Skip to main content

Last Call Review of draft-ietf-ice-rfc5245bis-16
review-ietf-ice-rfc5245bis-16-opsdir-lc-wu-2018-01-28-00

Request Review of draft-ietf-ice-rfc5245bis
Requested revision No specific revision (document currently at 20)
Type Last Call Review
Team Ops Directorate (opsdir)
Deadline 2018-01-26
Requested 2018-01-12
Authors Ari Keränen , Christer Holmberg , Jonathan Rosenberg
I-D last updated 2018-01-28
Completed reviews Genart Last Call review of -16 by Stewart Bryant (diff)
Secdir Last Call review of -16 by Stephen Farrell (diff)
Opsdir Last Call review of -16 by Qin Wu (diff)
Tsvart Last Call review of -16 by Magnus Westerlund (diff)
Genart Telechat review of -17 by Stewart Bryant (diff)
Secdir Telechat review of -17 by Stephen Farrell (diff)
Assignment Reviewer Qin Wu
State Completed
Request Last Call review on draft-ietf-ice-rfc5245bis by Ops Directorate Assigned
Reviewed revision 16 (document currently at 20)
Result Ready
Completed 2018-01-28
review-ietf-ice-rfc5245bis-16-opsdir-lc-wu-2018-01-28-00
I have reviewed this document as part of the Operational directorate’s ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written with the intent of improving the operational aspects of
the IETF drafts. Comments that are not addressed in last call may be included
in AD reviews during the IESG review.  Document editors and WG chairs should
treat these comments just like any other last call comments. Document reviewed:
 draft-ietf-ice-rfc5245bis-16

Summary:
This document defines ICE protocol for NAT traversal in the UDP-based
communication. The draft is well written, especially operational consideration
section and security section. I believe it is ready for publication.

Major issue: None
Minor issue: Editorial
1.This draft discuss the difference between ICE and ICE difference in many
places, e.g., “ 17.3.  ICE and ICE-lite

   Deployments utilizing a mix of ICE and ICE-lite interoperate
   perfectly.  They have been explicitly designed to do so, without loss
   of function.
“
“
4.  Terminology

   Full Implementation:  An ICE implementation that performs the
      complete set of functionality defined by this specification.

   Lite Implementation:  An ICE implementation that omits certain
      functions, implementing only as much as is necessary for a peer
      implementation that is full to gain the benefits of ICE.  Lite
      implementations do not maintain any of the state machines and do
      not generate connectivity checks.
“
“
Appendix A.  Lite and Full Implementations

   ICE allows for two types of implementations.  A full implementation
   supports the controlling and controlled roles in a session, and can
   also perform address gathering.  In contrast, a lite implementation
   is a minimalist implementation that does little but respond to STUN
   checks.
“
I would suggest to make them consistent, e.g., in section 17.3, it mentions
that deploying combination of ICE and ICE-Lite can be designed to interoperate
perfect without loss of function, however ICE-Lite in section 4 is defines as
one implementation that could omit some of function.

Also I want to know whether lite implementation supports the controlling and
controlled roles in Appendix A.

2. Section 17.2.2 said:
"
The gathering phase and the connectivity
   check phase are meant to generate traffic at roughly the same
   bandwidth as the data traffic itself.
"
"
   Of course, the ICE
   checks will cause a marginal increase in the total utilization;
   however, this will typically be an extremely small increase.
"
I am wondering whether generated traffic in the first sentence is referred to
connectivity check signaling traffic+ gathering signaling traffic+ user data
traffic, in other words, whether connectivity check signaling traffic+
gathering signaling traffic can be ignored comparing with the total volume of
data traffic?

3. Section 19.4.1 said:
“
19.4.1.  STUN Amplification Attack

   he STUN amplification attack is similar to a "voice hammer" attack,
“
s/he STUN amplification attack/The STUN amplification attack