be unfamiliar, but
that's no reason to start from scratch which I fear TURN is. 

Steve 

-----Original Message----- 
From: John LaCour [ mailto:jlacour@netscreen.com
<mailto:jlacour@netscreen.com> ] 
Sent: 15 November 2001 21:58 
To: 'Steve Davies'; 'Jonathan Rosenberg'; 'midcom@ietf.org' 
Subject: RE: [midcom] new I-D on "symmetric STUN" 


Steve, 
  
You may or may not be correct, but this message does next to nothing 
to help any of us evaluate the merits of either proposal. 
  
Just because something was created earlier or even implemented doesn't 
make it inherently better. 
  
Rather than try to strong-arm us, you really need to enumerate the many 
flaws and how your proposal addresses them.  If you want to be 
completely forthcoming coming you should also discuss the weaknesses 
of your own proposal and why you've made those trade-offs. 
  
In fairness to you and Jonathan, I haven't done a thorough review of 
either proposal yet.  This message should not be misconstrued 
as  supporting either proposal.  Rather I'm trying to encourage 
you to tell us something useful. 
  
-John 
-----Original Message----- 
From: Steve Davies [ mailto:sdavies@ridgewaysystems.com
<mailto:sdavies@ridgewaysystems.com> ] 
Sent: Thursday, November 15, 2001 1:42 PM 
To: 'Jonathan Rosenberg'; 'midcom@ietf.org' 
Subject: RE: [midcom] new I-D on "symmetric STUN" 


Interesting TURN of events or should I say 'U TURN'. 
Puns aside, this proposal says nothing that hasn't already been proposed.
While I am pleased to see TURN uses IDENTICAL concepts to the Davies
proposal, it contains many flaws (too numerous to go into here). Fix those
flaws and you end up with the Davies proposal. Not only does TURN come a
month after the deadline set in Melinda's rules of engagement, but the
development of such a new and immature proposal is by definition not in the
best interests of a pre-midcom solution. If we agree on the concepts and
Jonathan et al are interested in a quick solution, then surely it makes
sense to jointly work on the most mature incarnation of those concepts. Why
re-invent the wheel?

Steve 


------_=_NextPart_001_01C17793.6CB7D790
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<TITLE>RE: [midcom] new I-D on "symmetric STUN"</TITLE>

<META content="MSHTML 5.00.2314.1000" name=GENERATOR></HEAD>
<BODY>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=540530821-27112001>Steve 
et. al., </SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=540530821-27112001></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=540530821-27112001>&nbsp;&nbsp; I'm catching up with the discussions after 
a period out of office. Some comments/questions on FANTOM. My apologies if they 
have already been discussed.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=540530821-27112001></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=540530821-27112001>1) 
Your App. Proxy is also an RTP Proxy. So for a simple two party call where both 
are behind NAPT, the media need to traverse at least 3 RTP proxies. Is this 
correct? </SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=540530821-27112001></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=540530821-27112001>2) Not 
sure what you gain by making the media go through the App. Proxy? For example, 
in our proposal, we have the terminal send the empty RTP packets (equivalent to 
your probes) directly to the Media intermediary in the SP network to establish 
the media binds. </SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=540530821-27112001></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=540530821-27112001>3) For 
SIP services, your AP and PEA both will house a SIP Proxy function, RTP Proxy 
function, as well as&nbsp;your control protocol+ RTP/RTCP probes. What is the 
implication of putting all these functions in one box from capacity, 
fault-tolerance and security p.o.v. ? For example, the AP will be doing 
refreshes for all NAT binds for all RTP sessions on behalf of all 
terminals.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=540530821-27112001></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=540530821-27112001>4) Are 
you planning on using a standard protocol as this control protocol? In Sen 
proposal, we've used an existing device control protocol. The sen proposal 
essentially needs no new protocol development.</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=540530821-27112001></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN class=540530821-27112001>5) 
Your requirement for always allowing traffic from some "well-known" address/port 
of PEA to the AP&nbsp;in the private network is a big concern. This is 
typically&nbsp;NOT done in traditional enterprise FW. Such a FW will typically 
close the pin-hole after sometime, hence the need for signaling path refreshes 
(using PING or REGISTER) both in our scheme and Jonathan's.</SPAN></FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=540530821-27112001></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=540530821-27112001>Thanks,</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=540530821-27112001>Sanjoy</SPAN></FONT></DIV>
<DIV><FONT color=#0000ff face=Arial size=2><SPAN 
class=540530821-27112001></SPAN></FONT>&nbsp;</DIV>
<BLOCKQUOTE 
style="BORDER-LEFT: #0000ff 2px solid; MARGIN-LEFT: 5px; MARGIN-RIGHT: 0px; PADDING-LEFT: 5px">
  <DIV align=left class=OutlookMessageHeader dir=ltr><FONT face=Tahoma 
  size=2>-----Original Message-----<BR><B>From:</B> Steve Davies 
  [mailto:sdavies@ridgewaysystems.com]<BR><B>Sent:</B> Tuesday, November 20, 
  2001 11:18 AM<BR><B>To:</B> 'John LaCour'; 'midcom@ietf.org'<BR><B>Cc:</B> 
  'Jonathan Rosenberg'<BR><B>Subject:</B> RE: [midcom] new I-D on "symmetric 
  STUN"<BR><BR></DIV></FONT>
  <P><FONT size=2>John,</FONT> </P>
  <P><FONT size=2>You are quite right. This email didn't help move the debate 
  forward much. I'm afraid I got a little frustrated with the politics. 
  Nevertheless, I stick by my statements so let me give you a couple of examples 
  of the flaws I see. </FONT></P>
  <P><FONT size=2>* FANTOM uses an out-of-band signalling method 'Create Media 
  Flow' to assign transport addresses on the remote server/public intemediary. 
  It then sends outbound UDP Probes (with a session identifier) to create the 
  dynamic NAT assignment and to complete the mapping between the resultant 
  random source port the probe came from, and the transport addresses the Create 
  Media Flow method assigned, and the call. The first probe effectively creates 
  an outbound UDP connection down which media may flow in either direction for 
  that call. Please note that media is NOT tunneled in FANTOM.</FONT></P>
  <P><FONT size=2>TURN tries to simplify this approach by combining the 'probe' 
  (the method to create the dynamic NAT assignment) with an in-band signalling 
  method to assign transport addresses on the public intermediary. This is the 
  ALLOCATE method in TURN. </FONT></P>
  <P><FONT size=2>One of the main reasons FANTOM has out-of-band signalling was 
  to conform to the spirit of RTP/RTCP by assigning consecutive port pairs to 
  represent the receive RTP/RTCP addresses at the intermediary. A single method 
  'Create Media Flow' does that. Having grabbed a port pair, 2 UDP outbound 
  connections are needed to the intermediary to receive the respective RTP and 
  RTCP flows. Hence the Probes. </FONT></P>
  <P><FONT size=2>TURN cannot conform to the spirit of RTP in this way because 
  the ALLOCATE method only reserves a single transport address on the 
  intermediary. If it requested 2 transport addresses, a probe or very similar 
  mechanism would be required to establish the second outbound UDP connection. 
  Even worse, the way TURN is specified, there is a good chance that as a TURN 
  server runs out of resource the associated RTP and RTCP transport addresses 
  could have different IP addresses. NOT ALLOWED.</FONT></P>
  <P><FONT size=2>There are many other advantages to using a separate Probe 
  message. One very good use of probes is to keep NAT bindings assigned, i.e. 
  they are sent at regular intervals to prevent the NAT from timing out. TURN 
  has no probe or NAT keep-alive methods which breaks the solution on at least 2 
  counts. In one case, a terminal may make an ALLOCATE to obtain an address with 
  which to register with a public SIP proxy. It then sits there waiting to 
  receive incoming calls. However, without some traffic such as a probe or a NAT 
  keep alive, the NAT assignment created by the ALLOCATE times out, which means 
  the terminal won't receive incoming call notifications. A second case when the 
  NAT binding may time out is when the remote party is not talking and their 
  terminal implements silence suppression. </FONT></P>
  <P><FONT size=2>FANTOM uses probes to ensure this doesn't happen. In FANTOM 
  probes are designed to be easily recognisable in order to help the 
  implementation of an efficient forwarding intermediary.</FONT></P>
  <P><FONT size=2>* TURN doesn't use a tunnel. FANTOM does. Some think that this 
  implies FANTOM is a VPN variant. FANTOM is most definitely not, but we'll deal 
  with that separately. FANTOM uses a tunnel for multiplexing out-of-band call 
  control and the out-of-band FANTOM client-server protocol into a single 
  connection. The connection is TCP because we valued reliability and the 
  life-time is more easily managed by the NAT. It could be UDP but we didn't 
  feel we needed to re-invent a UDP session with TCP characteristics. 
</FONT></P>
  <P><FONT size=2>We envisaged that the client end of FANTOM would be 
  implemented in severals ways. For example, it could be implemented in a 
  standalone system, serving many terminals in a single enterprise. In Centrex 
  applications there would be no local proxy. In this case the FANTOM client 
  would have to handle multiple simultaneous call setups and cleardowns. We 
  judged a single persistant tunnel for all call control from the FANTOM client 
  to FANTOM server was the most efficient use of resources. </FONT></P>
  <P><FONT size=2>To avoid tunnels, a similar TURN implementation would require 
  the standalone client to create many UDP connections to the intermediary - one 
  for each terminal wanting to receive incoming calls. As we remarked above, 
  these UDP connections need to keep NAT bindings through some sort of 
  NAT-keep-alive messages. The SEN proposal implemented a similar technique and 
  found it to be too resource intensive - hence their SIP proposal extensions. 
  </FONT></P>
  <P><FONT size=2>Having a tunnel in FANTOM has further advantages, not least in 
  allowing out-of-band signalling and control. The benefit here is that the 
  protocol can be extended to include other functions such as network management 
  without breaking the architecture. We want FANTOM to be extensible.</FONT></P>
  <P><FONT size=2>This email is getting quite long so I'll conclude by remarking 
  that I hope that these explanations indicate that while&nbsp; FANTOM appears 
  more complex than TURN, there is a reason behind each method FANTOM 
  implements. We haven't made it complex for complexity's sake. FANTOM may be 
  unfamiliar, but that's no reason to start from scratch which I fear TURN is. 
  </FONT></P>
  <P><FONT size=2>Steve</FONT> </P>
  <P><FONT size=2>-----Original Message-----</FONT> <BR><FONT size=2>From: John 
  LaCour [<A 
  href="mailto:jlacour@netscreen.com">mailto:jlacour@netscreen.com</A>]</FONT> 
  <BR><FONT size=2>Sent: 15 November 2001 21:58</FONT> <BR><FONT size=2>To: 
  'Steve Davies'; 'Jonathan Rosenberg'; 'midcom@ietf.org'</FONT> <BR><FONT 
  size=2>Subject: RE: [midcom] new I-D on "symmetric STUN"</FONT> </P><BR>
  <P><FONT size=2>Steve,</FONT> <BR><FONT size=2>&nbsp;</FONT> <BR><FONT 
  size=2>You may or may not be correct, but this message does next to 
  nothing</FONT> <BR><FONT size=2>to help any of us evaluate the merits of 
  either proposal.</FONT> <BR><FONT size=2>&nbsp;</FONT> <BR><FONT size=2>Just 
  because something was created earlier or even implemented doesn't</FONT> 
  <BR><FONT size=2>make it inherently better.</FONT> <BR><FONT 
  size=2>&nbsp;</FONT> <BR><FONT size=2>Rather than try to strong-arm us, you 
  really need to enumerate the many</FONT> <BR><FONT size=2>flaws and how your 
  proposal addresses them.&nbsp; If you want to be</FONT> <BR><FONT 
  size=2>completely forthcoming coming you should also discuss the 
  weaknesses</FONT> <BR><FONT size=2>of your own proposal and why you've made 
  those trade-offs.</FONT> <BR><FONT size=2>&nbsp;</FONT> <BR><FONT size=2>In 
  fairness to you and Jonathan, I haven't done a thorough review of</FONT> 
  <BR><FONT size=2>either proposal yet.&nbsp; This message should not be 
  misconstrued</FONT> <BR><FONT size=2>as&nbsp; supporting either 
  proposal.&nbsp; Rather I'm trying to encourage</FONT> <BR><FONT size=2>you to 
  tell us something useful.</FONT> <BR><FONT size=2>&nbsp;</FONT> <BR><FONT 
  size=2>-John</FONT> <BR><FONT size=2>-----Original Message-----</FONT> 
  <BR><FONT size=2>From: Steve Davies [<A 
  href="mailto:sdavies@ridgewaysystems.com">mailto:sdavies@ridgewaysystems.com</A>]</FONT> 
  <BR><FONT size=2>Sent: Thursday, November 15, 2001 1:42 PM</FONT> <BR><FONT 
  size=2>To: 'Jonathan Rosenberg'; 'midcom@ietf.org'</FONT> <BR><FONT 
  size=2>Subject: RE: [midcom] new I-D on "symmetric STUN"</FONT> </P><BR>
  <P><FONT size=2>Interesting TURN of events or should I say 'U TURN'. 
  </FONT><BR><FONT size=2>Puns aside, this proposal says nothing that hasn't 
  already been proposed. While I am pleased to see TURN uses IDENTICAL concepts 
  to the Davies proposal, it contains many flaws (too numerous to go into here). 
  Fix those flaws and you end up with the Davies proposal. Not only does TURN 
  come a month after the deadline set in Melinda's rules of engagement, but the 
  development of such a new and immature proposal is by definition not in the 
  best interests of a pre-midcom solution. If we agree on the concepts and 
  Jonathan et al are interested in a quick solution, then surely it makes sense 
  to jointly work on the most mature incarnation of those concepts. Why 
  re-invent the wheel?</FONT></P>
  <P><FONT size=2>Steve </FONT></P></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C17793.6CB7D790--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 27 18:55:48 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA00107
	for <midcom-archive@odin.ietf.org>; Tue, 27 Nov 2001 18:55:48 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id SAA21508
	for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 18:55:23 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA21423;
	Tue, 27 Nov 2001 18:48:50 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id SAA21345
	for <midcom@optimus.ietf.org>; Tue, 27 Nov 2001 18:48:47 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id SAA29878
	for <midcom@ietf.org>; Tue, 27 Nov 2001 18:48:45 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001112723453902985
 ; Tue, 27 Nov 2001 23:45:39 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XQ21F6RZ>; Tue, 27 Nov 2001 23:47:48 -0000
Message-ID: <00533D13955AD411AF3800A0C9B42639E92549@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'jdrosen@dynamicsoft.com'" <jdrosen@dynamicsoft.com>,
        "'rohan@cisco.com'" <rohan@cisco.com>,
        "'Christian Huitema'"<huitema@windows.microsoft.com>,
        "'jweinberger@dynamicsoft.com'" <jweinberger@dynamicsoft.com>
Cc: midcom@ietf.org
Subject: RE: [midcom] pre-midcom - How does TURN work?
Date: Tue, 27 Nov 2001 23:47:38 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C1779D.E5956AB0"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1779D.E5956AB0
Content-Type: text/plain;
	charset="ISO-8859-1"

All,

By way of clarification of the first question, when I say 'behind' I mean
the central registrar is on the public side of the TURN Server, viz: TURN
Client<->NAT<->TURN Server<->Central Registrar<->etc. So the client must go
through TURN to get to the registrar - a typical managed service deployment.

Hopefully the other questions are clear.

Steve


-----Original Message-----
From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
Sent: 27 November 2001 18:19
To: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; 'Christian Huitema';
'jweinberger@dynamicsoft.com'
Cc: midcom@ietf.org
Subject: [midcom] pre-midcom - How does TURN work?


Jonathan, Joel, Christian and Rohan, 
Please explain how you expect the following to work within TURN: 
* How does a client register with a central registrar behind the TURN
server. The ALLOCATE method obtains a public transport address to represent
the client, but how does the registration request get forwarded from the
TURN server to the central registrar?
* When a call exists between 2 clients that are behind 2 different TURN
servers, there appears to be a media deadlock. It appears from the
description, that both TURN servers are waiting for the other to send them
media before each of them knows where to send media to. Is this
interpretation correct?
* What is your solution for RTP port pairing? 
* How do you expect to prevent NATs from timing out on both the 'in-bound
signaling' connection and for media in the presence of silence suppression? 
It would also really be nice to see the detail of a proper call flow - SIP
or H.323 will suffice. Until we see how TURN is expected to work it is
difficult to make a like-for-like comparison with FANTOM and have a proper
debate on the pros and cons of various methods.
Thanks. 
Steve 

------_=_NextPart_001_01C1779D.E5956AB0
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] pre-midcom - How does TURN work?</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>All,</FONT>
</P>

<P><FONT SIZE=3D2>By way of clarification of the first question, when I =
say 'behind' I mean the central registrar is on the public side of the =
TURN Server, viz: TURN Client&lt;-&gt;NAT&lt;-&gt;TURN =
Server&lt;-&gt;Central Registrar&lt;-&gt;etc. So the client must go =
through TURN to get to the registrar - a typical managed service =
deployment.</FONT></P>

<P><FONT SIZE=3D2>Hopefully the other questions are clear.</FONT>
</P>

<P><FONT SIZE=3D2>Steve</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Steve Davies [<A =
HREF=3D"mailto:sdavies@ridgewaysystems.com">mailto:sdavies@ridgewaysyste=
ms.com</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 27 November 2001 18:19</FONT>
<BR><FONT SIZE=3D2>To: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; =
'Christian Huitema'; 'jweinberger@dynamicsoft.com'</FONT>
<BR><FONT SIZE=3D2>Cc: midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>Subject: [midcom] pre-midcom - How does TURN =
work?</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Jonathan, Joel, Christian and Rohan, </FONT>
<BR><FONT SIZE=3D2>Please explain how you expect the following to work =
within TURN: </FONT>
<BR><FONT SIZE=3D2>* How does a client register with a central =
registrar behind the TURN server. The ALLOCATE method obtains a public =
transport address to represent the client, but how does the =
registration request get forwarded from the TURN server to the central =
registrar?</FONT></P>

<P><FONT SIZE=3D2>* When a call exists between 2 clients that are =
behind 2 different TURN servers, there appears to be a media deadlock. =
It appears from the description, that both TURN servers are waiting for =
the other to send them media before each of them knows where to send =
media to. Is this interpretation correct?</FONT></P>

<P><FONT SIZE=3D2>* What is your solution for RTP port pairing? </FONT>
<BR><FONT SIZE=3D2>* How do you expect to prevent NATs from timing out =
on both the 'in-bound signaling' connection and for media in the =
presence of silence suppression? </FONT></P>

<P><FONT SIZE=3D2>It would also really be nice to see the detail of a =
proper call flow - SIP or H.323 will suffice. Until we see how TURN is =
expected to work it is difficult to make a like-for-like comparison =
with FANTOM and have a proper debate on the pros and cons of various =
methods.</FONT></P>

<P><FONT SIZE=3D2>Thanks. </FONT>
<BR><FONT SIZE=3D2>Steve </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C1779D.E5956AB0--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 27 20:27:23 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA02165
	for <midcom-archive@odin.ietf.org>; Tue, 27 Nov 2001 20:27:23 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id UAA24005
	for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 20:27:25 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id UAA23954;
	Tue, 27 Nov 2001 20:26:13 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id UAA23925
	for <midcom@optimus.ietf.org>; Tue, 27 Nov 2001 20:26:11 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id UAA02128
	for <midcom@ietf.org>; Tue, 27 Nov 2001 20:26:09 -0500 (EST)
Received: from imop.cisco.com (imop.cisco.com [171.69.11.44])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAS1NRc14825;
	Tue, 27 Nov 2001 17:23:27 -0800 (PST)
Received: from imop.cisco.com (localhost.cisco.com [127.0.0.1])
	by imop.cisco.com (Mirapoint)
	with SMTP id ACC17422 (AUTH rmahy);
	Tue, 27 Nov 2001 17:23:27 -0800 (PST)
Message-Id: <200111280123.ACC17422@imop.cisco.com>
Received: from 128.107.142.121
	by imop.cisco.com
	with HTTP/1.1;
	Tue, 27 Nov 2001 17:27:31 -0800
Date: Tue, 27 Nov 2001 17:27:31 -0800
From: Rohan Mahy <rohan@cisco.com>
Subject: RE: [midcom] pre-midcom - How does TURN work?
To: Steve Davies <sdavies@ridgewaysystems.com>
Cc: "'jdrosen@dynamicsoft.com'" <jdrosen@dynamicsoft.com>,
        "'rohan@cisco.com'" <rohan@cisco.com>,
        "'Christian Huitema'" <huitema@windows.microsoft.com>,
        "'jweinberger@dynamicsoft.com'" <jweinberger@dynamicsoft.com>,
        midcom@ietf.org
X-Mailer: Mirapoint Webmail Direct 2.9.1.3
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit



---- Original message ----
>Date: Tue, 27 Nov 2001 23:47:38 -0000
>From: Steve Davies <sdavies@ridgewaysystems.com>  
>Subject: RE: [midcom] pre-midcom - How does TURN work?  
>To: "'jdrosen@dynamicsoft.com'" <jdrosen@dynamicsoft.com>,
"'rohan@cisco.com'" <rohan@cisco.com>, "'Christian
Huitema'"<huitema@windows.microsoft.com>,
"'jweinberger@dynamicsoft.com'" <jweinberger@dynamicsoft.com>
>Cc: midcom@ietf.org
>
>All,
>
>By way of clarification of the first question, when I say
'behind' I mean
>the central registrar is on the public side of the TURN
Server, viz: TURN
>Client<->NAT<->TURN Server<->Central Registrar<->etc. So the
client must go
>through TURN to get to the registrar - a typical managed
service deployment.
>
>Hopefully the other questions are clear.
>
>Steve
>
>
>-----Original Message-----
>From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
>Sent: 27 November 2001 18:19
>To: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; 'Christian
Huitema';
>'jweinberger@dynamicsoft.com'
>Cc: midcom@ietf.org
>Subject: [midcom] pre-midcom - How does TURN work?
>
>
>Jonathan, Joel, Christian and Rohan, 
>Please explain how you expect the following to work within TURN: 
>* How does a client register with a central registrar behind
the TURN
>server. The ALLOCATE method obtains a public transport
address to represent
>the client, but how does the registration request get
forwarded from the
>TURN server to the central registrar?

There is no need to use TURN to communicate with a SIP Server.
 SIP over TCP or TLS works fine as specified in bis.  SIP over
UDP  must use the rport Via parameter specified in
draft-ietf-sip-nat-00.txt

MGCP and H.323 both use TCP, so they are likewise OK for
signaling.

>* When a call exists between 2 clients that are behind 2
different TURN
>servers, there appears to be a media deadlock. It appears
from the
>description, that both TURN servers are waiting for the other
to send them
>media before each of them knows where to send media to. Is this
>interpretation correct?

A user originating an INVITE using a TURN server should
represent that they can use symmetric RTP in passive mode. 
When a user behind a symmetric NAT receives an INVITE offering
this, it does not use TURN, it instead sends its media to the
addresses advertised in SDP (the sender's TURN server).

>* What is your solution for RTP port pairing?

This is an area where we need to write a concrete proposal. 
We had some discussions about this when STUN/TURN where part
of the same proposal, but we never closed on a syntax. 
Basically the approach would involve including a parameter in
the first Allocate request to hold the next address for a
short period of time.  The second request would contain some
information from the previous request (for example the next
expected MAPPED-ADDRESS parameter).
 
>* How do you expect to prevent NATs from timing out on both
the 'in-bound signaling' connection

either use TCP/TLS, or send a sacrifice packet periodically to
keep the mapping fresh.  This sacrifice could be an OPTIONS
with max-forwards of 0, a PING as in the Nortel proposal, etc.

>and for media in the presence of silence suppression?

endpoints should send empty RTP packets periodically if no RTP
is  sent.  likewise with RTCP announcements.
 
>It would also really be nice to see the detail of a proper
call flow - SIP
>or H.323 will suffice. Until we see how TURN is expected to
work it is
>difficult to make a like-for-like comparison with FANTOM and
have a proper
>debate on the pros and cons of various methods.
>Thanks. 
>Steve 

Agreed.

thanks,
-rohan

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 27 21:29:55 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA03216
	for <midcom-archive@odin.ietf.org>; Tue, 27 Nov 2001 21:29:54 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id VAA25469
	for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 21:27:21 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA25338;
	Tue, 27 Nov 2001 21:16:12 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA25307
	for <midcom@optimus.ietf.org>; Tue, 27 Nov 2001 21:16:10 -0500 (EST)
Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA03043
	for <midcom@ietf.org>; Tue, 27 Nov 2001 21:16:07 -0500 (EST)
Received: from smtprch2.nortel.com (erchg0k.us.nortel.com [47.113.64.104])
	by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id UAA26397
	for <midcom@ietf.org>; Tue, 27 Nov 2001 20:15:39 -0600 (CST)
Received: from zsc4c000.us.nortel.com by smtprch2.nortel.com;
          Tue, 27 Nov 2001 20:08:25 -0600
Received: by zsc4c000.us.nortel.com with Internet Mail Service (5.5.2653.19) 
          id <XRHAVC92>; Tue, 27 Nov 2001 18:14:12 -0800
Message-ID: <2F1FC1DEA077D5119FAD00508BCFD6D201190E99@zsc3c030.us.nortel.com>
From: "Francois Audet" <audet@nortelnetworks.com>
To: "'Rohan Mahy'" <rohan@cisco.com>,
        "'Steve Davies'" <sdavies@ridgewaysystems.com>
Cc: "'jdrosen@dynamicsoft.com'" <jdrosen@dynamicsoft.com>,
        "'Christian Huitema'" <huitema@windows.microsoft.com>,
        "'jweinberger@dynamicsoft.com'" <jweinberger@dynamicsoft.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
Subject: RE: [midcom] pre-midcom - How does TURN work?
Date: Tue, 27 Nov 2001 18:14:14 -0800
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
              boundary="----_=_NextPart_001_01C177B2.60074DE0"
X-Orig: <audet@americasm06.nt.com>
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C177B2.60074DE0
Content-Type: text/plain;
	charset="iso-8859-1"

> MGCP and H.323 both use TCP, so they are likewise OK for
> signaling.

Unfortunately, H.323 explicitely specifies TCP ports (as well as the IP
address)
to be used for signalling.

Also, to make things worst, the H.245 TCP channel is specified dynamically
(IP address and port) in H.225.0 at every call. Either end can specify it,
so
it makes NAT traversal pretty difficult. Unless you use H.245 tunnelling.

------_=_NextPart_001_01C177B2.60074DE0
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2654.89">
<TITLE>RE: [midcom] pre-midcom - How does TURN work?</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>&gt; MGCP and H.323 both use TCP, so they are =
likewise OK for</FONT>
<BR><FONT SIZE=3D2>&gt; signaling.</FONT>
</P>

<P><FONT SIZE=3D2>Unfortunately, H.323 explicitely specifies TCP ports =
(as well as the IP address)</FONT>
<BR><FONT SIZE=3D2>to be used for signalling.</FONT>
</P>

<P><FONT SIZE=3D2>Also, to make things worst, the H.245 TCP channel is =
specified dynamically (IP address and port) in H.225.0 at every call. =
Either end can specify it, so</FONT></P>

<P><FONT SIZE=3D2>it makes NAT traversal pretty difficult. Unless you =
use H.245 tunnelling.</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C177B2.60074DE0--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 27 21:40:48 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA04340
	for <midcom-archive@odin.ietf.org>; Tue, 27 Nov 2001 21:40:43 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id VAA25956
	for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 21:40:46 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA25937;
	Tue, 27 Nov 2001 21:39:23 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA25906
	for <midcom@optimus.ietf.org>; Tue, 27 Nov 2001 21:39:21 -0500 (EST)
Received: from pop.mainstreet.net (smtp.mainstreet.net [207.5.0.46])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA04327
	for <midcom@ietf.org>; Tue, 27 Nov 2001 21:39:18 -0500 (EST)
Received: from vip (saqibj.mainstreet.net [207.5.1.168])
	by pop.mainstreet.net (8.11.3/8.11.3) with SMTP id fAS2d9P75815;
	Tue, 27 Nov 2001 18:39:09 -0800 (PST)
Reply-To: <saqibj@margallacomm.com>
From: "Saqib Jang" <saqibj@margallacomm.com>
To: "Melinda Shore" <mshore@cisco.com>,
        "Barry Scott" <bscott@ridgewaysystems.com>, <midcom@ietf.org>
Subject: RE: [midcom] pre-midcom solutions != VPN
Date: Tue, 27 Nov 2001 18:47:13 -0800
Message-ID: <NDBBLPEJFLKHBNKPNJJPIEKLDDAA.saqibj@margallacomm.com>
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
Importance: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2314.1300
In-Reply-To: <5.1.0.14.0.20011123150254.00a5e200@localhost>
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

Without belaboring the point, let me only
say that I think it is very important to have a
discussion & consensus on whether the costs of 
developing & deploying a new protocol (especially
another symmetric protocol) outweighs its
benefits. Has such a discussion taken place
and is there a consensus on this issue?

Saqib


-----Original Message-----
From: Melinda Shore [mailto:mshore@cisco.com]
Sent: Friday, November 23, 2001 12:07 PM
To: Barry Scott; 'Saqib Jang'; midcom@ietf.org
Subject: RE: [midcom] pre-midcom solutions != VPN


At 04:34 PM 11/23/01 +0000, Barry Scott wrote:
>I cannot see how to use a VPN to make VOIP protocols work between private 
>IP address space and a shared public IP address space. 

VPNs don't always use separate address spaces.  Also, it's not
that endpoints on a VPN already all share an address space - it's
more typically the case that an address that's routable within
the VPN is *loaned* to the endpoint when it joins the VPN.

The pre-midcom work is intended address cases that are not
currently handled by existing technology.  Let's move on, please.

Melinda



_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Tue Nov 27 21:58:17 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA04514
	for <midcom-archive@odin.ietf.org>; Tue, 27 Nov 2001 21:58:17 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id VAA26200
	for midcom-archive@odin.ietf.org; Tue, 27 Nov 2001 21:58:19 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA26185;
	Tue, 27 Nov 2001 21:57:30 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id VAA26142
	for <midcom@optimus.ietf.org>; Tue, 27 Nov 2001 21:57:26 -0500 (EST)
Received: from mgo.iij.ad.jp (root@mgo.iij.ad.jp [202.232.15.6])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA04499
	for <midcom@ietf.org>; Tue, 27 Nov 2001 21:57:22 -0500 (EST)
Received: from ns.iij.ad.jp (ns.iij.ad.jp [192.168.2.8])
	by mgo.iij.ad.jp (8.8.8/MGO1.0) with ESMTP id LAA06582;
	Wed, 28 Nov 2001 11:55:07 +0900 (JST)
Received: from zeus (h188n005.iij.ad.jp [192.168.5.188]) by ns.iij.ad.jp (8.8.5/3.5Wpl7) with ESMTP id LAA22111; Wed, 28 Nov 2001 11:55:06 +0900 (JST)
To: midcom@ietf.org
Cc: nats@ml.canonet.ne.jp, nats@bugest.net
From: Kuniaki Kondo <kuniaki@iij.ad.jp>
Message-Id: <200111281155.DCG19336.BLLVJJO@iij.ad.jp>
X-Mailer: Winbiff [Version 2.34beta3]
X-Accept-Language: ja,en
Date: Wed, 28 Nov 2001 11:55:06 +0900
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Subject: [midcom] STUN/TURN and NATS
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Hi,

I summarize what is difference NATS, my draft, and STUN/TURN which
has discussed on this list.

First of all, Midcom approach such as STUN/TURN would traverse
NAT/FW without changing NAT box or FW software.
However, NATS approach is different. NATS would traverse them
with changing NAT box software, but it does not need to change
end host such as PCs. Furthermore, Target of NATS is residential
user or SOHO user who uses very simple network topology.

I considered differences stand on this conditions.

Most differences between STUN/TURN and NATS is that STUN/TURN
needs a server, but NATS does not need it. And, STUN/TURN
needs to support this protocol on clients such as PCs, but
NATS does not need to support it.
However, If end users want to use all NATS features, then
end hosts might support NATS. However, this is NOT mandatory.

It means that residential users can support NATS to upgrade firmware
of NAT box or SOHO router, and other equipments such as PCs does not
need to change anything.
Furthermore, In the STUN/TURN approach, connections have to through
server. Therefore, it might make collecting traffic if ISP uses those
protocol. Especially, If VoIP or MoIP use those midcom protocol, VoIP
or MoIP make over some 10Kbps traffic, totally those traffic might reach
some hundreds mega bps at ISP which have many thousands of residential
users.
For improve those situation, STUN/TURN protocol supports multi-server
topology.
However, ISPs probably do not desire to put those servers because
those servers might make slow down performance to transfer packets.
Furthermore, residential user especially game user or VoIP user worry
about delay. They might hate that there are servers to transfer those
traffic on the network.
Certainly, those topology are acceptable for enterprise user.

On this perspective, I believe that we should consider a method
which does not need servers like NATS not only which needs servers
like STUN/TURN.

Finally, NATS is in developing phase, and some test codes have
already worked. And, some products decided that it will implement NATS.

Thanks.


--
Kuniaki Kondo
kuniaki@iij.ad.jp

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Wed Nov 28 03:08:40 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA25876
	for <midcom-archive@odin.ietf.org>; Wed, 28 Nov 2001 03:08:40 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id DAA13895
	for midcom-archive@odin.ietf.org; Wed, 28 Nov 2001 03:08:42 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA13864;
	Wed, 28 Nov 2001 03:07:30 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id DAA13826
	for <midcom@optimus.ietf.org>; Wed, 28 Nov 2001 03:07:28 -0500 (EST)
Received: from mail.bigsale.com ([203.248.138.4])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA25862
	for <midcom@ietf.org>; Wed, 28 Nov 2001 03:07:23 -0500 (EST)
Received: from ssle ([211.171.1.156])
	by mail.bigsale.com (8.9.3/8.9.3) with SMTP id BAA08766
	for <midcom@ietf.org>; Thu, 29 Nov 2001 01:35:13 +0900
Message-Id: <200111281635.BAA08766@mail.bigsale.com>
From: admin <admin@bojimolca.com>
To: midcom@ietf.org
X-Mailer: Microsoft Outlook Express 5.00.2615.200
Reply-To: admin@bojimolca.com
Date: Wed, 28 Nov 2001 17:07:31 +0900
Mime-Version: 1.0
Content-Type: text/html; charset=ks_c_5601-1987
Subject: [midcom] [±ä±Þ°øÁö] µåµð¾î ¿ÀÇÂµÇ¾ú½À´Ï´Ù.
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org


<html>

<head>
<meta http-equiv="Content-Type" content="text/html; charset=ks_c_5601-1987">
<meta name="GENERATOR" content="Microsoft FrontPage 5.0">
<meta name="ProgId" content="FrontPage.Editor.Document">
<title>È­Á¦ÀÇ H¾çºñµð¿À</title>
</head>

<body>

<table align="center" bgColor="black" cellPadding="0" cellSpacing="0" width="477">
  <tbody>
    <tr>
      <td colSpan="2" vAlign="top" width="477">
        <table cellPadding="0" cellSpacing="0">
          <tbody>
            <tr>
              <td rowSpan="2" width="230">
                <p><b><font color="#FFFFFF" size="6"><a href="http://www.bojimolca.com" target="new">
                <font color="#FF0000">º¸Áö¸ôÄ«´åÄÄ</font></a></font></b></p>
              </td>
              <td width="230">
                <p><font color="red"><span style="FONT-SIZE: 9pt">&nbsp;&nbsp;</span></font><a href="http://www.bojimolca.com" target="new"><span style="FONT-SIZE: 9pt"><font color="red">È­Á¦ÀÇ
                H¾çºñµð¿À.¿©´ë»ýÀÇ ÇÏ·ç......</font></span></a></p>
              </td>
            </tr>
            <tr>
              <td width="230">
                <p><font color="red"><span style="FONT-SIZE: 9pt">&nbsp;&nbsp;</span></font><a href="http://www.bojimolca.com" target="new"><span style="FONT-SIZE: 9pt"><font color="red">ÆäÆ¼½¬.¸ôÄ«.XXXÀÏº»
                µ¿¿µ»ó,¼½½º¾ß»ç..</font></span></a></p>
              </td>
            </tr>
          </tbody>
        </table>
      </td>
    </tr>
    <tr>
      <td height="268" rowSpan="2" width="363">
        <p align="center"><a href="http://www.bojimolca.com" target="new"><img border="0" height="267" src="http://sexsextv.co.kr/img/Image1.gif" width="363"></a></p>
      </td>
      <td width="114">
        <p align="center"><a href="http://www.bojimolca.com" target="new"><img border="0" src="http://sexsextv.co.kr/img/Image7.gif" width="112" height="131"></a></p>
      </td>
    </tr>
    <tr>
      <td height="103" width="114">
        <p align="center"><a href="http://www.bojimolca.com" target="new"><img border="0" height="131" src="http://sexsextv.co.kr/img/Image6.gif" width="109"></a></p>
      </td>
    </tr>
    <tr>
      <td colSpan="2" height="76" width="477">
        <p align="center"><a href="http://www.bojimolca.com" target="new"><img border="0" src="http://sexsextv.co.kr/img/Image18.gif" width="475" height="74"></a></p>
      </td>
    </tr>
    <tr>
      <td colSpan="2" height="79" width="477">
        <p align="center" style="LINE-HEIGHT: 100%; MARGIN-BOTTOM: 0px; MARGIN-TOP: 0px">¡¡
        <p style="LINE-HEIGHT: 100%; MARGIN-BOTTOM: 0px; MARGIN-TOP: 0px">
        <marquee behavior="alternate"></marquee>
        <a href="http://www.bojimolca.com" target="new">
        <img border="0" src="http://img.69sexual.com/intro/photo_03.gif" width="152" height="110"><img border="0" src="http://img.69sexual.com/intro/photo_01.gif" width="154" height="110"><img border="0" src="http://img.69sexual.com/intro/photo_02.gif" width="152" height="110"><img border="0" src="http://img.69sexual.com/intro/photo_03.gif" width="152" height="110"><img border="0" src="http://img.69sexual.com/intro/photo_04.gif" width="152" height="110"><img border="0" src="http://img.69sexual.com/intro/photo_05.gif" width="148" height="110"><img border="0" height="110" src="http://img.69sexual.com/intro/photo_06.jpg" width="148"><img border="0" height="110" src="http://img.69sexual.com/intro/photo_07.jpg" width="152">
        <img border="0" src="http://img.69sexual.com/intro/photo_03.gif" width="152" height="110"><img border="0" height="110" src="http://img.69sexual.com/intro/photo_08.jpg" width="152"><img border="0" height="110" src="http://img.69sexual.com/intro/photo_09.jpg" width="152"><img border="0" src="http://img.69sexual.com/intro/photo_03.gif" width="152" height="110"></p>
        </a>
      </td>
    </tr>
  </tbody>
</table>
<p>¡¡</p>

</body>

</html>

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Wed Nov 28 09:00:50 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA07783
	for <midcom-archive@odin.ietf.org>; Wed, 28 Nov 2001 09:00:50 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id JAA25437
	for midcom-archive@odin.ietf.org; Wed, 28 Nov 2001 09:00:54 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA25012;
	Wed, 28 Nov 2001 08:56:42 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id IAA24985
	for <midcom@optimus.ietf.org>; Wed, 28 Nov 2001 08:56:40 -0500 (EST)
Received: from acmepacket.com (mail1.acmepacket.com [63.67.143.10])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA07493
	for <midcom@ietf.org>; Wed, 28 Nov 2001 08:56:35 -0500 (EST)
Received: from BobP [63.67.143.2] by acmepacket.com
  (SMTPD32-7.04) id AD165AE50038; Wed, 28 Nov 2001 08:56:38 -0500
Message-ID: <004f01c17813$69cae1a0$2300000a@acmepacket.com>
From: "Bob Penfield" <bpenfield@acmepacket.com>
To: "Rohan Mahy" <rohan@cisco.com>,
        "Steve Davies" <sdavies@ridgewaysystems.com>
Cc: <midcom@ietf.org>
References: <200111280123.ACC17422@imop.cisco.com>
Subject: Re: [midcom] pre-midcom - How does TURN work?
Date: Wed, 28 Nov 2001 08:48:50 -0500
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4133.2400
X-Mimeole: Produced By Microsoft MimeOLE V5.50.4133.2400
Content-Transfer-Encoding: 7bit
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 7bit

> >* When a call exists between 2 clients that are behind 2
> different TURN
> >servers, there appears to be a media deadlock. It appears
> from the
> >description, that both TURN servers are waiting for the other
> to send them
> >media before each of them knows where to send media to. Is this
> >interpretation correct?
>
> A user originating an INVITE using a TURN server should
> represent that they can use symmetric RTP in passive mode.
> When a user behind a symmetric NAT receives an INVITE offering
> this, it does not use TURN, it instead sends its media to the
> addresses advertised in SDP (the sender's TURN server).
>
Why would you need to use passive RTP at all? A client uses TURN to allocate
an address on an RTP relay. It puts that allocated address in its SDP. As
long as the client sent the TURN request out the UDP port it wants to
receive RTP on, the TURN relay will send any packets arriving at the
allocated address to the client's RTP port. The client initiated the
outbound "connection" with the TURN request, therefore the firewall/NAT will
allow packets back from the TURN port. The packets outbound from the client
don't need to go through the relay (do they?).

I don't see any deadlock at all. I don't even see a need for passive RTP or
symmetric RTP. Endpoints can send the RTP to the address advertised in the
SDP. If that address is one allocated on a TURN relay, it will be forwarded
to the real endpoint. Am I missing something?


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Wed Nov 28 10:53:15 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA15630
	for <midcom-archive@odin.ietf.org>; Wed, 28 Nov 2001 10:53:14 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id KAA28854
	for midcom-archive@odin.ietf.org; Wed, 28 Nov 2001 10:53:20 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA28776;
	Wed, 28 Nov 2001 10:47:04 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA28749
	for <midcom@optimus.ietf.org>; Wed, 28 Nov 2001 10:47:02 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA15316
	for <midcom@ietf.org>; Wed, 28 Nov 2001 10:46:56 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fASFkUc08817
	for <midcom@ietf.org>; Wed, 28 Nov 2001 07:46:30 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ACB86941;
	Wed, 28 Nov 2001 07:45:33 -0800 (PST)
Message-Id: <5.1.0.14.0.20011128103011.00a568d0@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Wed, 28 Nov 2001 10:49:09 -0500
To: midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Subject: [midcom] Update
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

1) We've completed working group last call on the framework draft
   without finding any serious problems, so the document is going to
   be handed over for IESG review.  Many thanks to Suresh and the
   other authors.
2) The requirements document is also in working group last call.  
   WG last call ends on Monday, 10 December.
3) The pre-midcom discussion has generally been not that productive.
   I think that perhaps it might be more useful if people who are not
   authors on any of the proposed protocols could start identifying
   issues they feel need to be addressed.  One which will bear some
   consideration is whether or not the document which contains 
   encumbered technology is sufficiently superior to the other proposals
   to be able to be considered a candidate under IETF guidelines.
4) We're going to be discussing rechartering at the upcoming IETF
   meeting.  The new charter would be focused on protocol development.
   Presumably, following the patterns in other working groups such as
   AAA, there would be an effort to produce a document discussing
   the suitability of various existing protocols and drawing comparisons
   among them, followed by a decision to select one as a base protocol,
   followed by actual protocol development.  I would very much hate to
   see the working group sidetracked by pre-midcom discussions.
5) I'm throwing a monkey wrench into (4) by asking the working group to
   consider not following the model described in the framework and
   requirements drafts.  In draft-shore-friendly-midcom-00.txt I describe
   a framework for middlebox communication that solves the topology-
   related problems that have plagued us since the outset, that 
   provides a better model for inter-domain operation, that can work
   with multicast, that makes use of the existing IP routing infrastructure,
   that has better security properties, and that I feel is more 
   architecturally sound.  My intent here is not to sandbag the working
   group but to try to make sure that we don't allow procedural rigidity
   to prevent us from doing the right thing technically.  

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Wed Nov 28 17:28:17 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA19351
	for <midcom-archive@odin.ietf.org>; Wed, 28 Nov 2001 17:28:17 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id RAA12845
	for midcom-archive@odin.ietf.org; Wed, 28 Nov 2001 17:28:22 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA12733;
	Wed, 28 Nov 2001 17:16:23 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA12703
	for <midcom@optimus.ietf.org>; Wed, 28 Nov 2001 17:16:21 -0500 (EST)
Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA18260
	for <midcom@ietf.org>; Wed, 28 Nov 2001 17:16:16 -0500 (EST)
Received: from smtprch1.nortel.com (erchg0j.us.nortel.com [47.113.64.103])
	by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id QAA08334
	for <midcom@ietf.org>; Wed, 28 Nov 2001 16:15:42 -0600 (CST)
Received: from zrchb200.us.nortel.com by smtprch1.nortel.com;
          Wed, 28 Nov 2001 16:05:50 -0600
Received: by zrchb200.us.nortel.com with Internet Mail Service (5.5.2653.19) 
          id <XRGVV7ZX>; Wed, 28 Nov 2001 16:09:15 -0600
Message-ID: <933FADF5E673D411B8A30002A5608A0E06F31B@zrc2c012.us.nortel.com>
From: "Sanjoy Sen" <sanjoy@nortelnetworks.com>
To: midcom@ietf.org
Cc: "Sanjoy Sen" <sanjoy@nortelnetworks.com>
Date: Wed, 28 Nov 2001 16:09:16 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
              boundary="----_=_NextPart_001_01C17859.51E1A790"
Subject: [midcom] some points regarding the Sen proposal
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C17859.51E1A790
Content-Type: text/plain;
	charset="iso-8859-1"

All,

   I would like to highlight a few important differences between the Sen
proposal and TURN, FANTOM on the use of the Intermediary-based solution:

1) New protocol development vs NO new protocol development:
An average common practise may go either way, but the cost/complexity issues
for a solution deemed to be near-term need to be clearly analysed. There're
two fundamental requirements here: 1) establish a bind on the Intermediary
and let the endpoint know about it, and 2) establish & keep refreshing the
NAT bind, or settle on a permanently open bind. 

Both TURN, FANTOM rely on a new protocol to capture and transfer the
Intermediary binds. Sen proposal piggy-backs the bind information on the
existing application signaling (this is what makes the Sen proposal appear
SIP specific, but the same principle is applicable to any other signaling
protocol - this will be illustrated in the next version of the draft). No
new protocol is required. 

For refreshing the binds, both the Sen and TURN/STUN proposals rely on
"sacrifice" packets - they leverage on existing application signaling
packets and silence RTP packets (this would work even in the face of silence
suppression as comfort noise packets are almost always generated in existing
codecs; if not, empty RTP packets are used). Again, advantage is that no new
protocol development required. FANTOM either keeps the bind open or rely on
new probe packets. 

2) Use of symmetric RTP:
Sen proposal uses symmetric RTP configuration - which simply means the
client sends and receives RTP packets in the same port. This is a trivial
configuration done in most clients and saves a lot of unwarranted overhead
such as maintaining too many binds (for a single media session, you need 4),
refreshing each of them independently etc. 

3) The Sen proposal does not impose any restriction on the Enterprise NAT/FW
policy. 

4) From complexity perspective, the Sen proposal is equivalent to TURN with
the additional vantage that no new protocol development required. Both Sen
and TURN uses a single Intermediary, while FANTOM uses two signaling & media
proxies. The Sen (and FANTOM?) proposal is primarily targetted towards the
needs of Large/Medium Enterprises and Carriers where media/signaling
route-pinning provides advantages in terms of QoS, billing, security etc.
STUN/TURN offers much more flexibility and economy for residential, SOHO,
SME markets.

5) The use of an existing device control protocol in the Sen proposal
between the signaling Proxy and the Media Proxy makes it closest to a future
Midcom protocol. 

Regards,
Sanjoy
 

------_=_NextPart_001_01C17859.51E1A790
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2654.89">
<TITLE>some points regarding the Sen proposal</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>All,</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp; I would like to highlight a few =
important differences between the Sen proposal and TURN, FANTOM on the =
use of the Intermediary-based solution:</FONT></P>

<P><FONT SIZE=3D2>1) New protocol development vs NO new protocol =
development:</FONT>
<BR><FONT SIZE=3D2>An average common practise may go either way, but =
the cost/complexity issues for a solution deemed to be near-term need =
to be clearly analysed. There're two fundamental requirements here: 1) =
establish a bind on the Intermediary and let the endpoint know about =
it, and 2) establish &amp; keep refreshing the NAT bind, or settle on a =
permanently open bind. </FONT></P>

<P><FONT SIZE=3D2>Both TURN, FANTOM rely on a new protocol to capture =
and transfer the Intermediary binds. Sen proposal piggy-backs the bind =
information on the existing application signaling (this is what makes =
the Sen proposal appear SIP specific, but the same principle is =
applicable to any other signaling protocol - this will be illustrated =
in the next version of the draft). No new protocol is required. =
</FONT></P>

<P><FONT SIZE=3D2>For refreshing the binds, both the Sen and TURN/STUN =
proposals rely on &quot;sacrifice&quot; packets - they leverage on =
existing application signaling packets and silence RTP packets (this =
would work even in the face of silence suppression as comfort noise =
packets are almost always generated in existing codecs; if not, empty =
RTP packets are used). Again, advantage is that no new protocol =
development required. FANTOM either keeps the bind open or rely on new =
probe packets. </FONT></P>

<P><FONT SIZE=3D2>2) Use of symmetric RTP:</FONT>
<BR><FONT SIZE=3D2>Sen proposal uses symmetric RTP configuration - =
which simply means the client sends and receives RTP packets in the =
same port. This is a trivial configuration done in most clients and =
saves a lot of unwarranted overhead such as maintaining too many binds =
(for a single media session, you need 4), refreshing each of them =
independently etc. </FONT></P>

<P><FONT SIZE=3D2>3) The Sen proposal does not impose any restriction =
on the Enterprise NAT/FW policy. </FONT>
</P>

<P><FONT SIZE=3D2>4) From complexity perspective, the Sen proposal is =
equivalent to TURN with the additional vantage that no new protocol =
development required. Both Sen and TURN uses a single Intermediary, =
while FANTOM uses two signaling &amp; media proxies. The Sen (and =
FANTOM?) proposal is primarily targetted towards the needs of =
Large/Medium Enterprises and Carriers where media/signaling =
route-pinning provides advantages in terms of QoS, billing, security =
etc. STUN/TURN offers much more flexibility and economy for =
residential, SOHO, SME markets.</FONT></P>

<P><FONT SIZE=3D2>5) The use of an existing device control protocol in =
the Sen proposal between the signaling Proxy and the Media Proxy makes =
it closest to a future Midcom protocol. </FONT></P>

<P><FONT SIZE=3D2>Regards,</FONT>
<BR><FONT SIZE=3D2>Sanjoy</FONT>
<BR><FONT SIZE=3D2>&nbsp;</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C17859.51E1A790--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Wed Nov 28 19:32:24 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA29425
	for <midcom-archive@odin.ietf.org>; Wed, 28 Nov 2001 19:32:24 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id TAA15600
	for midcom-archive@odin.ietf.org; Wed, 28 Nov 2001 19:32:24 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA15563;
	Wed, 28 Nov 2001 19:30:58 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id TAA15534
	for <midcom@optimus.ietf.org>; Wed, 28 Nov 2001 19:30:55 -0500 (EST)
Received: from mail2.microsoft.com (mail2.microsoft.com [131.107.3.124])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA29276
	for <midcom@ietf.org>; Wed, 28 Nov 2001 19:30:52 -0500 (EST)
Received: from INET-VRS-02.redmond.corp.microsoft.com ([157.54.8.110]) by mail2.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Wed, 28 Nov 2001 16:29:49 -0800
Received: from 157.54.5.25 by INET-VRS-02.redmond.corp.microsoft.com (InterScan E-Mail VirusWall NT); Wed, 28 Nov 2001 16:29:50 -0800
Received: from red-imc-04.redmond.corp.microsoft.com ([157.54.2.168]) by inet-hub-03.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Wed, 28 Nov 2001 16:29:49 -0800
Received: from win-imc-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.84]) by red-imc-04.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Wed, 28 Nov 2001 16:29:49 -0800
Received: from win-msg-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.134]) by win-imc-02.wingroup.windeploy.ntdev.microsoft.com with Microsoft SMTPSVC(6.0.3588.0);
	 Wed, 28 Nov 2001 16:29:09 -0800
X-MimeOLE: Produced By Microsoft Exchange V6.0.6063.0
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Date: Wed, 28 Nov 2001 16:28:52 -0800
Message-ID: <F66A04C29AD9034A8205949AD0C9010401C0E3D1@win-msg-02.wingroup.windeploy.ntdev.microsoft.com>
Thread-Topic: FYI: UPNP Internet Gateway Device
Thread-Index: AcF4WrEwl88DGJCwQAyM/t703B+zbQAEbUlQ
From: "Christian Huitema" <huitema@windows.microsoft.com>
To: <midcom@ietf.org>
X-OriginalArrivalTime: 29 Nov 2001 00:29:09.0255 (UTC) FILETIME=[DC65E170:01C1786C]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by optimus.ietf.org id TAA15535
Subject: [midcom] FYI: UPNP Internet Gateway Device
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 8bit

The UPNP Forum has just published on its web site the recently approved
"Internet Gateway Device" control protocol. Specs can be obtained at:
	http://upnp.org/resources/standards.asp
The UPNP standard specifies how a station in a home network can open
ports and obtain mapping through a "residential gateway." There is
information about support by various companies in the forum's main page,
http://upnp.org/

-- Christian Huitema

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Thu Nov 29 10:28:53 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA12564
	for <midcom-archive@odin.ietf.org>; Thu, 29 Nov 2001 10:28:52 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id KAA16559
	for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 10:28:56 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA16529;
	Thu, 29 Nov 2001 10:27:33 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id KAA16502
	for <midcom@optimus.ietf.org>; Thu, 29 Nov 2001 10:27:31 -0500 (EST)
Received: from sj-msg-core-3.cisco.com (sj-msg-core-3.cisco.com [171.70.157.152])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA12333
	for <midcom@ietf.org>; Thu, 29 Nov 2001 10:27:27 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-3.cisco.com (8.11.3/8.9.1) with ESMTP id fATFOx005085;
	Thu, 29 Nov 2001 07:26:39 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ACC20966;
	Thu, 29 Nov 2001 07:24:09 -0800 (PST)
Message-Id: <5.1.0.14.0.20011129102554.00a66ec0@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Thu, 29 Nov 2001 10:27:47 -0500
To: "Christian Huitema" <huitema@windows.microsoft.com>, <midcom@ietf.org>
From: Melinda Shore <mshore@cisco.com>
Subject: Re: [midcom] FYI: UPNP Internet Gateway Device
In-Reply-To: <F66A04C29AD9034A8205949AD0C9010401C0E3D1@win-msg-02.wingro
 up.windeploy.ntdev.microsoft.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 04:28 PM 11/28/01 -0800, Christian Huitema wrote:
>The UPNP Forum has just published on its web site the recently approved
>"Internet Gateway Device" control protocol. Specs can be obtained at:


People interested in actually playing with it on XP or ME should pick
up a security patch from Microsoft.  Details at:
http://www.securityfocus.com/archive/1/224297

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 29 12:23:15 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23665
	for <midcom-archive@odin.ietf.org>; Thu, 29 Nov 2001 12:23:15 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id MAA21471
	for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 12:23:17 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA21419;
	Thu, 29 Nov 2001 12:21:14 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id MAA21394
	for <midcom@ns.ietf.org>; Thu, 29 Nov 2001 12:21:12 -0500 (EST)
Received: from mail1.microsoft.com (mail1.microsoft.com [131.107.3.125])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23515
	for <midcom@ietf.org>; Thu, 29 Nov 2001 12:21:08 -0500 (EST)
Received: from inet-vrs-01.redmond.corp.microsoft.com ([157.54.8.27]) by mail1.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Thu, 29 Nov 2001 09:19:55 -0800
Received: from 157.54.8.109 by inet-vrs-01.redmond.corp.microsoft.com (InterScan E-Mail VirusWall NT); Thu, 29 Nov 2001 09:19:55 -0800
Received: from red-imc-02.redmond.corp.microsoft.com ([157.54.9.107]) by inet-hub-02.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Thu, 29 Nov 2001 09:19:55 -0800
Received: from win-imc-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.84]) by red-imc-02.redmond.corp.microsoft.com with Microsoft SMTPSVC(5.0.2195.2966);
	 Thu, 29 Nov 2001 09:19:49 -0800
Received: from win-msg-02.wingroup.windeploy.ntdev.microsoft.com ([157.54.0.134]) by win-imc-02.wingroup.windeploy.ntdev.microsoft.com with Microsoft SMTPSVC(6.0.3588.0);
	 Thu, 29 Nov 2001 09:19:07 -0800
X-MimeOLE: Produced By Microsoft Exchange V6.0.6063.0
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Subject: RE: [midcom] FYI: UPNP Internet Gateway Device
Date: Thu, 29 Nov 2001 09:19:06 -0800
Message-ID: <F66A04C29AD9034A8205949AD0C9010401C0E3D3@win-msg-02.wingroup.windeploy.ntdev.microsoft.com>
Thread-Topic: [midcom] FYI: UPNP Internet Gateway Device
Thread-Index: AcF46jA0+IdR3S/TSoKtpnH4EyC30AADuyLw
From: "Christian Huitema" <huitema@windows.microsoft.com>
To: "Melinda Shore" <mshore@cisco.com>, <midcom@ietf.org>
X-OriginalArrivalTime: 29 Nov 2001 17:19:07.0360 (UTC) FILETIME=[F3AEE600:01C178F9]
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by optimus.ietf.org id MAA21395
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org
Content-Transfer-Encoding: 8bit

> At 04:28 PM 11/28/01 -0800, Christian Huitema wrote:
> >The UPNP Forum has just published on its web site the recently
> approved
> >"Internet Gateway Device" control protocol. Specs can be obtained at:
> 
> 
> People interested in actually playing with it on XP or ME should pick
> up a security patch from Microsoft.  Details at:
> http://www.securityfocus.com/archive/1/224297

Melinda,

I was careful to only point at the documentation, not specific products.
UPNP Internet Gateway is indeed supported by Windows XP, and is used in
services such as DirectPlay, Remote assistance or Messenger. It allows
for example Messenger users to set up a direct multi-media call, even if
both caller and responders are behind a NAT -- if both NAT support the
service. The bug that you mention is not directly related to the
Internet Gateway device, but rather to the generic UPNP code -- and it
is certainly not related to the specification of the service. In any
case, the patch is automatically installed through Windows Update when
you install XP, and can be downloaded through Windows Update at any
time.

-- Christian Huitema

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 29 14:53:26 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA06715
	for <midcom-archive@odin.ietf.org>; Thu, 29 Nov 2001 14:53:25 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id OAA26831
	for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 14:53:27 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA26748;
	Thu, 29 Nov 2001 14:51:34 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id OAA26717
	for <midcom@ns.ietf.org>; Thu, 29 Nov 2001 14:51:32 -0500 (EST)
Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA06546
	for <midcom@ietf.org>; Thu, 29 Nov 2001 14:51:29 -0500 (EST)
Received: from smtprch1.nortel.com (erchg0j.us.nortel.com [47.113.64.103])
	by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id NAA10609
	for <midcom@ietf.org>; Thu, 29 Nov 2001 13:50:59 -0600 (CST)
Received: from zrchb200.us.nortel.com by smtprch1.nortel.com;
          Thu, 29 Nov 2001 13:45:54 -0600
Received: by zrchb200.us.nortel.com with Internet Mail Service (5.5.2653.19) 
          id <X6VK9NZC>; Thu, 29 Nov 2001 13:49:24 -0600
Message-ID: <933FADF5E673D411B8A30002A5608A0E06F320@zrc2c012.us.nortel.com>
From: "Sanjoy Sen" <sanjoy@nortelnetworks.com>
To: "'Melinda Shore'" <mshore@cisco.com>, midcom@ietf.org
Subject: RE: [midcom] Update
Date: Thu, 29 Nov 2001 13:49:21 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
              boundary="----_=_NextPart_001_01C1790E.F0BEBE60"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C1790E.F0BEBE60
Content-Type: text/plain;
	charset="iso-8859-1"

Melinda,

    Regarding your point # 4) below, we had previously submitted two
applicability drafts - one on COPS and the other on MEGACO - discussing the
suitability of these for Midcom (at that time, they're beyond the scope of
the Charter). The -00 versions of these drafts could be found at 
http://search.ietf.org/internet-drafts/draft-sct-midcom-megaco-00.txt
http://search.ietf.org/internet-drafts/draft-aoun-midcom-cops-00.txt

and will be soon updated reflecting the latest requirements/framework drafts
and some offline discussions.

These drafts had already began doing some of the legwork that you mentioned
and should also be considered in the context of the re-chartering.

Regards,
Sanjoy
 

> -----Original Message-----
> From: Melinda Shore [mailto:mshore@cisco.com]
> Sent: Wednesday, November 28, 2001 9:49 AM
> To: midcom@ietf.org
> Subject: [midcom] Update
> 
> 
> 1) We've completed working group last call on the framework draft
>    without finding any serious problems, so the document is going to
>    be handed over for IESG review.  Many thanks to Suresh and the
>    other authors.
> 2) The requirements document is also in working group last call.  
>    WG last call ends on Monday, 10 December.
> 3) The pre-midcom discussion has generally been not that productive.
>    I think that perhaps it might be more useful if people who are not
>    authors on any of the proposed protocols could start identifying
>    issues they feel need to be addressed.  One which will bear some
>    consideration is whether or not the document which contains 
>    encumbered technology is sufficiently superior to the 
> other proposals
>    to be able to be considered a candidate under IETF guidelines.
> 4) We're going to be discussing rechartering at the upcoming IETF
>    meeting.  The new charter would be focused on protocol development.
>    Presumably, following the patterns in other working groups such as
>    AAA, there would be an effort to produce a document discussing
>    the suitability of various existing protocols and drawing 
> comparisons
>    among them, followed by a decision to select one as a base 
> protocol,
>    followed by actual protocol development.  I would very much hate to
>    see the working group sidetracked by pre-midcom discussions.
> 5) I'm throwing a monkey wrench into (4) by asking the 
> working group to
>    consider not following the model described in the framework and
>    requirements drafts.  In 
> draft-shore-friendly-midcom-00.txt I describe
>    a framework for middlebox communication that solves the topology-
>    related problems that have plagued us since the outset, that 
>    provides a better model for inter-domain operation, that can work
>    with multicast, that makes use of the existing IP routing 
> infrastructure,
>    that has better security properties, and that I feel is more 
>    architecturally sound.  My intent here is not to sandbag 
> the working
>    group but to try to make sure that we don't allow 
> procedural rigidity
>    to prevent us from doing the right thing technically.  
> 
> Melinda
> 
> 
> _______________________________________________
> midcom mailing list
> midcom@ietf.org
> http://www1.ietf.org/mailman/listinfo/midcom
> 

------_=_NextPart_001_01C1790E.F0BEBE60
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2654.89">
<TITLE>RE: [midcom] Update</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Melinda,</FONT>
</P>

<P><FONT SIZE=3D2>&nbsp;&nbsp;&nbsp; Regarding your point # 4) below, =
we had previously submitted two applicability drafts - one on COPS and =
the other on MEGACO - discussing the suitability of these for Midcom =
(at that time, they're beyond the scope of the Charter). The -00 =
versions of these drafts could be found at </FONT></P>

<P><FONT SIZE=3D2><A =
HREF=3D"http://search.ietf.org/internet-drafts/draft-sct-midcom-megaco-0=
0.txt" =
TARGET=3D"_blank">http://search.ietf.org/internet-drafts/draft-sct-midco=
m-megaco-00.txt</A></FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"http://search.ietf.org/internet-drafts/draft-aoun-midcom-cops-00=
.txt" =
TARGET=3D"_blank">http://search.ietf.org/internet-drafts/draft-aoun-midc=
om-cops-00.txt</A></FONT>
</P>

<P><FONT SIZE=3D2>and will be soon updated reflecting the latest =
requirements/framework drafts and some offline discussions.</FONT>
</P>

<P><FONT SIZE=3D2>These drafts had already began doing some of the =
legwork that you mentioned and should also be considered in the context =
of the re-chartering.</FONT></P>

<P><FONT SIZE=3D2>Regards,</FONT>
<BR><FONT SIZE=3D2>Sanjoy</FONT>
<BR><FONT SIZE=3D2>&nbsp;</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Melinda Shore [<A =
HREF=3D"mailto:mshore@cisco.com">mailto:mshore@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Wednesday, November 28, 2001 9:49 =
AM</FONT>
<BR><FONT SIZE=3D2>&gt; To: midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: [midcom] Update</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; 1) We've completed working group last call on =
the framework draft</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; without finding any serious =
problems, so the document is going to</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; be handed over for IESG =
review.&nbsp; Many thanks to Suresh and the</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; other authors.</FONT>
<BR><FONT SIZE=3D2>&gt; 2) The requirements document is also in working =
group last call.&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; WG last call ends on Monday, =
10 December.</FONT>
<BR><FONT SIZE=3D2>&gt; 3) The pre-midcom discussion has generally been =
not that productive.</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; I think that perhaps it might =
be more useful if people who are not</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; authors on any of the =
proposed protocols could start identifying</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; issues they feel need to be =
addressed.&nbsp; One which will bear some</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; consideration is whether or =
not the document which contains </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; encumbered technology is =
sufficiently superior to the </FONT>
<BR><FONT SIZE=3D2>&gt; other proposals</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; to be able to be considered a =
candidate under IETF guidelines.</FONT>
<BR><FONT SIZE=3D2>&gt; 4) We're going to be discussing rechartering at =
the upcoming IETF</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; meeting.&nbsp; The new =
charter would be focused on protocol development.</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; Presumably, following the =
patterns in other working groups such as</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; AAA, there would be an effort =
to produce a document discussing</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; the suitability of various =
existing protocols and drawing </FONT>
<BR><FONT SIZE=3D2>&gt; comparisons</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; among them, followed by a =
decision to select one as a base </FONT>
<BR><FONT SIZE=3D2>&gt; protocol,</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; followed by actual protocol =
development.&nbsp; I would very much hate to</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; see the working group =
sidetracked by pre-midcom discussions.</FONT>
<BR><FONT SIZE=3D2>&gt; 5) I'm throwing a monkey wrench into (4) by =
asking the </FONT>
<BR><FONT SIZE=3D2>&gt; working group to</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; consider not following the =
model described in the framework and</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; requirements drafts.&nbsp; In =
</FONT>
<BR><FONT SIZE=3D2>&gt; draft-shore-friendly-midcom-00.txt I =
describe</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; a framework for middlebox =
communication that solves the topology-</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; related problems that have =
plagued us since the outset, that </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; provides a better model for =
inter-domain operation, that can work</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; with multicast, that makes =
use of the existing IP routing </FONT>
<BR><FONT SIZE=3D2>&gt; infrastructure,</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; that has better security =
properties, and that I feel is more </FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; architecturally sound.&nbsp; =
My intent here is not to sandbag </FONT>
<BR><FONT SIZE=3D2>&gt; the working</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; group but to try to make sure =
that we don't allow </FONT>
<BR><FONT SIZE=3D2>&gt; procedural rigidity</FONT>
<BR><FONT SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp; to prevent us from doing the =
right thing technically.&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Melinda</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; =
_______________________________________________</FONT>
<BR><FONT SIZE=3D2>&gt; midcom mailing list</FONT>
<BR><FONT SIZE=3D2>&gt; midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>&gt; <A =
HREF=3D"http://www1.ietf.org/mailman/listinfo/midcom" =
TARGET=3D"_blank">http://www1.ietf.org/mailman/listinfo/midcom</A></FONT=
>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C1790E.F0BEBE60--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 29 15:03:41 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA07439
	for <midcom-archive@odin.ietf.org>; Thu, 29 Nov 2001 15:03:41 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA27388
	for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 15:03:43 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA27364;
	Thu, 29 Nov 2001 15:02:24 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA27335
	for <midcom@ns.ietf.org>; Thu, 29 Nov 2001 15:02:22 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA07337
	for <midcom@ietf.org>; Thu, 29 Nov 2001 15:02:19 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fATK1pc11042;
	Thu, 29 Nov 2001 12:01:51 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ACC30396;
	Thu, 29 Nov 2001 12:00:54 -0800 (PST)
Message-Id: <5.1.0.14.0.20011129150346.00a27140@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Thu, 29 Nov 2001 15:04:28 -0500
To: "Sanjoy Sen" <sanjoy@nortelnetworks.com>, midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] Update
In-Reply-To: <933FADF5E673D411B8A30002A5608A0E06F320@zrc2c012.us.nortel.
 com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 01:49 PM 11/29/01 -0600, Sanjoy Sen wrote:
>These drafts had already began doing some of the legwork that you mentioned and should also be considered in the context of the re-chartering.

We will not be discussing protocol selection in Salt Lake City.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 29 15:30:33 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA09311
	for <midcom-archive@odin.ietf.org>; Thu, 29 Nov 2001 15:30:29 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id PAA28095
	for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 15:30:31 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA27875;
	Thu, 29 Nov 2001 15:29:12 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id PAA27848
	for <midcom@ns.ietf.org>; Thu, 29 Nov 2001 15:29:11 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA09178
	for <midcom@ietf.org>; Thu, 29 Nov 2001 15:29:07 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fATKSdc06056;
	Thu, 29 Nov 2001 12:28:39 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ACC31422;
	Thu, 29 Nov 2001 12:27:42 -0800 (PST)
Message-Id: <5.1.0.14.0.20011129152453.00a4e8e0@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Thu, 29 Nov 2001 15:31:13 -0500
To: "Sanjoy Sen" <sanjoy@nortelnetworks.com>, midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] Update
In-Reply-To: <5.1.0.14.0.20011129150346.00a27140@localhost>
References: <933FADF5E673D411B8A30002A5608A0E06F320@zrc2c012.us.nortel. com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 03:04 PM 11/29/01 -0500, Melinda Shore wrote:
>At 01:49 PM 11/29/01 -0600, Sanjoy Sen wrote:
>>These drafts had already began doing some of the legwork that you mentioned and should also be considered in the context of the re-chartering.
>We will not be discussing protocol selection in Salt Lake City.

Sorry - running on pretty much no sleep.  What I meant to say
is that we will not be doing protocol selection as part of the
rechartering process.  The rechartering discussion is to 
discuss the rechartering process itself, to identify what work
will need to be done and when, to begin to clearly define 
deliverables, etc.  We also need to discuss whether or not the
alternative framework I'm proposing is more technically sound
than the current framework.  One of the ADs will be chairing
that discussion in the Salt Lake City meeting.  Presumably the
work that you and others have already done in discussing the
applicability of various protocols will be incorporated into
a protocols evaluation document if we do go forward with the
current framework.  It's just not in scope yet and not relevant
to the rechartering process discussion.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 29 16:10:55 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA12486
	for <midcom-archive@odin.ietf.org>; Thu, 29 Nov 2001 16:10:55 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id QAA29129
	for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 16:10:57 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA29065;
	Thu, 29 Nov 2001 16:03:30 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id QAA29036
	for <midcom@ns.ietf.org>; Thu, 29 Nov 2001 16:03:28 -0500 (EST)
Received: from zrc2s03g.us.nortel.com (h66s122a103n47.user.nortelnetworks.com [47.103.122.66])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA11820
	for <midcom@ietf.org>; Thu, 29 Nov 2001 16:03:24 -0500 (EST)
Received: from smtprch2.nortel.com (erchg0k.us.nortel.com [47.113.64.104])
	by zrc2s03g.us.nortel.com (8.9.3+Sun/8.9.1) with ESMTP id PAA08948
	for <midcom@ietf.org>; Thu, 29 Nov 2001 15:02:56 -0600 (CST)
Received: from zrchb200.us.nortel.com by smtprch2.nortel.com;
          Thu, 29 Nov 2001 14:55:50 -0600
Received: by zrchb200.us.nortel.com with Internet Mail Service (5.5.2653.19) 
          id <X6VK9PWF>; Thu, 29 Nov 2001 15:01:36 -0600
Message-ID: <933FADF5E673D411B8A30002A5608A0E06F322@zrc2c012.us.nortel.com>
From: "Sanjoy Sen" <sanjoy@nortelnetworks.com>
To: "'Melinda Shore'" <mshore@cisco.com>, midcom@ietf.org
Subject: RE: [midcom] Update
Date: Thu, 29 Nov 2001 15:01:35 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
              boundary="----_=_NextPart_001_01C17919.07E13EB0"
X-Orig: <sanjoy@americasm01.nt.com>
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C17919.07E13EB0
Content-Type: text/plain;
	charset="iso-8859-1"



> -----Original Message-----
> From: Melinda Shore [mailto:mshore@cisco.com]
> Sent: Thursday, November 29, 2001 2:31 PM
> To: Sen, Sanjoy [NGB:B692:EXCH]; midcom@ietf.org
> Subject: RE: [midcom] Update
> 
> 
> At 03:04 PM 11/29/01 -0500, Melinda Shore wrote:
> >At 01:49 PM 11/29/01 -0600, Sanjoy Sen wrote:
> >>These drafts had already began doing some of the legwork 
> that you mentioned and should also be considered in the 
> context of the re-chartering.
> >We will not be discussing protocol selection in Salt Lake City.
> 
> Sorry - running on pretty much no sleep.  

That's OK. Being a brand new dad myself, I share the same state:)

> We also need to discuss whether or not the
> alternative framework I'm proposing is more technically sound
> than the current framework.  One of the ADs will be chairing
> that discussion in the Salt Lake City meeting.  

Can you do that? I mean, can you present an alternate framework when 
the original framework draft has completed its last call? I guess you can, 
because that's what you're doing. What I'm not sure about is how can we even
compare
the merits/demerits of these two frameworks within the short timeframe of
the
meeting and reach a conclusion. Also, what bothers me is that while the
original
framework is pretty much stable, the new one proposed by you is pretty much
an idea. 
What would be some of the comparison metrics? This looks like another new
Charter
work-item to me!

Regards,
Sanjoy
 

------_=_NextPart_001_01C17919.07E13EB0
Content-Type: text/html;
	charset="iso-8859-1"

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2654.89">
<TITLE>RE: [midcom] Update</TITLE>
</HEAD>
<BODY>
<BR>
<BR>

<P><FONT SIZE=2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=2>&gt; From: Melinda Shore [<A HREF="mailto:mshore@cisco.com">mailto:mshore@cisco.com</A>]</FONT>
<BR><FONT SIZE=2>&gt; Sent: Thursday, November 29, 2001 2:31 PM</FONT>
<BR><FONT SIZE=2>&gt; To: Sen, Sanjoy [NGB:B692:EXCH]; midcom@ietf.org</FONT>
<BR><FONT SIZE=2>&gt; Subject: RE: [midcom] Update</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; At 03:04 PM 11/29/01 -0500, Melinda Shore wrote:</FONT>
<BR><FONT SIZE=2>&gt; &gt;At 01:49 PM 11/29/01 -0600, Sanjoy Sen wrote:</FONT>
<BR><FONT SIZE=2>&gt; &gt;&gt;These drafts had already began doing some of the legwork </FONT>
<BR><FONT SIZE=2>&gt; that you mentioned and should also be considered in the </FONT>
<BR><FONT SIZE=2>&gt; context of the re-chartering.</FONT>
<BR><FONT SIZE=2>&gt; &gt;We will not be discussing protocol selection in Salt Lake City.</FONT>
<BR><FONT SIZE=2>&gt; </FONT>
<BR><FONT SIZE=2>&gt; Sorry - running on pretty much no sleep.&nbsp; </FONT>
</P>

<P><FONT SIZE=2>That's OK. Being a brand new dad myself, I share the same state:)</FONT>
</P>

<P><FONT SIZE=2>&gt; We also need to discuss whether or not the</FONT>
<BR><FONT SIZE=2>&gt; alternative framework I'm proposing is more technically sound</FONT>
<BR><FONT SIZE=2>&gt; than the current framework.&nbsp; One of the ADs will be chairing</FONT>
<BR><FONT SIZE=2>&gt; that discussion in the Salt Lake City meeting.&nbsp; </FONT>
</P>

<P><FONT SIZE=2>Can you do that? I mean, can you present an alternate framework when </FONT>
<BR><FONT SIZE=2>the original framework draft has completed its last call? I guess you can, </FONT>
<BR><FONT SIZE=2>because that's what you're doing. What I'm not sure about is how can we even compare</FONT>
<BR><FONT SIZE=2>the merits/demerits of these two frameworks within the short timeframe of the</FONT>
<BR><FONT SIZE=2>meeting and reach a conclusion. Also, what bothers me is that while the original</FONT>
<BR><FONT SIZE=2>framework is pretty much stable, the new one proposed by you is pretty much an idea. </FONT>
<BR><FONT SIZE=2>What would be some of the comparison metrics? This looks like another new Charter</FONT>
<BR><FONT SIZE=2>work-item to me!</FONT>
</P>

<P><FONT SIZE=2>Regards,</FONT>
<BR><FONT SIZE=2>Sanjoy</FONT>
<BR><FONT SIZE=2>&nbsp;</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C17919.07E13EB0--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@ns.ietf.org  Thu Nov 29 17:31:45 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA17966
	for <midcom-archive@odin.ietf.org>; Thu, 29 Nov 2001 17:31:45 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id RAA01897
	for midcom-archive@odin.ietf.org; Thu, 29 Nov 2001 17:31:48 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA01399;
	Thu, 29 Nov 2001 17:27:31 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA01370
	for <midcom@ns.ietf.org>; Thu, 29 Nov 2001 17:27:29 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA17672
	for <midcom@ietf.org>; Thu, 29 Nov 2001 17:27:25 -0500 (EST)
Received: from mira-sjc5-4.cisco.com (mira-sjc5-4.cisco.com [171.71.163.21])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fATMQuc28431;
	Thu, 29 Nov 2001 14:26:57 -0800 (PST)
Received: from spandex.cisco.com (ssh-rtp1.cisco.com [161.44.11.166])
	by mira-sjc5-4.cisco.com (Mirapoint)
	with ESMTP id ACC36150;
	Thu, 29 Nov 2001 14:25:59 -0800 (PST)
Message-Id: <5.1.0.14.0.20011129171844.00a4bb40@localhost>
X-Sender: mshore@localhost
X-Mailer: QUALCOMM Windows Eudora Version 5.1
Date: Thu, 29 Nov 2001 17:29:25 -0500
To: "Sanjoy Sen" <sanjoy@nortelnetworks.com>, midcom@ietf.org
From: Melinda Shore <mshore@cisco.com>
Subject: RE: [midcom] Update
In-Reply-To: <933FADF5E673D411B8A30002A5608A0E06F322@zrc2c012.us.nortel.
 com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

At 03:01 PM 11/29/01 -0600, Sanjoy Sen wrote:
>> We also need to discuss whether or not the 
>> alternative framework I'm proposing is more technically sound 
>> than the current framework.  One of the ADs will be chairing 
>> that discussion in the Salt Lake City meeting.  
>
>Can you do that? I mean, can you present an alternate framework when 
>the original framework draft has completed its last call? I guess you can, 
>because that's what you're doing. What I'm not sure about is how can we even compare 
>the merits/demerits of these two frameworks within the short timeframe of the 
>meeting and reach a conclusion. Also, what bothers me is that while the original 
>framework is pretty much stable, the new one proposed by you is pretty much an idea. 
>What would be some of the comparison metrics? This looks like another new Charter 
>work-item to me! 

I've been trying to be sensitive to the possibility that I'm using 
my position as chair to promote a fringe agenda.  At the same time 
I recently realized that if I were not chairing the working group I'd be
raising a major fuss in the working group and probably with the
IESG about the working group making a bad technical decision
when what I feel is better technology is available.  The topology
discussion and the topology drafts convinced me that we're facing
a very serious problem that cannot be solved in the current
midcom framework.  Our job is to make the network function better
and I don't think that's what we're accomplishing with the work
we've produced.

I did want to get the current framework and requirements finished
up, however.  I think that we need to be able to move ahead quickly
if we do decide to stick with it, and we absolutely need clear
documentation describing the current framework for evaluation by the
IESG and IAB as part of the rechartering process in any event.

I realize that this is an extremely sensitive issue.  I've discussed
it with our area directors, and I hope that if you have serious
objections to looking at a proposed alternative to the existing 
framework you'll raise it here and with them.

Melinda


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov 30 09:57:52 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA14117
	for <midcom-archive@odin.ietf.org>; Fri, 30 Nov 2001 09:57:52 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id JAA05890
	for midcom-archive@odin.ietf.org; Fri, 30 Nov 2001 09:57:55 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA05675;
	Fri, 30 Nov 2001 09:50:51 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA05646
	for <midcom@optimus.ietf.org>; Fri, 30 Nov 2001 09:50:50 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA13708
	for <midcom@ietf.org>; Fri, 30 Nov 2001 09:50:46 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001113014472628528
 ; Fri, 30 Nov 2001 14:47:26 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XQ21F9PP>; Fri, 30 Nov 2001 14:50:07 -0000
Message-ID: <00533D13955AD411AF3800A0C9B426391724C4@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'Sanjoy Sen'" <sanjoy@nortelnetworks.com>,
        "'midcom@ietf.org'" <midcom@ietf.org>
Subject: RE: [midcom] new I-D on "symmetric STUN"
Date: Fri, 30 Nov 2001 14:49:56 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C179AE.470820F0"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C179AE.470820F0
Content-Type: text/plain;
	charset="ISO-8859-1"

Sanjoy,

Thanks for the questions. Answers in-line....

-----Original Message-----
From: Sanjoy Sen [mailto:sanjoy@nortelnetworks.com]
Sent: 27 November 2001 22:33
To: 'Steve Davies'; 'John LaCour'; 'midcom@ietf.org'
Cc: 'Jonathan Rosenberg'
Subject: RE: [midcom] new I-D on "symmetric STUN"


[snip] 
 
> 1) Your App. Proxy is also an RTP Proxy. So for a simple two party call
where both are behind NAPT, 
> the media need to traverse at least 3 RTP proxies. Is this correct?

Ans: The FANTOM client, like the TURN client, may be implemented on the UA,
in which case only the external RTP proxy is traversed, as in your proposal.
The FANTOM client may also be implemented as a standalone system or be
co-resident in an IP-PBX or IAD. In this case you are correct. Why? See 2
below.  
 
> 2) Not sure what you gain by making the media go through the App. Proxy?
For example, in our proposal, 
> we have the terminal send the empty RTP packets (equivalent to your
probes) directly to the Media 
> intermediary in the SP network to establish the media binds. 

Ans: The reason FANTOM is specified in this way is because we felt a
pre-midcom solution should require ABSOLUTELY NO changes (protocol or
behavioural) to enterprise endpoints and should work with existing systems.
FANTOM places NO pre-requisite for symmetric bi-directional, continual RTP.
The FANTOM client is responsible for making outbound UDP connection and the
NAT keep-alives, so the UA can implement uni-directional RTP or silence
suppression if it wishes. A major benefit of the FANTOM client (whether
co-resident or standalone) is that we can minimise the pin-holes required in
the firewall to just a few - our optimal solution is just 3 - one TCP and 2
UDP. With FANTOM, a FW admnistrator can restrict external UDP to just
symmetric UDP to/from the FANTOM server's 2 UDP ports. With your proposal,
the firewall administrator has to work on IP addresses of the RTP proxies,
which means that as the service scales, the administrator is continually
adding  extra IP addresses to the FW access list. The more work the FW
administrator does the greater the chances of error.

The extra hops that FANTOM requires in the enterprise is insignificant in
latency and bandwidth particularly in a switched Ethernet configuration.
 
> 3) For SIP services, your AP and PEA both will house a SIP Proxy function,
RTP Proxy function, as well 
> as your control protocol+ RTP/RTCP probes. What is the implication of
putting all these functions in 
> one box from capacity, fault-tolerance and security p.o.v. ? 

Ans: Only the AP has a SIP or H.323 or MGCP (or...) proxy function. Those
who have attended any of my presentations (VON, SIP Summit etc.) will have
deduced that the functions readily break out and can reside on different
processors so that a distributed fault tolerant architecture can be
implemented if required.
 
> For example, the AP will be doing refreshes for all NAT binds for all RTP
sessions on behalf of all terminals.

Ans: Yes FANTOM is tuned to the network infrastructure obviating the need
for applications to know about it. We have designed the FANTOM probe to be
very distinguishable from media making a silicon or efficient software
implementations possible.

> 4) Are you planning on using a standard protocol as this control protocol?
In Sen proposal, we've used 
> an existing device control protocol. The sen proposal essentially needs no
new protocol development.

Ans: Do you mean between the FANTOM client and the FANTOM server or between
the signalling proxy and the RTP proxy? FANTOM is the control protocol
between client and server. Like you, our philosophy is to use existing
methods where appropriate. But we don't based a solution on having to change
a protocol or terminal behaviour to make it work. That's too hard a sell.
 
> 5) Your requirement for always allowing traffic from some "well-known"
address/port of PEA to the AP 
> in the private network is a big concern. This is typically NOT done in
traditional enterprise FW. 

Ans: On the contrary it is (a) common practice - that's what well know ports
are for, and (b) of huge benefit - our server element may be deployed in an
enterprise DMZ for a non-service provider solution. Neither yours nor TURN
can be - it must always be in the public Internet.
 
> Such a FW will typically close the pin-hole after sometime, hence the need
for signaling path refreshes 
> using PING or REGISTER) both in our scheme and Jonathan's.

Ans: This is the reason we mux the signalling with the control channel. It
removes the need to do lots of refreshes for multiple paths. Again FANTOM
takes care of it on behalf of the terminal.

Steve
 
> Thanks,
> Sanjoy

------_=_NextPart_001_01C179AE.470820F0
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] new I-D on &quot;symmetric STUN&quot;</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Sanjoy,</FONT>
</P>

<P><FONT SIZE=3D2>Thanks for the questions. Answers in-line....</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Sanjoy Sen [<A =
HREF=3D"mailto:sanjoy@nortelnetworks.com">mailto:sanjoy@nortelnetworks.c=
om</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 27 November 2001 22:33</FONT>
<BR><FONT SIZE=3D2>To: 'Steve Davies'; 'John LaCour'; =
'midcom@ietf.org'</FONT>
<BR><FONT SIZE=3D2>Cc: 'Jonathan Rosenberg'</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [midcom] new I-D on &quot;symmetric =
STUN&quot;</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>[snip] </FONT>
<BR><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>&gt; 1) Your App. Proxy is also an RTP Proxy. So for =
a simple two party call where both are behind NAPT, </FONT>
<BR><FONT SIZE=3D2>&gt; the media need to traverse at least 3 RTP =
proxies. Is this correct?</FONT>
</P>

<P><FONT SIZE=3D2>Ans: The FANTOM client, like the TURN client, may be =
implemented on the UA, in which case only the external RTP proxy is =
traversed, as in your proposal. The FANTOM client may also be =
implemented as a standalone system or be co-resident in an IP-PBX or =
IAD. In this case you are correct. Why? See 2 below.&nbsp; </FONT></P>

<P><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>&gt; 2) Not sure what you gain by making the media =
go through the App. Proxy? For example, in our proposal, </FONT>
<BR><FONT SIZE=3D2>&gt; we have the terminal send the empty RTP packets =
(equivalent to your probes) directly to the Media </FONT>
<BR><FONT SIZE=3D2>&gt; intermediary in the SP network to establish the =
media binds. </FONT>
</P>

<P><FONT SIZE=3D2>Ans: The reason FANTOM is specified in this way is =
because we felt a pre-midcom solution should require ABSOLUTELY NO =
changes (protocol or behavioural) to enterprise endpoints and should =
work with existing systems. FANTOM places NO pre-requisite for =
symmetric bi-directional, continual RTP. The FANTOM client is =
responsible for making outbound UDP connection and the NAT keep-alives, =
so the UA can implement uni-directional RTP or silence suppression if =
it wishes. A major benefit of the FANTOM client (whether co-resident or =
standalone) is that we can minimise the pin-holes required in the =
firewall to just a few - our optimal solution is just 3 - one TCP and 2 =
UDP. With FANTOM, a FW admnistrator can restrict external UDP to just =
symmetric UDP to/from the FANTOM server's 2 UDP ports. With your =
proposal, the firewall administrator has to work on IP addresses of the =
RTP proxies, which means that as the service scales, the administrator =
is continually adding&nbsp; extra IP addresses to the FW access list. =
The more work the FW administrator does the greater the chances of =
error.</FONT></P>

<P><FONT SIZE=3D2>The extra hops that FANTOM requires in the enterprise =
is insignificant in latency and bandwidth particularly in a switched =
Ethernet configuration.</FONT></P>

<P><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>&gt; 3) For SIP services, your AP and PEA both will =
house a SIP Proxy function, RTP Proxy function, as well </FONT>
<BR><FONT SIZE=3D2>&gt; as your control protocol+ RTP/RTCP probes. What =
is the implication of putting all these functions in </FONT>
<BR><FONT SIZE=3D2>&gt; one box from capacity, fault-tolerance and =
security p.o.v. ? </FONT>
</P>

<P><FONT SIZE=3D2>Ans: Only the AP has a SIP or H.323 or MGCP (or...) =
proxy function. Those who have attended any of my presentations (VON, =
SIP Summit etc.) will have deduced that the functions readily break out =
and can reside on different processors so that a distributed fault =
tolerant architecture can be implemented if required.</FONT></P>

<P><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>&gt; For example, the AP will be doing refreshes for =
all NAT binds for all RTP sessions on behalf of all terminals.</FONT>
</P>

<P><FONT SIZE=3D2>Ans: Yes FANTOM is tuned to the network =
infrastructure obviating the need for applications to know about it. We =
have designed the FANTOM probe to be very distinguishable from media =
making a silicon or efficient software implementations =
possible.</FONT></P>

<P><FONT SIZE=3D2>&gt; 4) Are you planning on using a standard protocol =
as this control protocol? In Sen proposal, we've used </FONT>
<BR><FONT SIZE=3D2>&gt; an existing device control protocol. The sen =
proposal essentially needs no new protocol development.</FONT>
</P>

<P><FONT SIZE=3D2>Ans: Do you mean between the FANTOM client and the =
FANTOM server or between the signalling proxy and the RTP proxy? FANTOM =
is the control protocol between client and server. Like you, our =
philosophy is to use existing methods where appropriate. But we don't =
based a solution on having to change a protocol or terminal behaviour =
to make it work. That's too hard a sell.</FONT></P>

<P><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>&gt; 5) Your requirement for always allowing traffic =
from some &quot;well-known&quot; address/port of PEA to the AP </FONT>
<BR><FONT SIZE=3D2>&gt; in the private network is a big concern. This =
is typically NOT done in traditional enterprise FW. </FONT>
</P>

<P><FONT SIZE=3D2>Ans: On the contrary it is (a) common practice - =
that's what well know ports are for, and (b) of huge benefit - our =
server element may be deployed in an enterprise DMZ for a non-service =
provider solution. Neither yours nor TURN can be - it must always be in =
the public Internet.</FONT></P>

<P><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>&gt; Such a FW will typically close the pin-hole =
after sometime, hence the need for signaling path refreshes </FONT>
<BR><FONT SIZE=3D2>&gt; using PING or REGISTER) both in our scheme and =
Jonathan's.</FONT>
</P>

<P><FONT SIZE=3D2>Ans: This is the reason we mux the signalling with =
the control channel. It removes the need to do lots of refreshes for =
multiple paths. Again FANTOM takes care of it on behalf of the =
terminal.</FONT></P>

<P><FONT SIZE=3D2>Steve</FONT>
<BR><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>&gt; Thanks,</FONT>
<BR><FONT SIZE=3D2>&gt; Sanjoy</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C179AE.470820F0--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov 30 09:58:13 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA14142
	for <midcom-archive@odin.ietf.org>; Fri, 30 Nov 2001 09:58:13 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id JAA05919
	for midcom-archive@odin.ietf.org; Fri, 30 Nov 2001 09:58:16 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA05618;
	Fri, 30 Nov 2001 09:49:25 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id JAA05546
	for <midcom@optimus.ietf.org>; Fri, 30 Nov 2001 09:49:22 -0500 (EST)
Received: from avgw.vxserver.com (mail.ridgeway-sys.com [194.128.67.178])
	by ietf.org (8.9.1a/8.9.1a) with SMTP id JAA13631
	for <midcom@ietf.org>; Fri, 30 Nov 2001 09:49:18 -0500 (EST)
Received: from ridgeway.ridgeway-sys.com ([10.1.1.1])
 by avgw.vxserver.com (NAVGW 2.5.1.14) with SMTP id M2001113014455622626
 ; Fri, 30 Nov 2001 14:45:56 GMT
Received: by ThisAddressDoesNotExist with Internet Mail Service (5.5.2653.19)
	id <XQ21F9PK>; Fri, 30 Nov 2001 14:48:37 -0000
Message-ID: <00533D13955AD411AF3800A0C9B426391724C3@ThisAddressDoesNotExist>
From: Steve Davies <sdavies@ridgewaysystems.com>
To: "'Rohan Mahy'" <rohan@cisco.com>, midcom@ietf.org
Cc: "'jdrosen@dynamicsoft.com'" <jdrosen@dynamicsoft.com>,
        "'Christian Huitema'" <huitema@windows.microsoft.com>,
        "'jweinberger@dynamicsoft.com'" <jweinberger@dynamicsoft.com>
Subject: RE: [midcom] pre-midcom - How does TURN work?
Date: Fri, 30 Nov 2001 14:48:32 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C179AE.14DEF130"
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C179AE.14DEF130
Content-Type: text/plain;
	charset="ISO-8859-1"

Rohan, 

Thanks for this clarification. This is what I supposed, but I couldn't
deduce it from the text of TURN. In fact, I had falsely assumed that in
comparing TURN with FANTOM I could take TURN in isolation. From your reply,
am I now correct in infering that for your solution to work the following
steps would need to be implemented:

* a UA would implement STUN to determine what type of NAT it is behind
* if it is behind a symmetric NAT then it would implement TCP signaling
instead of UDP
* furthermore the TCP connection is a permanent connection to a SIP Proxy
* if it is behind a symmetric NAT the UA would to be programmed with the NAT
timeout interval
* A public SIP proxy (to which the permanent TCP connection is made) has to
be in the call signalling path (no direct UA to UA calls)
* The public SIP proxy must also use TCP signalling and ignore any tranport
address registered by the UA
* The UA must implement symmetric passive RTP and signal the capability in
SIP. When the UA makes a call, it must authenticate itself with a TURN
server and then ALLOCATE a couple of transport addresses on that TURN
server. The addresses returned are sent to the destination UA. The
orginating UA has to wait to receive RTP/RTCP packets via the TURN server
before it can transmit (because its TURN server's routing table isn't
complete) and then it must ignore the transport addresses sent by the
destination UA, instead transmitting media (RTP and RTCP) via its TURN
server. When the UA receives a call, it must transmit media first before it
can be received and it must transmit to the orginating's TURN server - not
via its own TURN server.
* Both UAs must either turn off silence supression (bandwith wasteful)or
periodically send NAT keep-alives
* Call clearing must be via the public SIP proxy 

Steve

-----Original Message-----
From: Rohan Mahy [mailto:rohan@cisco.com]
Sent: 28 November 2001 01:28
To: Steve Davies
Cc: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; 'Christian Huitema';
'jweinberger@dynamicsoft.com'; midcom@ietf.org
Subject: RE: [midcom] pre-midcom - How does TURN work?




---- Original message ----
>Date: Tue, 27 Nov 2001 23:47:38 -0000
>From: Steve Davies <sdavies@ridgewaysystems.com>  
>Subject: RE: [midcom] pre-midcom - How does TURN work?  
>To: "'jdrosen@dynamicsoft.com'" <jdrosen@dynamicsoft.com>,
"'rohan@cisco.com'" <rohan@cisco.com>, "'Christian
Huitema'"<huitema@windows.microsoft.com>,
"'jweinberger@dynamicsoft.com'" <jweinberger@dynamicsoft.com>
>Cc: midcom@ietf.org
>
>All,
>
>By way of clarification of the first question, when I say
'behind' I mean
>the central registrar is on the public side of the TURN
Server, viz: TURN
>Client<->NAT<->TURN Server<->Central Registrar<->etc. So the
client must go
>through TURN to get to the registrar - a typical managed
service deployment.
>
>Hopefully the other questions are clear.
>
>Steve
>
>
>-----Original Message-----
>From: Steve Davies [mailto:sdavies@ridgewaysystems.com]
>Sent: 27 November 2001 18:19
>To: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; 'Christian
Huitema';
>'jweinberger@dynamicsoft.com'
>Cc: midcom@ietf.org
>Subject: [midcom] pre-midcom - How does TURN work?
>
>
>Jonathan, Joel, Christian and Rohan, 
>Please explain how you expect the following to work within TURN: 
>* How does a client register with a central registrar behind
the TURN
>server. The ALLOCATE method obtains a public transport
address to represent
>the client, but how does the registration request get
forwarded from the
>TURN server to the central registrar?

There is no need to use TURN to communicate with a SIP Server.
 SIP over TCP or TLS works fine as specified in bis.  SIP over
UDP  must use the rport Via parameter specified in
draft-ietf-sip-nat-00.txt

MGCP and H.323 both use TCP, so they are likewise OK for
signaling.

>* When a call exists between 2 clients that are behind 2
different TURN
>servers, there appears to be a media deadlock. It appears
from the
>description, that both TURN servers are waiting for the other
to send them
>media before each of them knows where to send media to. Is this
>interpretation correct?

A user originating an INVITE using a TURN server should
represent that they can use symmetric RTP in passive mode. 
When a user behind a symmetric NAT receives an INVITE offering
this, it does not use TURN, it instead sends its media to the
addresses advertised in SDP (the sender's TURN server).

>* What is your solution for RTP port pairing?

This is an area where we need to write a concrete proposal. 
We had some discussions about this when STUN/TURN where part
of the same proposal, but we never closed on a syntax. 
Basically the approach would involve including a parameter in
the first Allocate request to hold the next address for a
short period of time.  The second request would contain some
information from the previous request (for example the next
expected MAPPED-ADDRESS parameter).
 
>* How do you expect to prevent NATs from timing out on both
the 'in-bound signaling' connection

either use TCP/TLS, or send a sacrifice packet periodically to
keep the mapping fresh.  This sacrifice could be an OPTIONS
with max-forwards of 0, a PING as in the Nortel proposal, etc.

>and for media in the presence of silence suppression?

endpoints should send empty RTP packets periodically if no RTP
is  sent.  likewise with RTCP announcements.
 
>It would also really be nice to see the detail of a proper
call flow - SIP
>or H.323 will suffice. Until we see how TURN is expected to
work it is
>difficult to make a like-for-like comparison with FANTOM and
have a proper
>debate on the pros and cons of various methods.
>Thanks. 
>Steve 

Agreed.

thanks,
-rohan

------_=_NextPart_001_01C179AE.14DEF130
Content-Type: text/html;
	charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3DISO-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2653.12">
<TITLE>RE: [midcom] pre-midcom - How does TURN work?</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Rohan, </FONT>
</P>

<P><FONT SIZE=3D2>Thanks for this clarification. This is what I =
supposed, but I couldn't deduce it from the text of TURN. In fact, I =
had falsely assumed that in comparing TURN with FANTOM I could take =
TURN in isolation. From your reply, am I now correct in infering that =
for your solution to work the following steps would need to be =
implemented:</FONT></P>

<P><FONT SIZE=3D2>* a UA would implement STUN to determine what type of =
NAT it is behind</FONT>
<BR><FONT SIZE=3D2>* if it is behind a symmetric NAT then it would =
implement TCP signaling instead of UDP</FONT>
<BR><FONT SIZE=3D2>* furthermore the TCP connection is a permanent =
connection to a SIP Proxy</FONT>
<BR><FONT SIZE=3D2>* if it is behind a symmetric NAT the UA would to be =
programmed with the NAT timeout interval</FONT>
<BR><FONT SIZE=3D2>* A public SIP proxy (to which the permanent TCP =
connection is made) has to be in the call signalling path (no direct UA =
to UA calls)</FONT></P>

<P><FONT SIZE=3D2>* The public SIP proxy must also use TCP signalling =
and ignore any tranport address registered by the UA</FONT>
<BR><FONT SIZE=3D2>* The UA must implement symmetric passive RTP and =
signal the capability in SIP. When the UA makes a call, it must =
authenticate itself with a TURN server and then ALLOCATE a couple of =
transport addresses on that TURN server. The addresses returned are =
sent to the destination UA. The orginating UA has to wait to receive =
RTP/RTCP packets via the TURN server before it can transmit (because =
its TURN server's routing table isn't complete) and then it must ignore =
the transport addresses sent by the destination UA, instead =
transmitting media (RTP and RTCP) via its TURN server. When the UA =
receives a call, it must transmit media first before it can be received =
and it must transmit to the orginating's TURN server - not via its own =
TURN server.</FONT></P>

<P><FONT SIZE=3D2>* Both UAs must either turn off silence supression =
(bandwith wasteful)or periodically send NAT keep-alives</FONT>
<BR><FONT SIZE=3D2>* Call clearing must be via the public SIP proxy =
</FONT>
</P>

<P><FONT SIZE=3D2>Steve</FONT>
</P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: Rohan Mahy [<A =
HREF=3D"mailto:rohan@cisco.com">mailto:rohan@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>Sent: 28 November 2001 01:28</FONT>
<BR><FONT SIZE=3D2>To: Steve Davies</FONT>
<BR><FONT SIZE=3D2>Cc: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; =
'Christian Huitema';</FONT>
<BR><FONT SIZE=3D2>'jweinberger@dynamicsoft.com'; =
midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [midcom] pre-midcom - How does TURN =
work?</FONT>
</P>
<BR>
<BR>
<BR>

<P><FONT SIZE=3D2>---- Original message ----</FONT>
<BR><FONT SIZE=3D2>&gt;Date: Tue, 27 Nov 2001 23:47:38 -0000</FONT>
<BR><FONT SIZE=3D2>&gt;From: Steve Davies =
&lt;sdavies@ridgewaysystems.com&gt;&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt;Subject: RE: [midcom] pre-midcom - How does TURN =
work?&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt;To: &quot;'jdrosen@dynamicsoft.com'&quot; =
&lt;jdrosen@dynamicsoft.com&gt;,</FONT>
<BR><FONT SIZE=3D2>&quot;'rohan@cisco.com'&quot; =
&lt;rohan@cisco.com&gt;, &quot;'Christian</FONT>
<BR><FONT =
SIZE=3D2>Huitema'&quot;&lt;huitema@windows.microsoft.com&gt;,</FONT>
<BR><FONT SIZE=3D2>&quot;'jweinberger@dynamicsoft.com'&quot; =
&lt;jweinberger@dynamicsoft.com&gt;</FONT>
<BR><FONT SIZE=3D2>&gt;Cc: midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt;All,</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt;By way of clarification of the first question, =
when I say</FONT>
<BR><FONT SIZE=3D2>'behind' I mean</FONT>
<BR><FONT SIZE=3D2>&gt;the central registrar is on the public side of =
the TURN</FONT>
<BR><FONT SIZE=3D2>Server, viz: TURN</FONT>
<BR><FONT SIZE=3D2>&gt;Client&lt;-&gt;NAT&lt;-&gt;TURN =
Server&lt;-&gt;Central Registrar&lt;-&gt;etc. So the</FONT>
<BR><FONT SIZE=3D2>client must go</FONT>
<BR><FONT SIZE=3D2>&gt;through TURN to get to the registrar - a typical =
managed</FONT>
<BR><FONT SIZE=3D2>service deployment.</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt;Hopefully the other questions are clear.</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt;Steve</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt;-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt;From: Steve Davies [<A =
HREF=3D"mailto:sdavies@ridgewaysystems.com">mailto:sdavies@ridgewaysyste=
ms.com</A>]</FONT>
<BR><FONT SIZE=3D2>&gt;Sent: 27 November 2001 18:19</FONT>
<BR><FONT SIZE=3D2>&gt;To: 'jdrosen@dynamicsoft.com'; =
'rohan@cisco.com'; 'Christian</FONT>
<BR><FONT SIZE=3D2>Huitema';</FONT>
<BR><FONT SIZE=3D2>&gt;'jweinberger@dynamicsoft.com'</FONT>
<BR><FONT SIZE=3D2>&gt;Cc: midcom@ietf.org</FONT>
<BR><FONT SIZE=3D2>&gt;Subject: [midcom] pre-midcom - How does TURN =
work?</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt;</FONT>
<BR><FONT SIZE=3D2>&gt;Jonathan, Joel, Christian and Rohan, </FONT>
<BR><FONT SIZE=3D2>&gt;Please explain how you expect the following to =
work within TURN: </FONT>
<BR><FONT SIZE=3D2>&gt;* How does a client register with a central =
registrar behind</FONT>
<BR><FONT SIZE=3D2>the TURN</FONT>
<BR><FONT SIZE=3D2>&gt;server. The ALLOCATE method obtains a public =
transport</FONT>
<BR><FONT SIZE=3D2>address to represent</FONT>
<BR><FONT SIZE=3D2>&gt;the client, but how does the registration =
request get</FONT>
<BR><FONT SIZE=3D2>forwarded from the</FONT>
<BR><FONT SIZE=3D2>&gt;TURN server to the central registrar?</FONT>
</P>

<P><FONT SIZE=3D2>There is no need to use TURN to communicate with a =
SIP Server.</FONT>
<BR><FONT SIZE=3D2>&nbsp;SIP over TCP or TLS works fine as specified in =
bis.&nbsp; SIP over</FONT>
<BR><FONT SIZE=3D2>UDP&nbsp; must use the rport Via parameter specified =
in</FONT>
<BR><FONT SIZE=3D2>draft-ietf-sip-nat-00.txt</FONT>
</P>

<P><FONT SIZE=3D2>MGCP and H.323 both use TCP, so they are likewise OK =
for</FONT>
<BR><FONT SIZE=3D2>signaling.</FONT>
</P>

<P><FONT SIZE=3D2>&gt;* When a call exists between 2 clients that are =
behind 2</FONT>
<BR><FONT SIZE=3D2>different TURN</FONT>
<BR><FONT SIZE=3D2>&gt;servers, there appears to be a media deadlock. =
It appears</FONT>
<BR><FONT SIZE=3D2>from the</FONT>
<BR><FONT SIZE=3D2>&gt;description, that both TURN servers are waiting =
for the other</FONT>
<BR><FONT SIZE=3D2>to send them</FONT>
<BR><FONT SIZE=3D2>&gt;media before each of them knows where to send =
media to. Is this</FONT>
<BR><FONT SIZE=3D2>&gt;interpretation correct?</FONT>
</P>

<P><FONT SIZE=3D2>A user originating an INVITE using a TURN server =
should</FONT>
<BR><FONT SIZE=3D2>represent that they can use symmetric RTP in passive =
mode. </FONT>
<BR><FONT SIZE=3D2>When a user behind a symmetric NAT receives an =
INVITE offering</FONT>
<BR><FONT SIZE=3D2>this, it does not use TURN, it instead sends its =
media to the</FONT>
<BR><FONT SIZE=3D2>addresses advertised in SDP (the sender's TURN =
server).</FONT>
</P>

<P><FONT SIZE=3D2>&gt;* What is your solution for RTP port =
pairing?</FONT>
</P>

<P><FONT SIZE=3D2>This is an area where we need to write a concrete =
proposal. </FONT>
<BR><FONT SIZE=3D2>We had some discussions about this when STUN/TURN =
where part</FONT>
<BR><FONT SIZE=3D2>of the same proposal, but we never closed on a =
syntax. </FONT>
<BR><FONT SIZE=3D2>Basically the approach would involve including a =
parameter in</FONT>
<BR><FONT SIZE=3D2>the first Allocate request to hold the next address =
for a</FONT>
<BR><FONT SIZE=3D2>short period of time.&nbsp; The second request would =
contain some</FONT>
<BR><FONT SIZE=3D2>information from the previous request (for example =
the next</FONT>
<BR><FONT SIZE=3D2>expected MAPPED-ADDRESS parameter).</FONT>
<BR><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>&gt;* How do you expect to prevent NATs from timing =
out on both</FONT>
<BR><FONT SIZE=3D2>the 'in-bound signaling' connection</FONT>
</P>

<P><FONT SIZE=3D2>either use TCP/TLS, or send a sacrifice packet =
periodically to</FONT>
<BR><FONT SIZE=3D2>keep the mapping fresh.&nbsp; This sacrifice could =
be an OPTIONS</FONT>
<BR><FONT SIZE=3D2>with max-forwards of 0, a PING as in the Nortel =
proposal, etc.</FONT>
</P>

<P><FONT SIZE=3D2>&gt;and for media in the presence of silence =
suppression?</FONT>
</P>

<P><FONT SIZE=3D2>endpoints should send empty RTP packets periodically =
if no RTP</FONT>
<BR><FONT SIZE=3D2>is&nbsp; sent.&nbsp; likewise with RTCP =
announcements.</FONT>
<BR><FONT SIZE=3D2>&nbsp;</FONT>
<BR><FONT SIZE=3D2>&gt;It would also really be nice to see the detail =
of a proper</FONT>
<BR><FONT SIZE=3D2>call flow - SIP</FONT>
<BR><FONT SIZE=3D2>&gt;or H.323 will suffice. Until we see how TURN is =
expected to</FONT>
<BR><FONT SIZE=3D2>work it is</FONT>
<BR><FONT SIZE=3D2>&gt;difficult to make a like-for-like comparison =
with FANTOM and</FONT>
<BR><FONT SIZE=3D2>have a proper</FONT>
<BR><FONT SIZE=3D2>&gt;debate on the pros and cons of various =
methods.</FONT>
<BR><FONT SIZE=3D2>&gt;Thanks. </FONT>
<BR><FONT SIZE=3D2>&gt;Steve </FONT>
</P>

<P><FONT SIZE=3D2>Agreed.</FONT>
</P>

<P><FONT SIZE=3D2>thanks,</FONT>
<BR><FONT SIZE=3D2>-rohan</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C179AE.14DEF130--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov 30 11:35:38 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA19860
	for <midcom-archive@odin.ietf.org>; Fri, 30 Nov 2001 11:35:38 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA10240
	for midcom-archive@odin.ietf.org; Fri, 30 Nov 2001 11:35:42 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA09453;
	Fri, 30 Nov 2001 11:22:51 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA09424
	for <midcom@optimus.ietf.org>; Fri, 30 Nov 2001 11:22:50 -0500 (EST)
Received: from sj-msg-core-1.cisco.com (sj-msg-core-1.cisco.com [171.71.163.11])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA19123
	for <midcom@ietf.org>; Fri, 30 Nov 2001 11:22:45 -0500 (EST)
Received: from imop.cisco.com (imop.cisco.com [171.69.11.44])
	by sj-msg-core-1.cisco.com (8.11.3/8.9.1) with ESMTP id fAUGM3c07191;
	Fri, 30 Nov 2001 08:22:03 -0800 (PST)
Received: from rmahy-home-nt (ssh-sj1.cisco.com [171.68.225.134])
	by imop.cisco.com (Mirapoint)
	with ESMTP id ACC49997;
	Fri, 30 Nov 2001 08:22:01 -0800 (PST)
Message-Id: <4.2.0.58.20011130081112.01f9ad50@lint.cisco.com>
X-Sender: rmahy@imop.cisco.com (Unverified)
X-Mailer: QUALCOMM Windows Eudora Pro Version 4.2.0.58 
Date: Fri, 30 Nov 2001 08:22:27 -0800
To: Steve Davies <sdavies@ridgewaysystems.com>
From: Rohan Mahy <rohan@cisco.com>
Subject: RE: [midcom] pre-midcom - How does TURN work?
Cc: midcom@ietf.org, "'jdrosen@dynamicsoft.com'" <jdrosen@dynamicsoft.com>,
        "'Christian Huitema'" <huitema@windows.microsoft.com>,
        "'jweinberger@dynamicsoft.com'" <jweinberger@dynamicsoft.com>
In-Reply-To: <00533D13955AD411AF3800A0C9B426391724C3@ThisAddressDoesNotE
 xist>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

Steve,

Some clarifications below...

At 06:48 AM 11/30/01 , Steve Davies wrote:

>Rohan,
>
>Thanks for this clarification. This is what I supposed, but I couldn't 
>deduce it from the text of TURN. In fact, I had falsely assumed that in 
>comparing TURN with FANTOM I could take TURN in isolation. From your 
>reply, am I now correct in infering that for your solution to work the 
>following steps would need to be implemented:
>
>* a UA would implement STUN to determine what type of NAT it is behind

yes

>* if it is behind a symmetric NAT then it would implement TCP signaling 
>instead of UDP
>* furthermore the TCP connection is a permanent connection to a SIP Proxy

no,  either the client must use TCP, or UDP with the rport parameter and 
keep this mapping alive.

>* if it is behind a symmetric NAT the UA would to be programmed with the 
>NAT timeout interval

fyi: this can be detected through STUN.   in the TCP signaling case, you 
only need to keep your RTP/RTCP bindings fresh (much less of a burden).

>* A public SIP proxy (to which the permanent TCP connection is made) has 
>to be in the call signalling path (no direct UA to UA calls)

no,  the public SIP proxy merely provide a publicly accesible point for 
receiving requests.  outbound requests MAY go direct as long as the target 
SIP UA is not itself behind a (different) NAT.

>* The public SIP proxy must also use TCP signalling and ignore any 
>tranport address registered by the UA

no, see above.  the connection to the proxy can be TCP or persistent UDP.

>* The UA must implement symmetric passive RTP and signal the capability in 
>SIP. When the UA makes a call, it must authenticate itself with a TURN 
>server and then ALLOCATE a couple of transport addresses on that TURN 
>server. The addresses returned are sent to the destination UA. The 
>orginating UA has to wait to receive RTP/RTCP packets via the TURN server 
>before it can transmit (because its TURN server's routing table isn't 
>complete) and then it must ignore the transport addresses sent by the 
>destination UA, instead transmitting media (RTP and RTCP) via its TURN 
>server. When the UA receives a call, it must transmit media first before 
>it can be received and it must transmit to the orginating's TURN server - 
>not via its own TURN server.

in the case of a symmetric NAT this is true.  In the case of the other 
types of NATs you can send RTP/RTCP directly.

>* Both UAs must either turn off silence supression (bandwith wasteful)or 
>periodically send NAT keep-alives

In practice it is sufficient to send an empty RTP packet periodically if 
vad is on.

>* Call clearing must be via the public SIP proxy

same comment applies as above on direct signaling

thanks,
-rohan

>Steve
>
>-----Original Message-----
>From: Rohan Mahy [<mailto:rohan@cisco.com>mailto:rohan@cisco.com]
>Sent: 28 November 2001 01:28
>To: Steve Davies
>Cc: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; 'Christian Huitema';
>'jweinberger@dynamicsoft.com'; midcom@ietf.org
>Subject: RE: [midcom] pre-midcom - How does TURN work?
>
>
>
>---- Original message ----
> >Date: Tue, 27 Nov 2001 23:47:38 -0000
> >From: Steve Davies <sdavies@ridgewaysystems.com>
> >Subject: RE: [midcom] pre-midcom - How does TURN work?
> >To: "'jdrosen@dynamicsoft.com'" <jdrosen@dynamicsoft.com>,
>"'rohan@cisco.com'" <rohan@cisco.com>, "'Christian
>Huitema'"<huitema@windows.microsoft.com>,
>"'jweinberger@dynamicsoft.com'" <jweinberger@dynamicsoft.com>
> >Cc: midcom@ietf.org
> >
> >All,
> >
> >By way of clarification of the first question, when I say
>'behind' I mean
> >the central registrar is on the public side of the TURN
>Server, viz: TURN
> >Client<->NAT<->TURN Server<->Central Registrar<->etc. So the
>client must go
> >through TURN to get to the registrar - a typical managed
>service deployment.
> >
> >Hopefully the other questions are clear.
> >
> >Steve
> >
> >
> >-----Original Message-----
> >From: Steve Davies 
> [<mailto:sdavies@ridgewaysystems.com>mailto:sdavies@ridgewaysystems.com]
> >Sent: 27 November 2001 18:19
> >To: 'jdrosen@dynamicsoft.com'; 'rohan@cisco.com'; 'Christian
>Huitema';
> >'jweinberger@dynamicsoft.com'
> >Cc: midcom@ietf.org
> >Subject: [midcom] pre-midcom - How does TURN work?
> >
> >
> >Jonathan, Joel, Christian and Rohan,
> >Please explain how you expect the following to work within TURN:
> >* How does a client register with a central registrar behind
>the TURN
> >server. The ALLOCATE method obtains a public transport
>address to represent
> >the client, but how does the registration request get
>forwarded from the
> >TURN server to the central registrar?
>
>There is no need to use TURN to communicate with a SIP Server.
>  SIP over TCP or TLS works fine as specified in bis.  SIP over
>UDP  must use the rport Via parameter specified in
>draft-ietf-sip-nat-00.txt
>
>MGCP and H.323 both use TCP, so they are likewise OK for
>signaling.
>
> >* When a call exists between 2 clients that are behind 2
>different TURN
> >servers, there appears to be a media deadlock. It appears
>from the
> >description, that both TURN servers are waiting for the other
>to send them
> >media before each of them knows where to send media to. Is this
> >interpretation correct?
>
>A user originating an INVITE using a TURN server should
>represent that they can use symmetric RTP in passive mode.
>When a user behind a symmetric NAT receives an INVITE offering
>this, it does not use TURN, it instead sends its media to the
>addresses advertised in SDP (the sender's TURN server).
>
> >* What is your solution for RTP port pairing?
>
>This is an area where we need to write a concrete proposal.
>We had some discussions about this when STUN/TURN where part
>of the same proposal, but we never closed on a syntax.
>Basically the approach would involve including a parameter in
>the first Allocate request to hold the next address for a
>short period of time.  The second request would contain some
>information from the previous request (for example the next
>expected MAPPED-ADDRESS parameter).
>
> >* How do you expect to prevent NATs from timing out on both
>the 'in-bound signaling' connection
>
>either use TCP/TLS, or send a sacrifice packet periodically to
>keep the mapping fresh.  This sacrifice could be an OPTIONS
>with max-forwards of 0, a PING as in the Nortel proposal, etc.
>
> >and for media in the presence of silence suppression?
>
>endpoints should send empty RTP packets periodically if no RTP
>is  sent.  likewise with RTCP announcements.
>
> >It would also really be nice to see the detail of a proper
>call flow - SIP
> >or H.323 will suffice. Until we see how TURN is expected to
>work it is
> >difficult to make a like-for-like comparison with FANTOM and
>have a proper
> >debate on the pros and cons of various methods.
> >Thanks.
> >Steve
>
>Agreed.
>
>thanks,
>-rohan


_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



From daemon@optimus.ietf.org  Fri Nov 30 11:58:54 2001
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged))
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA21254
	for <midcom-archive@odin.ietf.org>; Fri, 30 Nov 2001 11:58:54 -0500 (EST)
Received: (from daemon@localhost)
	by optimus.ietf.org (8.9.1a/8.9.1) id LAA11081
	for midcom-archive@odin.ietf.org; Fri, 30 Nov 2001 11:58:59 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA10967;
	Fri, 30 Nov 2001 11:54:50 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176])
	by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id LAA10936
	for <midcom@optimus.ietf.org>; Fri, 30 Nov 2001 11:54:48 -0500 (EST)
Received: from znsgs0ja.europe.nortel.com (znsgs0ja.nortelnetworks.com [47.165.25.40])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA21057
	for <midcom@ietf.org>; Fri, 30 Nov 2001 11:54:42 -0500 (EST)
Received: from qnsgs000.nortel.com (znsgs016 [47.255.64.31])
	by znsgs0ja.europe.nortel.com (8.11.0/8.11.0) with ESMTP id fAUGsGu17151
	for <midcom@ietf.org>; Fri, 30 Nov 2001 16:54:16 GMT
Received: from zwcwc012.europe.nortel.com by znsgs016;
          Fri, 30 Nov 2001 16:53:53 +0000
Received: by zwcwc012.europe.nortel.com 
          with Internet Mail Service (5.5.2653.19) id <X7CSCQGW>;
          Fri, 30 Nov 2001 16:52:45 -0000
Message-ID: <C76021BAF2A6D5119DE500508BCF455215F1B8@zctfc004.europe.nortel.com>
From: "Cedric Aoun" <CEDRIC.AOUN@nortelnetworks.com>
To: "'Steve Davies'" <sdavies@ridgewaysystems.com>
Cc: "Midcom IETF (E-mail)" <midcom@ietf.org>
Date: Fri, 30 Nov 2001 16:52:48 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: multipart/alternative;
              boundary="----_=_NextPart_001_01C179BF.710AEB60"
Subject: [midcom] FANTOM comments
Sender: midcom-admin@ietf.org
Errors-To: midcom-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id:  <midcom.ietf.org>
X-BeenThere: midcom@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C179BF.710AEB60
Content-Type: text/plain;
	charset="iso-8859-1"

Hi Steve,
I have some comments on the FANTOM draft, I'm still way behind my mails so
sorry if my comments have already been posted.

-The FANTOM solution requires 2 devices (the AP and the PEA) one in the
private network and another one in the Service Provider (or DMZ of the
enterprise depending on the nature of the service).The AP hosts an
application proxy, a media proxy and the FANTOM client, the PEA hosts a
media proxy as well as a FANTOM server. Just by looking at the media proxy
role, it requires that the host machine has a forwarding rate to meet VoIP's
periodicity, assume 10 ms packetisation rate is used you have 100 pps in and
a 100 out, in total you will need to relay 200 pps for every single call.
This type of platform doesn't come for free if you have a hundred or more
calls, we are not talking of a standard workstation. 
In addition the PEA will require much more processing since it will need to
handle calls from other private networks. 
I'm assuming that you have a sort of architecture where the FANTOM server
could be used by several FANTOM clients (I'm talking about channel ids or
tunnel ids that you might need to use combined with association ids...). I
understand that you have used the AP to avoid modifying the end host but at
what cost. 
Since the end host has already an application client, why don't use the
application with certain extension to get the binds and refresh them as well
as workaround the problem where the signaling is sent to an address included
in the signaling message?

-One thing that I found weird is the usage of tunneling by using tcp
multiplexing, it's a VPN reinvention type of thing. What is the gain? I
understand that the driver was to reduce the number of pinholes to be opened
to allow the signaling to path through the packet filter. BUT this gain is
really small compared to the number of pinholes required for the media
flows, therefore I do not see the point for the tunneling. I'm sure that you
are aware of the risks of tunneling, the firewall doesn't have the
capability to snif in the payload of the TCP segments to determine the type
of protocols that are transported in the multiplexed channels.
THIS is a BIG HOLE in the corporate security

-The protocol between the AP and the PEA looks really complex and will need
at lot of work to get standardized, personally I would prefer building a
much simpler solution with existing protocols.

-I think that the transition solution to move towards Midcom should be based
on a mix of using reflectors (such as defined in STUN) in residential and
SMEs where full cone NATs are predominant, a media intermediary (instead of
2 in your solution) could be used to solve the symmetric NATs that are
mostly deployed in corporate and in service provider networks.

Hope I understood your solution.
Cedric

Cedric Aoun
Nortel Networks
France
mailto:cedric.aoun@nortelnetworks.com



------_=_NextPart_001_01C179BF.710AEB60
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2654.89">
<TITLE>FANTOM comments</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2 FACE=3D"Arial">Hi Steve,</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">I have some comments on the FANTOM =
draft, I'm still way behind my mails so sorry if my comments have =
already been posted.</FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">-The FANTOM solution requires 2 =
devices (the AP and the PEA) one in the private network and another one =
in the Service Provider (or DMZ of the enterprise depending on the =
nature of the service).The AP hosts an application proxy, a media proxy =
and the FANTOM client, the PEA hosts a media proxy as well as a FANTOM =
server. Just by looking at the media proxy role, it requires that the =
host machine has a forwarding rate to meet VoIP's periodicity, assume =
10 ms packetisation rate is used you have 100 pps in and a 100 out, in =
total you will need to relay 200 pps for every single call.</FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">This type of platform doesn't come for =
free if you have a hundred or more calls, we are not talking of a =
standard workstation. </FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">In addition the PEA will require much =
more processing since it will need to handle calls from other private =
networks. </FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">I'm assuming that you have a sort of =
architecture where the FANTOM server could be used by several FANTOM =
clients (I'm talking about channel ids or tunnel ids that you might =
need to use combined with association ids...). I understand that you =
have used the AP to avoid modifying the end host but at what cost. =
</FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">Since the end host has already an =
application client, why don't use the application with certain =
extension to get the binds and refresh them as well as workaround the =
problem where the signaling is sent to an address included in the =
signaling message?</FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">-One thing that I found weird is the =
usage of tunneling by using tcp multiplexing, it's a VPN reinvention =
type of thing. What is the gain? I understand that the driver was to =
reduce the number of pinholes to be opened to allow the signaling to =
path through the packet filter. BUT this gain is really small compared =
to the number of pinholes required for the media flows, therefore I do =
not see the point for the tunneling. I'm sure that you are aware of the =
risks of tunneling, the firewall doesn't have the capability to snif in =
the payload of the TCP segments to determine the type of protocols that =
are transported in the multiplexed channels.</FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">THIS is a BIG HOLE in the corporate =
security</FONT>
</P>

<P><FONT SIZE=3D2 FACE=3D"Arial">-The protocol between the AP and the =
PEA looks really complex and will need at lot of work to get =
standardized, personally I would prefer building a much simpler =
solution with existing protocols.</FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">-I think that the transition solution =
to move towards Midcom should be based on a mix of using reflectors =
(such as defined in STUN) in residential and SMEs where full cone NATs =
are predominant, a media intermediary (instead of 2 in your solution) =
could be used to solve the symmetric NATs that are mostly deployed in =
corporate and in service provider networks.</FONT></P>

<P><FONT SIZE=3D2 FACE=3D"Arial">Hope I understood your =
solution.</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">Cedric</FONT>
</P>

<P><FONT SIZE=3D2 FACE=3D"Arial">Cedric Aoun</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">Nortel Networks</FONT>
<BR><FONT SIZE=3D2 FACE=3D"Arial">France</FONT>
<BR><U><FONT COLOR=3D"#0000FF" FACE=3D"Times New Roman"><A =
HREF=3D"mailto:cedric.aoun@nortelnetworks.com">mailto:cedric.aoun@nortel=
networks.com</A></FONT></U>
</P>
<BR>

</BODY>
</HTML>
------_=_NextPart_001_01C179BF.710AEB60--

_______________________________________________
midcom mailing list
midcom@ietf.org
http://www1.ietf.org/mailman/listinfo/midcom



