[Dundi] Core Members?
Kirk Wolff
kirk at wolffelectronicdesign.com
Tue Aug 24 13:53:26 CDT 2010
What patents cover voip peering?
-----Original Message-----
From: Kevin P. Fleming <kpfleming at digium.com>
Reply-to: Distributed Universal Number Discovery
<dundi at lists.digium.com>
To: dundi at lists.digium.com
Subject: Re: [Dundi] Core Members?
Date: Tue, 24 Aug 2010 12:58:22 -0500
On 08/24/2010 12:43 PM, Kirk Wolff wrote:
> Perhaps we should think about modifying the DUNDi protocol to resolve
> the problems that have been uncovered through implementation. I know
> the guys at messinet have similar problems but the purpose of the
> network is to resolve them as they arise. Below are some of my thoughts:
>
>
> The first problem is the GPA; it prevents mapping of the system. There
> should be a means of testing each node and have it return its exposed
> dialplan so we know what numbers a person is presenting to the rest of
> the peers. Also, a person should be able to perform this same action
> locally so they can see what they are exposing.
>
> A second addition that seems to be evolving out of usage is the need for
> a blacklist. Perhaps there should also be a means of detecting invalid
> dialplans. I'm not sure how to do this as I don't know what the
> definition of an 'invalid dialplan' is and am not sure if there is such
> a definition. Its possible that failed connections to a lookup-response
> could be reported back to the originating node through the dundi chain
> and each node in the chain could store that failed connection message.
> If a node doesn't fix its failed connections in a reasonable number of
> failed attempt reports or number of days then that node would be
> blacklisted automatically. It would be more fair if the maintainer were
> notified of failed connections through email.
>
> Thirdly, it seems to me that DUNDi requires too much structure. Its
> apparent that it must be organized in a top-down methodology. One
> should be able to attach to a cloud by way of a key or password, but not
> be constrained to a single node. At present each connection requires
> hard-coded configuration changes on both ends of the DUNDi link. If a
> 'hub' node goes down, all peers connected to that node will lose their
> connection to the cloud. I believe DUNDi should be more 'gnutella' or
> 'torrent' like where requests can go out into the cloud, but the path
> isn't fixed and each node in the cloud should prevent query loops by
> caching results passing through that node. The cloud should also
> self-organize by balancing their available (or configured allowable)
> bandwidth and their activity. Each node in the cloud should be able to
> attach dynamically to any other node in the cloud and a configurable
> number of 'maximum active connections' should be maintained.
>
> For security, the shared key method can be used, but the key should be
> cloud-wide. I'm not sure how to accomplish this method of security,
> perhaps a simple 'network password' could be defined so only peers that
> have been accepted would be given the cloud password. A public password
> has its disadvantages so a system could be devised to automatically
> change it.
>
> Another possible method of security is to have a system of automatically
> sharing the 'allowable public keys' amongst all the nodes in the cloud.
> if an existing node adds a new node to the cloud, it will push that new
> node's public key to all other nodes in the cloud. Then the new node
> can connect to any of the participating nodes. It could be configurable
> on a particular node whether you accept new node keys automatically or
> if they have to be manually installed. If a node on the network is
> misbehaving, that node's key or node ID could be blacklisted and that
> blacklist could be pushed to all nodes in the same way as the keys are
> shared. This way, it only takes one node to approve a new node the
> cloud, but any node in the cloud could blacklist any other node.
What you are describing has a great deal of overlap with the P2PSIP work
being done in the IETF already, which unfortunately is a long way from
being usable, and also infringes on a number of patents based on IPR
claims that have been published.
--
Kevin P. Fleming
Digium, Inc. | Director of Software Technologies
445 Jan Davis Drive NW - Huntsville, AL 35806 - USA
skype: kpfleming | jabber: kfleming at digium.com
Check us out at www.digium.com & www.asterisk.org
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/dundi/attachments/20100824/be704d9a/attachment-0001.htm
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 490 bytes
Desc: This is a digitally signed message part
Url : http://lists.digium.com/pipermail/dundi/attachments/20100824/be704d9a/attachment-0001.pgp
More information about the Dundi
mailing list