Re: [AVTCORE] Éric Vyncke's Discuss on draft-ietf-avtcore-rtp-scip-05: (with DISCUSS and COMMENT)
"Eric Vyncke (evyncke)" <evyncke@cisco.com> Tue, 05 December 2023 15:12 UTC
Return-Path: <evyncke@cisco.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41953C151088; Tue, 5 Dec 2023 07:12:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.605
X-Spam-Level:
X-Spam-Status: No, score=-14.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IFjg0cMA20mE; Tue, 5 Dec 2023 07:12:37 -0800 (PST)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11287C14F685; Tue, 5 Dec 2023 07:12:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=32289; q=dns/txt; s=iport; t=1701789157; x=1702998757; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=8SXfPav4X1ljP+obIyjtyXQfa9K/zIzu1MXC3IkKqVA=; b=Q73Fj6M4aTOhtTLBZVFa5aHEKeJiT06Ux/e8TgrWwTzaDCh5MCfx0NB/ sE/RGPMQnLSvwzn3Qcf0X4JmmIyBVc74li1EmO9KuJTH861J1EPJ3LyVB D8GiVrJYRqPfqWWg8xh2hyqXMCm0wPbBasQx1NK8bPMz+kPNTKYDN7aRd g=;
X-CSE-ConnectionGUID: bAmJuSgZTrq/SqThrSR2vg==
X-CSE-MsgGUID: FCJn/xdJQZeHquG+phLZAQ==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:NL9VXR1A8UYyw/ZMsmDPZFBlVkEcU/3cJAUZ7N8gk71RN/jl9JX5N 0uZ7vJo3xfFXoTevupNkPGe87vhVmoJ/YubvTgcfYZNWR4IhYRenwEpDMOfT0yuBPXrdCc9W s9FUQwt5Gm1ZHBcA922fFjOuju35D8WFA/4MF94OPXzEY3fp8+2zOu1vZbUZlYAiD+0e7gnN Byttk2RrpwPnIJ4I6Atyx3E6ndJYLFQwmVlZBqfyh39/cy3upVk9kxt
IronPort-Data: A9a23:p8Nnxai+CG+HqKBPjYdSjbDAX161qhAKZh0ujC45NGQN5FlHY01je htvXz/VOvnZYTShL4x2OYyzpE5XuZ6Bn95nGgVt/HhjQiNjpJueD7x1DKtf0wB+jyHnZBg6h ynLQoCYdKjYdleF+1H1dOCn9CEgvU2xbuKUIPbePSxsThNTRi4kiBZy88Y0mYcAbeKRW2thg vus5ZWDULOZ82QsaDlNsfre8EoHUMna4Vv0gHRvPZing3eG/5UlJMp3Db28KXL+Xr5VEoaSL woU5Ojklo9x105F5uKNyt4XQGVTKlLhFVTmZk5tZkSXqkMqShrefUoMHKF0hU9/011llj3qo TlHncTYpQwBZsUglAmBOvVVO3kWAEFIxFPICXKWtO6O9EL0T2H1hM53MEEsBrdC5OkiVAmi9 dRAQNwMRgqIi+Tzy7WhR6wzwM8iN8LseogYvxmMzxmAUq1gGs+FEv6MvIMDtNszrpgm8fL2a tQIbzFsYTzLYgZEPREcD5dWcOKA3ySkLWEJ9A/OzUYxy0b47go2wLTPCejYWsWXaoZNnmKqj 1uTqgwVBTlBaYTAkmDamp62vcfGgz/TWY8OGvu/7PECqFSN2mcUEhBTXluyoOOiok+zR9wZL FYbkgIit6E86AmqQ8XzGhSmvHWDpBNZQcZIVvYx6Rmly6fI7UCeHGdsZj9Mc9MOtcIqS3otz FDhoj/yLSZkvLvQQnWH+/LL6zizIiMSa2QFYEfoUDfp/fHpiYQRkynAfOp5CemOl+H1AwrKm S6F+X1Wa6ooseYH0KCy/Fbiij2qp4TUQgNd2ukxdjz9hu+eTND9D7FE+WTmAeB8wJF1p2RtU VAekMSYqesJF5zIy2qGQf4GG/ei4PPt3NzgbbxHQcRJG9eFoiLLkWVsDNdWeB8B3iEsJWaBX aMrkVkNjKK/xkeCY65teJ6WAM8316XmHtmNfqmLNoMRO8QvKl7doXkGiausM4bFzhFEfUYXZ 87zTCpQJS9DYUia5GPvGLhDiedDKt4WnjuMFfgXMChLIZLFOSbKEu1aWLd/Rus496iD6B7E6 MpSMtDCyhNUFoXDjtr/r+YuwaQxBSFjX/je8pUPHsbae1YOMD96UZf5n+h+E7GJaowIzI/g5 G+mYEZExTLX3DufQel8Qio9OOqHsFcWhS9TABHAyn7xhCJ8MNz2vf1AH3b1FJF+nNFeITdPZ 6BtU+2LA+9ETXLM/DF1UHU3hNYKmMiD7e5WAxeYXQ==
IronPort-HdrOrdr: A9a23:8BA6aK/J2IyiutVtt8Ruk+GRdr1zdoMgy1knxilNoENuA6+lfp GV/MjziyWUtN9IYgBfpTnhAsW9qXO1z+8S3WBjB8bSYOCGghrlEGgM1/qZ/9SNIVybygcZ79 YeT0EcMqy+MbEZt7eG3ODQKb9Jq7f3ktHMuQ6d9QYQcegAUdAY0+4NMHfhLqQAfng/OXNWLu v62uN34xCbVTA8aMO9CnMZX+7FieHqufvdCyIuNloM0iXLqSmnxoLbPnGjsyv2VQkh/Z4StU z+1yDp7KSqtP+2jjXG0XXI0phQkNz9jvNeGc2lkKEuW3TRozftQL4kd6yJvTgzru3qwk0tis PwrxApONk2w2/Nf1uyvQDm12DboXYTAj7ZuBylaEnY0InErQEBeo58bEViA1zkAn8bzZNBOW RwriSkXtRsfEr9dW/Glqj1vllR5zmJSDwZ4KAuZ7g1a/pEVFeXxrZvpH99AdMOGjn355sgF/ QrBMbA5OxOeVffdHzBuHJzqebcFUjbMy32C3TqgPblmwR+jTR81Q8V1cYflnAP+NY0TIRF/f 3NNuBtmKtVRsEbYKphDKNZKPHHR1DlUFbJKiafMF7nHKYINzbErIP2+qw84KWvdIYTxJU/lZ zdWBdTtHI0eUjpFcqStac7uCzlUSG4R3Dg28te7592tvn1Q6fqKzSKTBQ0n86ps5wkc7vmsj aISeVr6tPYXB/T8Nxyrn/DsrFpWAwjbPE=
X-Talos-CUID: 9a23:PZRf72Bk7sHTIFP6EyNO8WwJIc8XTmfEi0zJH0+iMlwzVrLAHA==
X-Talos-MUID: 9a23:R/wEhguqCG0ySkzEQs2nqhpAMoB474aXOk0tiIgp+NGEER5ZAmLI
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Dec 2023 15:12:36 +0000
Received: from rcdn-opgw-4.cisco.com (rcdn-opgw-4.cisco.com [72.163.7.165]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id 3B5FCZxc027276 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 5 Dec 2023 15:12:35 GMT
X-CSE-ConnectionGUID: h8dfdQLMQfGzOwT0AXKzdg==
X-CSE-MsgGUID: Q9S8wW84SW2/2bh1OvRnCQ==
Authentication-Results: rcdn-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=evyncke@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.04,252,1695686400"; d="scan'208,217";a="14194459"
Received: from mail-co1nam11lp2168.outbound.protection.outlook.com (HELO NAM11-CO1-obe.outbound.protection.outlook.com) ([104.47.56.168]) by rcdn-opgw-4.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Dec 2023 15:12:34 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cBOqeFUqPm8QwoisJPNLuO5GYgni8fjIOJBDDreexsakUvuE7zRfgfrjhJJkf1KO+28kyXgNOUPMLDhW+1dE5UIIH1T+C81o0TTMmdtfmCol40BndQktA4ep2qlsLssqz6D5rzXRw/y6SWkGIy0imC/Q4c/EbINsMw4HLhVGff5jSfg7qniaOjTlKky9Db6ioMUnnyB5j/NZqGRYS616VWGloZC8e8rRwfzAOO9WVCQXFI4KNitzb5Vlqs6uWcCNM9VhlG8M9Mtl5jQTa0Nauxgk7+90L02jMYSqtG8en0IsL9pajLhWiN33e3obfzDsqvIu9wa+X5bX/7IrnD/1XA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RhPwWDJyYlFx5JVKumL9H+wMJwc8dQlF8/SVpiZr1xs=; b=HiMqg5Kf4Rfm+i3IuTdn28ny4yVaKKeIvLnSPGQOJ2snO31KfbUdpW64k6xLFG1QlnFsEC6boC3xR/SIHyT1fx2Zbe5kmI6GcFzava5wNP5N1e4VcO6WxbqdVGEJd+a2AMfWIS4gRjR7iBD/pPmfYS2BBDGptQQsxhx7L29pezr72TNCmdhBnvDDmiiXIzFZ9CM9OzKJhEcJmvMgMJ8vcM9FiOWEN1i2CJR6eeyI9cw7UP+54vRJ1KQWKA03ZxmCcFeysVlR8YiQeIGKhrXf7H32wIPZWl2VSR+WIforiBwaAcgz++ByNmNMPKm83goBVdltOph6+VwP5Mvbro9Vlw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by SA1PR11MB6920.namprd11.prod.outlook.com (2603:10b6:806:2bb::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7046.34; Tue, 5 Dec 2023 15:12:31 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::4354:3cc:1204:95d6]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::4354:3cc:1204:95d6%4]) with mapi id 15.20.7046.032; Tue, 5 Dec 2023 15:12:29 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "Dan.Hanson@gd-ms.com" <Dan.Hanson@gd-ms.com>, "Dan.Hanson@gd-ms.com" <Dan.Hanson=40gd-ms.com@dmarc.ietf.org>, The IESG <iesg@ietf.org>
CC: "draft-ietf-avtcore-rtp-scip@ietf.org" <draft-ietf-avtcore-rtp-scip@ietf.org>, "avtcore-chairs@ietf.org" <avtcore-chairs@ietf.org>, "avt@ietf.org" <avt@ietf.org>, "jonathan.lennox@8x8.com" <jonathan.lennox@8x8.com>, "bernard.aboba@gmail.com" <bernard.aboba@gmail.com>, "Michael.Faller@gd-ms.com" <Michael.Faller@gd-ms.com>, "Keith.Maver@gd-ms.com" <Keith.Maver@gd-ms.com>
Thread-Topic: Éric Vyncke's Discuss on draft-ietf-avtcore-rtp-scip-05: (with DISCUSS and COMMENT)
Thread-Index: AQHZxtZ097QbN+FWmUO2Wex3y3ZgrK/aMmrQgAY5ngCAAZuJ8IC5hM4S
Date: Tue, 05 Dec 2023 15:12:29 +0000
Message-ID: <PH0PR11MB4966E6481938C973E5C9766DA985A@PH0PR11MB4966.namprd11.prod.outlook.com>
References: <169115523149.4829.17144483631227846115@ietfa.amsl.com> <PH1P110MB117290489471D0F1907923F4D509A@PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM> <D8C1AF75-49A8-4A13-82BB-34BF41928F10@cisco.com> <PH1P110MB1172408A169C49301CAB5F86D512A@PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM>
In-Reply-To: <PH1P110MB1172408A169C49301CAB5F86D512A@PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB4966:EE_|SA1PR11MB6920:EE_
x-ms-office365-filtering-correlation-id: ee18bcee-b9dd-4277-0d39-08dbf5a49945
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(39860400002)(136003)(396003)(366004)(346002)(376002)(230273577357003)(230922051799003)(230173577357003)(451199024)(186009)(1800799012)(64100799003)(66899024)(224303003)(41300700001)(7416002)(5660300002)(86362001)(33656002)(30864003)(2906002)(38070700009)(9686003)(83380400001)(55016003)(71200400001)(478600001)(6506007)(7696005)(53546011)(966005)(166002)(38100700002)(122000001)(64756008)(52536014)(54906003)(8936002)(316002)(76116006)(4326008)(110136005)(66446008)(66476007)(66556008)(66946007)(491001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_PH0PR11MB4966E6481938C973E5C9766DA985APH0PR11MB4966namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ee18bcee-b9dd-4277-0d39-08dbf5a49945
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Dec 2023 15:12:29.7648 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: yUFWsFsGKgtiVILEzepx8x/zYsZCqf6bgYkLpmw3thJTp5XQ0dlqMr3rFaTwhpYjnCvXMF2lc4zHI+fe0CHfUg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR11MB6920
X-Outbound-SMTP-Client: 72.163.7.165, rcdn-opgw-4.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/avt/3eVeQaX8XqIccQqS5zGgCnppvLs>
X-Mailman-Approved-At: Tue, 05 Dec 2023 08:29:46 -0800
Subject: Re: [AVTCORE] Éric Vyncke's Discuss on draft-ietf-avtcore-rtp-scip-05: (with DISCUSS and COMMENT)
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Dec 2023 15:12:42 -0000
Dan, Finally, NATO has provided the IESG with a copy of the SCIP-210. OTOH, the main point of my DISCUSS is about the claim in section 3 (background). There has been no security review by the IETF of SCIP-210, so how can an IETF standard track document claim: “These capabilities include end-to-end security at the application layer, authentication of user identity, the ability to apply different security levels for each secure session, and secure communication over any end-to-end data connection.”<https://datatracker.ietf.org/doc/html/draft-ietf-avtcore-rtp-scip-06#section-3-1> I suggest removing this sentence from the I-D, it won’t change the actual purpose of the I-D and I could then clear my current blocking DISCUSS. Regards -éric From: Dan.Hanson@gd-ms.com <Dan.Hanson@gd-ms.com> Date: Wednesday, 9 August 2023 at 16:14 To: Eric Vyncke (evyncke) <evyncke@cisco.com>, Dan.Hanson@gd-ms.com <Dan.Hanson=40gd-ms.com@dmarc.ietf.org>, The IESG <iesg@ietf.org> Cc: draft-ietf-avtcore-rtp-scip@ietf.org <draft-ietf-avtcore-rtp-scip@ietf.org>, avtcore-chairs@ietf.org <avtcore-chairs@ietf.org>, avt@ietf.org <avt@ietf.org>, jonathan.lennox@8x8.com <jonathan.lennox@8x8.com>, bernard.aboba@gmail.com <bernard.aboba@gmail.com>, Michael.Faller@gd-ms.com <Michael.Faller@gd-ms.com>, Keith.Maver@gd-ms.com <Keith.Maver@gd-ms.com> Subject: RE: Éric Vyncke's Discuss on draft-ietf-avtcore-rtp-scip-05: (with DISCUSS and COMMENT) Eric, NATO may be a little slow to respond since probably many of the staff is on European summer holiday. In the meantime, you can get an older version of SCIP-210 at https://www.iad.gov/SecurePhone/index.cfm. Click SCIP Specification on the left side of the page, then scroll down to SCIP-210 Rev 3.6 which is the next to last item in the list. SCIP-210 and supporting documents define SCIP (Secure Interoperable Communications Protocol) and demonstrates the statement "These capabilities include end-to-end security at the application layer, authentication of user identity, ..." Regards, Dan Hanson General Dynamics Mission Systems This message and/or attachments may include information subject to GD Corporate Policies 07-103 and 07-105 and is intended to be accessed only by authorized recipients. Use, storage and transmission are governed by General Dynamics and its policies. Contractual restrictions apply to third parties. Recipients should refer to the policies or contract to determine proper handling. Unauthorized review, use, disclosure or distribution is prohibited. If you are not an intended recipient, please contact the sender and destroy all copies of the original message. -----Original Message----- From: Eric Vyncke (evyncke) <evyncke@cisco.com> Sent: Tuesday, August 8, 2023 7:33 AM To: Dan.Hanson@gd-ms.com <Dan.Hanson=40gd-ms.com@dmarc.ietf.org>; The IESG <iesg@ietf.org> Cc: draft-ietf-avtcore-rtp-scip@ietf.org; avtcore-chairs@ietf.org; avt@ietf.org; jonathan.lennox@8x8.com; bernard.aboba@gmail.com Subject: Re: Éric Vyncke's Discuss on draft-ietf-avtcore-rtp-scip-05: (with DISCUSS and COMMENT) ---- External E-mail --- CAUTION: This email originated from outside GDMS. Do not click links or open attachments unless you recognize the sender and know the content is safe. Hello Dan, Thank you for your prompt reply. FYI, I have requested the SCIP standard, but I am still waiting for it. Anyway, my blocking issue is different from Lars' one, but more on the assertion/claim in this I-D on the IETF stream: `These capabilities include end-to-end security at the application layer, authentication of user identity,`. First, it brings nothing to the actual purpose of the I-D, but more important nobody in the IETF community has analyzed the security properties of SCIP. I.e., suggest to simply remove this claim from the text. See below for EV> Hope this helps -éric ?On 04/08/2023, 17:41, "iesg on behalf of Dan.Hanson@gd-ms.com <mailto:Dan.Hanson@gd-ms.com>" <iesg-bounces@ietf.org <mailto:iesg-bounces@ietf.org> on behalf of Dan.Hanson=40gd-ms.com@dmarc.ietf.org <mailto:40gd-ms.com@dmarc.ietf.org>> wrote: Éric, Thank you for reviewing this document. Responses are inline below prefixed with [DH]. Dan Hanson General Dynamics Mission Systems This message and/or attachments may include information subject to GD Corporate Policies 07-103 and 07-105 and is intended to be accessed only by authorized recipients. Use, storage and transmission are governed by General Dynamics and its policies. Contractual restrictions apply to third parties. Recipients should refer to the policies or contract to determine proper handling. Unauthorized review, use, disclosure or distribution is prohibited. If you are not an intended recipient, please contact the sender and destroy all copies of the original message. -----Original Message----- From: Éric Vyncke via Datatracker <noreply@ietf.org <mailto:noreply@ietf.org>> Sent: Friday, August 4, 2023 9:21 AM To: The IESG <iesg@ietf.org <mailto:iesg@ietf.org>> Cc: draft-ietf-avtcore-rtp-scip@ietf.org <mailto:draft-ietf-avtcore-rtp-scip@ietf.org>; avtcore-chairs@ietf.org <mailto:avtcore-chairs@ietf.org>; avt@ietf.org <mailto:avt@ietf.org>; jonathan.lennox@8x8.com <mailto:jonathan.lennox@8x8.com>; bernard.aboba@gmail.com <mailto:bernard.aboba@gmail.com>; bernard.aboba@gmail.com <mailto:bernard.aboba@gmail.com> Subject: Éric Vyncke's Discuss on draft-ietf-avtcore-rtp-scip-05: (with DISCUSS and COMMENT) ---- External E-mail --- CAUTION: This email originated from outside GDMS. Do not click links or open attachments unless you recognize the sender and know the content is safe. Éric Vyncke has entered the following ballot position for draft-ietf-avtcore-rtp-scip-05: Discuss When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ <https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/> for more information about how to handle DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://datatracker.ietf.org/doc/draft-ietf-avtcore-rtp-scip/ <https://datatracker.ietf.org/doc/draft-ietf-avtcore-rtp-scip/> ---------------------------------------------------------------------- DISCUSS: ---------------------------------------------------------------------- # Éric Vyncke, INT AD, comments for draft-ietf-avtcore-rtp-scip-05 Thank you for the work put into this document. Please find below one blocking DISCUSS points (easy to address), some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), and some nits. Special thanks to Bernard Aboba for the shepherd's detailed write-up including the WG consensus ***but it lacks*** the justification of the intended status, this is related to my DISCUSS below. I hope that this review helps to improve the document, Regards, -éric # DISCUSS As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/ <https://www.ietf.org/blog/handling-iesg-ballot-positions/>, a DISCUSS ballot is a request to have a discussion on the following topics: ## Section 2 I am afraid that without free and public access to the IETF community (whether informational or normative) to the SCIP protocol itself, the IETF stream cannot publish any document (even informational or experimental) with the following assertion/claim `These capabilities include end-to-end security at the application layer, authentication of user identity,`. Suggest removing any such claim from the text. [DH] The most recent version of SCIP-210 can be requested via email from NATO at ncia.cis3@ncia.nato.int <mailto:ncia.cis3@ncia.nato.int> (this is email specified in Section 8 of the I-D). An older version is publicly available at https://www.iad.gov/SecurePhone/index.cfm. Section <https://www.iad.gov/SecurePhone/index.cfm. Section> 8 will be updated to explicitly state that requests for the SCIP-210 specification can be made via email. ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- # COMMENTS ## Abstract Is there a reason why is SDP expanded and not RTP ? [DH] The expansion of SDP can be removed. ## Section 1 Unsure whether the following text has a place into an IETF RFC `This document provides a reference for network security policymakers, network equipment OEMs, procurement personnel, and government agency and commercial industry representatives.`. Suggest to remove it. [DH] The intent was to emphasize that this I-D is focused on network devices and the information provided here-in identifies the SCIP media subtype as a valid codec to be allowed to traverse network devices. We are asking: 1. network device manufacturers include 'scip' as a known codec in their equipment 2. network security policymakers allow 'scip' to traverse their networks 3. procurement personnel be able to identify which network devices implement 'scip' when bidding for equipment EV> the above was a suggestion, feel free to ignore I wonder to wonder whether the USA has left NATO ? The text `SCIP is presently implemented in United States and NATO` seems to indicate that the USA are not included in NATO. [DH] SCIP was first only implemented in the USA, then it was later provided to NATO. We deliberately made this distinction. EV> suggest to rephrase as "SCIP was first implemented in the USA then in NATO member states" or something similar to capture the time line. ## Section 1.2 The DTX acronym is expanded twice and never used. Suggest to remove it. [DH] The DTX acronym will be removed from the acronym list and from the text in section 3.1. ## Section 2 Per `Secure Communication Interoperability Protocol (SCIP) allows the negotiation of several voice, data, and video applications`, it appears that SCIP can also be used for *data*, but this document is only about video/audio. I.e., some text should explain to the reader what happens to the data. [DH] SCIP-210 defines proprietary encrypted 'data' protocols. Perhaps 'data' could be removed from this I-D to avoid confusion. EV> this would be nice indeed Please explain what is a STANAG or provide an informational reference to STANAG 5068. [DH] STANAG = Standardization Agreements. "... a normative document that records an agreement among several or all NATO member states - ratified at the authorized national level - to implement a standard, in whole or in part, with or without reservation." Information about STANAG 5068 can found at: https://nso.nato.int/nso/nsdd/main/standards/stanag-details/7712/EN <https://nso.nato.int/nso/nsdd/main/standards/stanag-details/7712/EN> but the document cannot be downloaded from that site. We mentioned STANAG 5068 in the background section to emphasize the acceptance of SCIP by NATO, but it was not intended as a reference document for the I-D.. EV> lease expand STANAG at least The reader will welcome explanations about the numbers in `scip/8000 and scip/90000` (e.g., by a reference to section 5) [DH] The text will be changed to "... audio/scip and video/scip, respectively, ..." ## Section 3.1 Should there be informative references for MELPe, G.729D ? [DH] MELPe (RFC 8130) is listed in the informative references. G.729D (RFC 3551) is listed in the normative references. The citation links are made later in the document; they will be moved up to the first occurrence of those terms. Is this subsection useful ? This document is about RTP payload and this subsection is more fit for the SCIP endpoints themselves. But, I am neither a transport nor an application expert, so, feel free to keep this subsection. # NITS The official name of the UNO member state is "United States of America" and not simply "United States". [DH] We used "United States" for brevity since it is unambiguous. EV> unsure whether it is really unambiguous, suggest to use "USA" then.
- [AVTCORE] Éric Vyncke's Discuss on draft-ietf-avt… Éric Vyncke via Datatracker
- Re: [AVTCORE] Éric Vyncke's Discuss on draft-ietf… Dan.Hanson@gd-ms.com
- Re: [AVTCORE] Éric Vyncke's Discuss on draft-ietf… Eric Vyncke (evyncke)
- Re: [AVTCORE] Éric Vyncke's Discuss on draft-ietf… Dan.Hanson@gd-ms.com
- Re: [AVTCORE] Éric Vyncke's Discuss on draft-ietf… Eric Vyncke (evyncke)
- Re: [AVTCORE] Éric Vyncke's Discuss on draft-ietf… Dan.Hanson@gd-ms.com
- Re: [AVTCORE] Éric Vyncke's Discuss on draft-ietf… Eric Vyncke (evyncke)
- Re: [AVTCORE] Éric Vyncke's Discuss on draft-ietf… Dan.Hanson@gd-ms.com