Dear Cullen,

You have the same concern with Bruce and Henning. The authors do not think
this method is broadly suitable for the diagnostics in the open Internet
environment either. However, it may be used in some administrative p2p
overlays. The usage of Echo method is limited to certain application
scenarios.

As we said in the draft: "An Echo request message is used to retrieve the
diagnostic information of the specified path in administrative p2p overlays
where all the peers in the overlay are trusted or based on specific
authorization.  For example, it can be used in a p2p overlay where all peers
deployed by the operator to provide services to the customers (clients),
where the diagnostics happens between peers in the p2p overlay.  For the
untrusted p2p overlays, e.g. some end user equipments can be the peers in
the overlay network, then the Echo method must be used with care for the
consideration of potential DoS attack.  Compared with Path_Track method,
Echo method brings less messages to the p2p overlay network."


Best Regards,
Haibin
Skype: alexsonghw


>-----Original Message-----
>From: [email protected] [mailto:[email protected]] On Behalf Of
>Cullen Jennings
>Sent: Tuesday, March 03, 2009 5:23 AM
>To: P2PSIP WG
>Subject: [P2PSIP] Comment on p2psip-diagnostics
>
>
>One comment on the Echo design.... I'm worried about a method where
>sending a single request can cause a whole bunch of responses. This
>has congestion and DOS issues. It is also not clear how all the
>retransmissions timers would work with it.
>
>We should think about if it is possible to move away from the one
>request, multiple responses design.
>
>Cullen <as an individual contributor>
>
>
>
>
>_______________________________________________
>P2PSIP mailing list
>[email protected]
>https://www.ietf.org/mailman/listinfo/p2psip

_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to