Re: [AVTCORE] Éric Vyncke's Discuss on draft-ietf-avtcore-rtp-scip-05: (with DISCUSS and COMMENT)

"Eric Vyncke (evyncke)" <evyncke@cisco.com> Tue, 05 December 2023 15:12 UTC

Return-Path: <evyncke@cisco.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41953C151088; Tue, 5 Dec 2023 07:12:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.605
X-Spam-Level:
X-Spam-Status: No, score=-14.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IFjg0cMA20mE; Tue, 5 Dec 2023 07:12:37 -0800 (PST)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 11287C14F685; Tue, 5 Dec 2023 07:12:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=32289; q=dns/txt; s=iport; t=1701789157; x=1702998757; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=8SXfPav4X1ljP+obIyjtyXQfa9K/zIzu1MXC3IkKqVA=; b=Q73Fj6M4aTOhtTLBZVFa5aHEKeJiT06Ux/e8TgrWwTzaDCh5MCfx0NB/ sE/RGPMQnLSvwzn3Qcf0X4JmmIyBVc74li1EmO9KuJTH861J1EPJ3LyVB D8GiVrJYRqPfqWWg8xh2hyqXMCm0wPbBasQx1NK8bPMz+kPNTKYDN7aRd g=;
X-CSE-ConnectionGUID: bAmJuSgZTrq/SqThrSR2vg==
X-CSE-MsgGUID: FCJn/xdJQZeHquG+phLZAQ==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:NL9VXR1A8UYyw/ZMsmDPZFBlVkEcU/3cJAUZ7N8gk71RN/jl9JX5N 0uZ7vJo3xfFXoTevupNkPGe87vhVmoJ/YubvTgcfYZNWR4IhYRenwEpDMOfT0yuBPXrdCc9W s9FUQwt5Gm1ZHBcA922fFjOuju35D8WFA/4MF94OPXzEY3fp8+2zOu1vZbUZlYAiD+0e7gnN Byttk2RrpwPnIJ4I6Atyx3E6ndJYLFQwmVlZBqfyh39/cy3upVk9kxt
IronPort-Data: A9a23:p8Nnxai+CG+HqKBPjYdSjbDAX161qhAKZh0ujC45NGQN5FlHY01je htvXz/VOvnZYTShL4x2OYyzpE5XuZ6Bn95nGgVt/HhjQiNjpJueD7x1DKtf0wB+jyHnZBg6h ynLQoCYdKjYdleF+1H1dOCn9CEgvU2xbuKUIPbePSxsThNTRi4kiBZy88Y0mYcAbeKRW2thg vus5ZWDULOZ82QsaDlNsfre8EoHUMna4Vv0gHRvPZing3eG/5UlJMp3Db28KXL+Xr5VEoaSL woU5Ojklo9x105F5uKNyt4XQGVTKlLhFVTmZk5tZkSXqkMqShrefUoMHKF0hU9/011llj3qo TlHncTYpQwBZsUglAmBOvVVO3kWAEFIxFPICXKWtO6O9EL0T2H1hM53MEEsBrdC5OkiVAmi9 dRAQNwMRgqIi+Tzy7WhR6wzwM8iN8LseogYvxmMzxmAUq1gGs+FEv6MvIMDtNszrpgm8fL2a tQIbzFsYTzLYgZEPREcD5dWcOKA3ySkLWEJ9A/OzUYxy0b47go2wLTPCejYWsWXaoZNnmKqj 1uTqgwVBTlBaYTAkmDamp62vcfGgz/TWY8OGvu/7PECqFSN2mcUEhBTXluyoOOiok+zR9wZL FYbkgIit6E86AmqQ8XzGhSmvHWDpBNZQcZIVvYx6Rmly6fI7UCeHGdsZj9Mc9MOtcIqS3otz FDhoj/yLSZkvLvQQnWH+/LL6zizIiMSa2QFYEfoUDfp/fHpiYQRkynAfOp5CemOl+H1AwrKm S6F+X1Wa6ooseYH0KCy/Fbiij2qp4TUQgNd2ukxdjz9hu+eTND9D7FE+WTmAeB8wJF1p2RtU VAekMSYqesJF5zIy2qGQf4GG/ei4PPt3NzgbbxHQcRJG9eFoiLLkWVsDNdWeB8B3iEsJWaBX aMrkVkNjKK/xkeCY65teJ6WAM8316XmHtmNfqmLNoMRO8QvKl7doXkGiausM4bFzhFEfUYXZ 87zTCpQJS9DYUia5GPvGLhDiedDKt4WnjuMFfgXMChLIZLFOSbKEu1aWLd/Rus496iD6B7E6 MpSMtDCyhNUFoXDjtr/r+YuwaQxBSFjX/je8pUPHsbae1YOMD96UZf5n+h+E7GJaowIzI/g5 G+mYEZExTLX3DufQel8Qio9OOqHsFcWhS9TABHAyn7xhCJ8MNz2vf1AH3b1FJF+nNFeITdPZ 6BtU+2LA+9ETXLM/DF1UHU3hNYKmMiD7e5WAxeYXQ==
IronPort-HdrOrdr: A9a23:8BA6aK/J2IyiutVtt8Ruk+GRdr1zdoMgy1knxilNoENuA6+lfp GV/MjziyWUtN9IYgBfpTnhAsW9qXO1z+8S3WBjB8bSYOCGghrlEGgM1/qZ/9SNIVybygcZ79 YeT0EcMqy+MbEZt7eG3ODQKb9Jq7f3ktHMuQ6d9QYQcegAUdAY0+4NMHfhLqQAfng/OXNWLu v62uN34xCbVTA8aMO9CnMZX+7FieHqufvdCyIuNloM0iXLqSmnxoLbPnGjsyv2VQkh/Z4StU z+1yDp7KSqtP+2jjXG0XXI0phQkNz9jvNeGc2lkKEuW3TRozftQL4kd6yJvTgzru3qwk0tis PwrxApONk2w2/Nf1uyvQDm12DboXYTAj7ZuBylaEnY0InErQEBeo58bEViA1zkAn8bzZNBOW RwriSkXtRsfEr9dW/Glqj1vllR5zmJSDwZ4KAuZ7g1a/pEVFeXxrZvpH99AdMOGjn355sgF/ QrBMbA5OxOeVffdHzBuHJzqebcFUjbMy32C3TqgPblmwR+jTR81Q8V1cYflnAP+NY0TIRF/f 3NNuBtmKtVRsEbYKphDKNZKPHHR1DlUFbJKiafMF7nHKYINzbErIP2+qw84KWvdIYTxJU/lZ zdWBdTtHI0eUjpFcqStac7uCzlUSG4R3Dg28te7592tvn1Q6fqKzSKTBQ0n86ps5wkc7vmsj aISeVr6tPYXB/T8Nxyrn/DsrFpWAwjbPE=
X-Talos-CUID: 9a23:PZRf72Bk7sHTIFP6EyNO8WwJIc8XTmfEi0zJH0+iMlwzVrLAHA==
X-Talos-MUID: 9a23:R/wEhguqCG0ySkzEQs2nqhpAMoB474aXOk0tiIgp+NGEER5ZAmLI
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Dec 2023 15:12:36 +0000
Received: from rcdn-opgw-4.cisco.com (rcdn-opgw-4.cisco.com [72.163.7.165]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id 3B5FCZxc027276 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 5 Dec 2023 15:12:35 GMT
X-CSE-ConnectionGUID: h8dfdQLMQfGzOwT0AXKzdg==
X-CSE-MsgGUID: Q9S8wW84SW2/2bh1OvRnCQ==
Authentication-Results: rcdn-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=evyncke@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.04,252,1695686400"; d="scan'208,217";a="14194459"
Received: from mail-co1nam11lp2168.outbound.protection.outlook.com (HELO NAM11-CO1-obe.outbound.protection.outlook.com) ([104.47.56.168]) by rcdn-opgw-4.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Dec 2023 15:12:34 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cBOqeFUqPm8QwoisJPNLuO5GYgni8fjIOJBDDreexsakUvuE7zRfgfrjhJJkf1KO+28kyXgNOUPMLDhW+1dE5UIIH1T+C81o0TTMmdtfmCol40BndQktA4ep2qlsLssqz6D5rzXRw/y6SWkGIy0imC/Q4c/EbINsMw4HLhVGff5jSfg7qniaOjTlKky9Db6ioMUnnyB5j/NZqGRYS616VWGloZC8e8rRwfzAOO9WVCQXFI4KNitzb5Vlqs6uWcCNM9VhlG8M9Mtl5jQTa0Nauxgk7+90L02jMYSqtG8en0IsL9pajLhWiN33e3obfzDsqvIu9wa+X5bX/7IrnD/1XA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RhPwWDJyYlFx5JVKumL9H+wMJwc8dQlF8/SVpiZr1xs=; b=HiMqg5Kf4Rfm+i3IuTdn28ny4yVaKKeIvLnSPGQOJ2snO31KfbUdpW64k6xLFG1QlnFsEC6boC3xR/SIHyT1fx2Zbe5kmI6GcFzava5wNP5N1e4VcO6WxbqdVGEJd+a2AMfWIS4gRjR7iBD/pPmfYS2BBDGptQQsxhx7L29pezr72TNCmdhBnvDDmiiXIzFZ9CM9OzKJhEcJmvMgMJ8vcM9FiOWEN1i2CJR6eeyI9cw7UP+54vRJ1KQWKA03ZxmCcFeysVlR8YiQeIGKhrXf7H32wIPZWl2VSR+WIforiBwaAcgz++ByNmNMPKm83goBVdltOph6+VwP5Mvbro9Vlw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from PH0PR11MB4966.namprd11.prod.outlook.com (2603:10b6:510:42::21) by SA1PR11MB6920.namprd11.prod.outlook.com (2603:10b6:806:2bb::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7046.34; Tue, 5 Dec 2023 15:12:31 +0000
Received: from PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::4354:3cc:1204:95d6]) by PH0PR11MB4966.namprd11.prod.outlook.com ([fe80::4354:3cc:1204:95d6%4]) with mapi id 15.20.7046.032; Tue, 5 Dec 2023 15:12:29 +0000
From: "Eric Vyncke (evyncke)" <evyncke@cisco.com>
To: "Dan.Hanson@gd-ms.com" <Dan.Hanson@gd-ms.com>, "Dan.Hanson@gd-ms.com" <Dan.Hanson=40gd-ms.com@dmarc.ietf.org>, The IESG <iesg@ietf.org>
CC: "draft-ietf-avtcore-rtp-scip@ietf.org" <draft-ietf-avtcore-rtp-scip@ietf.org>, "avtcore-chairs@ietf.org" <avtcore-chairs@ietf.org>, "avt@ietf.org" <avt@ietf.org>, "jonathan.lennox@8x8.com" <jonathan.lennox@8x8.com>, "bernard.aboba@gmail.com" <bernard.aboba@gmail.com>, "Michael.Faller@gd-ms.com" <Michael.Faller@gd-ms.com>, "Keith.Maver@gd-ms.com" <Keith.Maver@gd-ms.com>
Thread-Topic: Éric Vyncke's Discuss on draft-ietf-avtcore-rtp-scip-05: (with DISCUSS and COMMENT)
Thread-Index: AQHZxtZ097QbN+FWmUO2Wex3y3ZgrK/aMmrQgAY5ngCAAZuJ8IC5hM4S
Date: Tue, 05 Dec 2023 15:12:29 +0000
Message-ID: <PH0PR11MB4966E6481938C973E5C9766DA985A@PH0PR11MB4966.namprd11.prod.outlook.com>
References: <169115523149.4829.17144483631227846115@ietfa.amsl.com> <PH1P110MB117290489471D0F1907923F4D509A@PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM> <D8C1AF75-49A8-4A13-82BB-34BF41928F10@cisco.com> <PH1P110MB1172408A169C49301CAB5F86D512A@PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM>
In-Reply-To: <PH1P110MB1172408A169C49301CAB5F86D512A@PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM>
Accept-Language: fr-BE, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB4966:EE_|SA1PR11MB6920:EE_
x-ms-office365-filtering-correlation-id: ee18bcee-b9dd-4277-0d39-08dbf5a49945
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4966.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(39860400002)(136003)(396003)(366004)(346002)(376002)(230273577357003)(230922051799003)(230173577357003)(451199024)(186009)(1800799012)(64100799003)(66899024)(224303003)(41300700001)(7416002)(5660300002)(86362001)(33656002)(30864003)(2906002)(38070700009)(9686003)(83380400001)(55016003)(71200400001)(478600001)(6506007)(7696005)(53546011)(966005)(166002)(38100700002)(122000001)(64756008)(52536014)(54906003)(8936002)(316002)(76116006)(4326008)(110136005)(66446008)(66476007)(66556008)(66946007)(491001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: fxGzL0DwVftw8ve5tI+wSG0CYFHh5NMkOn5uTfU+1lrieknDhcdrmYQIC22vHTLz2N0kV6DsGFnGy33G/b4CW+3QcV7gWZrSDilw8NFs8uZYiKBjve8OwKxGMYxLo9wPbuQ9rJSdcTzkhkJb8rXVJaoJVdI9pMD5G98jUKY/ZMd3bdlhp3OEOLACofLJ1tMHm3mwD0NZS6wjAORcCDJ7BSDTVPMbB2zVraymeoxW3T5bKzh+/bxH0J1IllQ5p6vdwg9aznM3MUUhIxhPJ6t1TJ2jJ1iJNFQ55S5mv6pnDXxPj9MJjZVop+mVRQf/BRiSMF1b+GWf11NarzVALVoaABb0ZZWieb+FJymXpJevFwemyA98xsK8JotsV41B4H8ZB3if313S1f2JvxmLReO02/XQdyuWWyPCxZEFCDmSPaDHBzrlLmwhRxxKV10CcbqzI78v4VMF8Ufnq9p+3v3GEm45iQUT5NOk0Dlmg6Z2NGZI9uiPrYBoaGd0KlSqPi21VUJ8CU6MaSJM+SlXrzmiSL0XDV9NtEgHyUM6RBtHUn3/U3QKmdMz5B7f7ryZF3ikBVBXz+Xky42J09mhEBG6DpfsPCsPQ1/H8CplgRM69ythMfrXmvuYsWTM3peO98OBS90FivCSyxRiJQPZeHf7bcRUw4ec08EG57sOszDT6/pj3PLucw+UJTS0RR9XuS+/sPj8M8re30SwBuX5N1LkDORpvIbY/QZQfkK3DdRLuS20u8W+rbJMci+lhMf1kEOAbCAjXQcQcBLv2EVePJYv6OIH/CyrLTZvofBQqwHwUx94nrsv82r9lCXpac6QHYUrC20r99/CO1wvO3EDAn/8rxuMGgCVfG0bffVu/2+Z99f/DozNtkZ1RKvRU1NZ9P4gfnkogSW+RgLkAskkzRmI97vxp2v+Gdr60ljgOyXKWAhU7C4uzgCHN9UlaLzm+rL4h6YkBvuuibXCiHe8twm2YCq/ih8BtOA9AwdYUBQSvoORzJ5xeR+IeWTIIYvIIW/n3DKno7m9iLAwYftc1dVVUHiWZcgJoKf9zBqsibAX9pODxltd7F8DBRg61Q6mXZldprETQobQ1NjtjPgZ7DAK5MjYyUeY+tSCIIKW/Fp97EcfCO++rC9h9opHvzE0ZgaP0p/k9Wr5pHcvv4EvL1s6hO3mNY3TVwZhYE2GBC4uM85KovnFGKhNbb3jjNH+WgV0j2us72ClTX1eLqDjPCChkXQD2c2w5quR9JSrPL5UPv1ypl8AsRTnqgWibdeqAE+MzUtXEaf/+9FOkd8sQ96Z1TxXzg2gG7xk3MX5zfZhtNF+/jbx24ywiDpTX7nnciZemLp/43W2kdW9CLjBXw3BwGfpWTmbfZ10YN39HvGoIce62u34GCwPIREWcHbuMhUwHTjoMALWB4NzHLrStHRjPZWH5lYTUcBnE7HZiOoCGUiJOmKYmkbhmexTAzZ7fekoEu2ZIJDiSJv62ZYMNvIlH5qJtFfvZyQREn85XeFjiSPqCKdgYZEMDWYbqW4KRA+naDfVthNpJ6xLSezTqaDr6RYGzfUY1y2m03B7nC26z9c/UBJ8kwCw4wrDyM12ffZ+GDuVhZR7ybdDjATwjPxKqqwytdhPJdZhN7IWnss8nEBf4qaplpVk6Pi8f/f9I0/CLV2Q69aq4SU+DdEqrjnnfA==
Content-Type: multipart/alternative; boundary="_000_PH0PR11MB4966E6481938C973E5C9766DA985APH0PR11MB4966namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4966.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ee18bcee-b9dd-4277-0d39-08dbf5a49945
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Dec 2023 15:12:29.7648 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: yUFWsFsGKgtiVILEzepx8x/zYsZCqf6bgYkLpmw3thJTp5XQ0dlqMr3rFaTwhpYjnCvXMF2lc4zHI+fe0CHfUg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR11MB6920
X-Outbound-SMTP-Client: 72.163.7.165, rcdn-opgw-4.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/avt/3eVeQaX8XqIccQqS5zGgCnppvLs>
X-Mailman-Approved-At: Tue, 05 Dec 2023 08:29:46 -0800
Subject: Re: [AVTCORE] Éric Vyncke's Discuss on draft-ietf-avtcore-rtp-scip-05: (with DISCUSS and COMMENT)
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Dec 2023 15:12:42 -0000

Dan,

Finally, NATO has provided the IESG with a copy of the SCIP-210.

OTOH, the main point of my DISCUSS is about the claim in section 3 (background). There has been no security review by the IETF of SCIP-210, so how can an IETF standard track document claim:

“These capabilities include end-to-end security at the application layer, authentication of user identity, the ability to apply different security levels for each secure session, and secure communication over any end-to-end data connection.”<https://datatracker.ietf.org/doc/html/draft-ietf-avtcore-rtp-scip-06#section-3-1>

I suggest removing this sentence from the I-D, it won’t change the actual purpose of the I-D and I could then clear my current blocking DISCUSS.


Regards

-éric

From: Dan.Hanson@gd-ms.com <Dan.Hanson@gd-ms.com>
Date: Wednesday, 9 August 2023 at 16:14
To: Eric Vyncke (evyncke) <evyncke@cisco.com>, Dan.Hanson@gd-ms.com <Dan.Hanson=40gd-ms.com@dmarc.ietf.org>, The IESG <iesg@ietf.org>
Cc: draft-ietf-avtcore-rtp-scip@ietf.org <draft-ietf-avtcore-rtp-scip@ietf.org>, avtcore-chairs@ietf.org <avtcore-chairs@ietf.org>, avt@ietf.org <avt@ietf.org>, jonathan.lennox@8x8.com <jonathan.lennox@8x8.com>, bernard.aboba@gmail.com <bernard.aboba@gmail.com>, Michael.Faller@gd-ms.com <Michael.Faller@gd-ms.com>, Keith.Maver@gd-ms.com <Keith.Maver@gd-ms.com>
Subject: RE: Éric Vyncke's Discuss on draft-ietf-avtcore-rtp-scip-05: (with DISCUSS and COMMENT)
Eric,

NATO may be a little slow to respond since probably many of the staff is on European summer holiday.  In the meantime, you can get an older version of SCIP-210 at https://www.iad.gov/SecurePhone/index.cfm.  Click SCIP Specification on the left side of the page, then scroll down to SCIP-210 Rev 3.6 which is the next to last item in the list.

SCIP-210 and supporting documents define SCIP (Secure Interoperable Communications Protocol) and demonstrates the statement "These capabilities include end-to-end security at the application layer, authentication of user identity, ..."


Regards,
Dan Hanson
General Dynamics Mission Systems

This message and/or attachments may include information subject to GD Corporate Policies 07-103 and 07-105 and is intended to be accessed only by authorized recipients.  Use, storage and transmission are governed by General Dynamics and its policies. Contractual restrictions apply to third parties.  Recipients should refer to the policies or contract to determine proper handling.  Unauthorized review, use, disclosure or distribution is prohibited.  If you are not an intended recipient, please contact the sender and destroy all copies of the original message.

-----Original Message-----
From: Eric Vyncke (evyncke) <evyncke@cisco.com>
Sent: Tuesday, August 8, 2023 7:33 AM
To: Dan.Hanson@gd-ms.com <Dan.Hanson=40gd-ms.com@dmarc.ietf.org>; The IESG <iesg@ietf.org>
Cc: draft-ietf-avtcore-rtp-scip@ietf.org; avtcore-chairs@ietf.org; avt@ietf.org; jonathan.lennox@8x8.com; bernard.aboba@gmail.com
Subject: Re: Éric Vyncke's Discuss on draft-ietf-avtcore-rtp-scip-05: (with DISCUSS and COMMENT)

----
External E-mail --- CAUTION: This email originated from outside GDMS. Do not click links or open attachments unless you recognize the sender and know the content is safe.

Hello Dan,

Thank you for your prompt reply.

FYI, I have requested the SCIP standard, but I am still waiting for it.

Anyway, my blocking issue is different from Lars' one, but more on the assertion/claim in this I-D on the IETF stream: `These capabilities include end-to-end security at the application layer, authentication of user identity,`. First, it brings nothing to the actual purpose of the I-D, but more important nobody in the IETF community has analyzed the security properties of SCIP. I.e., suggest to simply remove this claim from the text.

See below for EV>

Hope this helps

-éric


?On 04/08/2023, 17:41, "iesg on behalf of Dan.Hanson@gd-ms.com <mailto:Dan.Hanson@gd-ms.com>" <iesg-bounces@ietf.org <mailto:iesg-bounces@ietf.org> on behalf of Dan.Hanson=40gd-ms.com@dmarc.ietf.org <mailto:40gd-ms.com@dmarc.ietf.org>> wrote:


Éric,


Thank you for reviewing this document. Responses are inline below prefixed with [DH].




Dan Hanson
General Dynamics Mission Systems


This message and/or attachments may include information subject to GD Corporate Policies 07-103 and 07-105 and is intended to be accessed only by authorized recipients. Use, storage and transmission are governed by General Dynamics and its policies. Contractual restrictions apply to third parties. Recipients should refer to the policies or contract to determine proper handling. Unauthorized review, use, disclosure or distribution is prohibited. If you are not an intended recipient, please contact the sender and destroy all copies of the original message.


-----Original Message-----
From: Éric Vyncke via Datatracker <noreply@ietf.org <mailto:noreply@ietf.org>>
Sent: Friday, August 4, 2023 9:21 AM
To: The IESG <iesg@ietf.org <mailto:iesg@ietf.org>>
Cc: draft-ietf-avtcore-rtp-scip@ietf.org <mailto:draft-ietf-avtcore-rtp-scip@ietf.org>; avtcore-chairs@ietf.org <mailto:avtcore-chairs@ietf.org>; avt@ietf.org <mailto:avt@ietf.org>; jonathan.lennox@8x8.com <mailto:jonathan.lennox@8x8.com>; bernard.aboba@gmail.com <mailto:bernard.aboba@gmail.com>; bernard.aboba@gmail.com <mailto:bernard.aboba@gmail.com>
Subject: Éric Vyncke's Discuss on draft-ietf-avtcore-rtp-scip-05: (with DISCUSS and COMMENT)


----
External E-mail --- CAUTION: This email originated from outside GDMS. Do not click links or open attachments unless you recognize the sender and know the content is safe.


Éric Vyncke has entered the following ballot position for
draft-ietf-avtcore-rtp-scip-05: Discuss


When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.)




Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ <https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/>
for more information about how to handle DISCUSS and COMMENT positions.




The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-avtcore-rtp-scip/ <https://datatracker.ietf.org/doc/draft-ietf-avtcore-rtp-scip/>






----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------




# Éric Vyncke, INT AD, comments for draft-ietf-avtcore-rtp-scip-05


Thank you for the work put into this document.


Please find below one blocking DISCUSS points (easy to address), some
non-blocking COMMENT points (but replies would be appreciated even if only for
my own education), and some nits.


Special thanks to Bernard Aboba for the shepherd's detailed write-up including
the WG consensus ***but it lacks*** the justification of the intended status,
this is related to my DISCUSS below.


I hope that this review helps to improve the document,


Regards,


-éric


# DISCUSS


As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/ <https://www.ietf.org/blog/handling-iesg-ballot-positions/>, a
DISCUSS ballot is a request to have a discussion on the following topics:


## Section 2


I am afraid that without free and public access to the IETF community (whether
informational or normative) to the SCIP protocol itself, the IETF stream cannot
publish any document (even informational or experimental) with the following
assertion/claim `These capabilities include end-to-end security at the
application layer, authentication of user identity,`. Suggest removing any such
claim from the text.


[DH] The most recent version of SCIP-210 can be requested via email from NATO at ncia.cis3@ncia.nato.int <mailto:ncia.cis3@ncia.nato.int> (this is email specified in Section 8 of the I-D). An older version is publicly available at https://www.iad.gov/SecurePhone/index.cfm. Section <https://www.iad.gov/SecurePhone/index.cfm.&nbsp;&nbsp;Section> 8 will be updated to explicitly state that requests for the SCIP-210 specification can be made via email.


----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------




# COMMENTS


## Abstract


Is there a reason why is SDP expanded and not RTP ?


[DH] The expansion of SDP can be removed.




## Section 1


Unsure whether the following text has a place into an IETF RFC `This document
provides a reference for network security policymakers, network equipment OEMs,
procurement personnel, and government agency and commercial industry
representatives.`. Suggest to remove it.


[DH] The intent was to emphasize that this I-D is focused on network devices and the information provided here-in identifies the SCIP media subtype as a valid codec to be allowed to traverse network devices. We are asking:
1. network device manufacturers include 'scip' as a known codec in their equipment
2. network security policymakers allow 'scip' to traverse their networks
3. procurement personnel be able to identify which network devices implement 'scip' when bidding for equipment

EV> the above was a suggestion, feel free to ignore

I wonder to wonder whether the USA has left NATO ? The text `SCIP is presently
implemented in United States and NATO` seems to indicate that the USA are not
included in NATO.


[DH] SCIP was first only implemented in the USA, then it was later provided to NATO. We deliberately made this distinction.

EV> suggest to rephrase as "SCIP was first implemented in the USA then in NATO member states" or something similar to capture the time line.

## Section 1.2


The DTX acronym is expanded twice and never used. Suggest to remove it.


[DH] The DTX acronym will be removed from the acronym list and from the text in section 3.1.


## Section 2


Per `Secure Communication Interoperability Protocol (SCIP) allows the
negotiation of several voice, data, and video applications`, it appears that
SCIP can also be used for *data*, but this document is only about video/audio.
I.e., some text should explain to the reader what happens to the data.


[DH] SCIP-210 defines proprietary encrypted 'data' protocols. Perhaps 'data' could be removed from this I-D to avoid confusion.

EV> this would be nice indeed

Please explain what is a STANAG or provide an informational reference to STANAG
5068.


[DH] STANAG = Standardization Agreements. "... a normative document that records an agreement among several or all NATO member states - ratified at the authorized national level - to implement a standard, in whole or in part, with or without reservation." Information about STANAG 5068 can found at: https://nso.nato.int/nso/nsdd/main/standards/stanag-details/7712/EN <https://nso.nato.int/nso/nsdd/main/standards/stanag-details/7712/EN> but the document cannot be downloaded from that site. We mentioned STANAG 5068 in the background section to emphasize the acceptance of SCIP by NATO, but it was not intended as a reference document for the I-D..

EV> lease expand STANAG at least

The reader will welcome explanations about the numbers in `scip/8000 and
scip/90000` (e.g., by a reference to section 5)


[DH] The text will be changed to "... audio/scip and video/scip, respectively, ..."


## Section 3.1


Should there be informative references for MELPe, G.729D ?


[DH] MELPe (RFC 8130) is listed in the informative references. G.729D (RFC 3551) is listed in the normative references. The citation links are made later in the document; they will be moved up to the first occurrence of those terms.


Is this subsection useful ? This document is about RTP payload and this
subsection is more fit for the SCIP endpoints themselves. But, I am neither a
transport nor an application expert, so, feel free to keep this subsection.


# NITS


The official name of the UNO member state is "United States of America" and not
simply "United States".


[DH] We used "United States" for brevity since it is unambiguous.

EV> unsure whether it is really unambiguous, suggest to use "USA" then.