Re: [AVTCORE] Last question about AVP profiles for RTP over QUIC (was: Re: Registering AVP Profiles for RTP over QUIC)

Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com> Wed, 22 June 2022 21:57 UTC

Return-Path: <spencerdawkins.ietf@gmail.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47C2AC16476D for <avt@ietfa.amsl.com>; Wed, 22 Jun 2022 14:57:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id usvmWGLDuLNx for <avt@ietfa.amsl.com>; Wed, 22 Jun 2022 14:57:18 -0700 (PDT)
Received: from mail-ua1-x931.google.com (mail-ua1-x931.google.com [IPv6:2607:f8b0:4864:20::931]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A4F9C159492 for <avt@ietf.org>; Wed, 22 Jun 2022 14:57:15 -0700 (PDT)
Received: by mail-ua1-x931.google.com with SMTP id r15so6845490uaf.13 for <avt@ietf.org>; Wed, 22 Jun 2022 14:57:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=2vme1NvmArytutZhK4FLpniX3BFPDp2L+WGITSWW9Bo=; b=Kw37lXFSd+mCUufeHJ62uFfpnGj6QXH/WIyyZwNwWTCHPN307KC6H3JSXy4qyLfk/f kd2kZZvZo+/rw8KXfSJjBOfSBWutbY75yHGPlOseT3DnklnG/rB440hGkDfRCWzG1wzG i/T1bmA2D1YNPzX0uOiz7Z54Qz4q/OvpPefyZU0FjBtJEHkIWWiB5JBzMOHfwgb6Kv36 vnA7ACTGetYyMjc3Z/b9Sa+NHx1L705Duo9BWZsL79iBqx7zZSE5QZZFHxIoz3kca6iR vwrEvgjTZTEsVsJmg8HnoSFwd0L932hpe3Us+KsphNPSMHFP1oeKQf6i8m8DxP7RlRLs sdgA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=2vme1NvmArytutZhK4FLpniX3BFPDp2L+WGITSWW9Bo=; b=eN7z3IlNIq3LO84fJSTVHEN19zgHzDusTQ+bJXNprvOWS/a0vQ0mghOusky3z09iwc mdWosYIno8gKJI8T87kfBd8f2L1capHs8R8SiFMj7gnjPJkp/qgnsbr/aSMcwaZVLSkd 8/K4GMDn/QQ+QSjzOyHgYKZ0i7dcQarmT1B86DJ1A72+mFim7U6ygzVn/nZcgi4+6Dwm Ddx67deswrwDeb5yBPMM+KGoOwOKDLGHtafc74RD9RXDlnnhUL/RrAVexV/RLr376rQS C8GLZ13Rd2SbJ0GtxVnqvbrd8BVY1TrVmTA6gSjRBZAyCT7CSRjFOwnc8OcFlqpZsgW9 cVkQ==
X-Gm-Message-State: AJIora+cQ9cYJAh190jm0ijqR1G8SjhLOgrkDnBQRHLwvk1CeGCukj1/ BpkPfSAQ9a3NiShV5od1AbWf+CaKt9h/gWizFMnVbJmln34=
X-Google-Smtp-Source: AGRyM1ulKOsXCb2m3cE6EYfQSGYA04h8exNGp1uya2EcqTlvs2LvVzkHNM7JblpR98v1+P0RxzvTL3lGwcosbdG0xgk=
X-Received: by 2002:ab0:6857:0:b0:37f:15c2:b949 with SMTP id a23-20020ab06857000000b0037f15c2b949mr3092463uas.86.1655935034047; Wed, 22 Jun 2022 14:57:14 -0700 (PDT)
MIME-Version: 1.0
References: <CAKKJt-dvotzuaK66T8WQd7YgNLNr_6vqa4W8-z=5FvujpGWA=A@mail.gmail.com> <CAKKJt-c+PrYeackVCyGOpoiPGw6f90D7fZYw+D9MGPNKdEC8cA@mail.gmail.com> <CAD5OKxvVK5WRRY_UQsbnHA2TF9Qd0sNfKcdmuQhCFsFMOr83zA@mail.gmail.com>
In-Reply-To: <CAD5OKxvVK5WRRY_UQsbnHA2TF9Qd0sNfKcdmuQhCFsFMOr83zA@mail.gmail.com>
From: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Date: Wed, 22 Jun 2022 16:56:48 -0500
Message-ID: <CAKKJt-dXF6rLEGBPqTo-q6MwPC8gJ1mKG=ADMXrD86eG-2Q4Og@mail.gmail.com>
To: Roman Shpount <roman@telurix.com>
Cc: IETF AVTCore WG <avt@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000079c21705e2106b14"
Archived-At: <https://mailarchive.ietf.org/arch/msg/avt/BPfJTImnCgPpqKHiuI2xbWc1Uog>
Subject: Re: [AVTCORE] Last question about AVP profiles for RTP over QUIC (was: Re: Registering AVP Profiles for RTP over QUIC)
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Jun 2022 21:57:22 -0000

Hi, Roman,

On Sun, May 22, 2022 at 11:49 PM Roman Shpount <roman@telurix.com> wrote:

> As the person who proposed this, I am for this.
>
> You would probably need to register TCP/QUIC/RTP/AVPF as well, which would
> be RTP over QUICK over TCP with RFC4571 framing. See
> https://datatracker.ietf.org/doc/html/rfc8841#section-8 for a similar
> definition for SCTP.
>

I've been thinking about this one for a while (see date on your reply, vs
date on my reply).

I may be dense, but I'm thinking that it would take (significant) work for
us to convince the QUIC working group to produce another QUIC binding,
based on TCP, rather than UDP, and that in the absence of such a protocol
revision, this isn't useful for the use cases people have been talking
about, so far.

Usually, when I've had conversations about "falling back to TCP", it's been
in an HTTP/3-QUIC context, where a client's UDP packets are being blocked
or severely rate-limited, so falling back to HTTP/2 (or even HTTP/1.1) over
TCP makes perfect sense.

If UDP/QUIC/RTP/AVPF is being blocked, wouldn't an RTP endpoint just
failover to TCP/RTP/SAVPF, the same way it would if a path was blocking UDP
packets today?

Can anyone help me understand what I'm missing here?

Best,

Spencer


> The main reason for this definition is ice-tcp support. If you do a
> session update once the ice-tcp candidate is nominated, the protocol in the
> m= line should match the protocol for the only remaining candidate,
> so TCP/QUIC/RTP/AVPF would be used.
>
> Best,
> _____________
> Roman Shpount
>
>
> On Sun, May 22, 2022 at 7:41 PM Spencer Dawkins at IETF <
> spencerdawkins.ietf@gmail.com> wrote:
>
>> So, we had a spirited discussion about a few things in this thread, but
>> I'd like to reset back to my original question.
>>
>> On Wed, May 11, 2022 at 3:46 PM Spencer Dawkins at IETF <
>> spencerdawkins.ietf@gmail.com> wrote:
>>
>>> Dear AVTCORE,
>>>
>>> I've had an open PR in
>>> https://github.com/SpencerDawkins/sdp-rtp-quic/pull/9 for a while,so I
>>> could get a sense of how AVT profiles are supposed to work, and I'd like to
>>> push on that now (with a virtual interim meeting coming up next week)..
>>>
>>> The high-level summary of discussion in
>>> https://github.com/SpencerDawkins/sdp-rtp-quic-issues/issues/5 (note
>>> that this discussion is in a different repo, because reasons) has been
>>> roughly,"what's the difference between QUIC/RTP/AVPF and QUIC/RTP/SAVPF"?
>>>
>>> The arguments about not registering secure AVP profiles involve
>>>
>>>    -  the computational overhead of double encryption for all packets,
>>>    plus
>>>    - the payload overhead of 10 bytes per packet since you have 2 HMACs.
>>>
>>> The arguments about registering secure AVP profiles seem to revolve
>>> around
>>>
>>>    - Minimizing the impact of added QUIC support in existing
>>>    implementations that are using /RTP/SAVPF now.
>>>    - QUIC encryption protects payloads between QUIC endpoints, but
>>>    there are many multi-endpoint RTP topologies (
>>>    https://www.rfc-editor.org/rfc/rfc7667 has about 50 pages of them),
>>>    and when a middlebox receives  QUIC/RTP/AVPF, it's not obvious whether the
>>>    middlebox should
>>>       - forward the RTP payload using  RTP/AVPF (where the outgoing
>>>       AVPF matches the incoming AVPF), or
>>>       - forward the RTP payload using RTP/SAVPF, where the outgoing
>>>       SRTP encryption matches the incoming QUIC
>>>
>>> It seems to me that there are three choices:
>>>
>>>    - Use only QUIC/RTP/AVPF, and and require middleboxes receiving
>>>    QUIC/RTP/AVPF traffic to always forward that traffic over RTP/SAVPF
>>>    - Use only QUIC/RTP/AVPF, and and require senders to signal
>>>    middleboxes whether they should forward that traffic over RTP/AVPF or
>>>    RTP/SAVPF
>>>    - Register both QUIC/RTP/AVPF and QUIC/RTP/SAVPF, and if you have to
>>>    do double encryption on the QUIC/RTP paths to get RTP/SAVPF on the other
>>>    side of a middlebox, too bad
>>>
>>> So, my questions are,
>>>
>>>    - What am I missing here?
>>>    - Are any of the choices I'm listing obviously the *BEST* choice?
>>>
>>> My recommendation for what I was registering now, in sdp-rtp-quic, in my
>> way-too-quick talk at the interim meeting last week, was that I was only
>> registering QUIC/RTP/AVPF (if we ever figure out what SAVP and SAVPF
>> mean when RTP is carried over QUIC, we can register them later).
>>
>> We didn't have time for Q&A after my talk, but in Jabber, this happened:
>>
>> 11:50:08 Roman Shpount It should be UDP/QUIC/RTP/AVPF
>> 11:50:26 Sergio Garcia Murillo +1 to UDP/QUIC/RTP/AVPF
>>
>>
>> So, we haven't talked about this, and if I'm making commits
>> to sdp-rtp-quic, I should ask about it now.
>>
>> After a quick spin through
>> https://www.iana.org/assignments/sdp-parameters/sdp-parameters.xhtml#sdp-parameters-2,
>> I think this is reasonable and correct.
>>
>> So, that would give me one proto registration for UDP/QUIC/RTP/AVPF.
>>
>> I'll make this change before IETF 114.
>>
>> Any obvious objections? Please reply here, if so.
>>
>> Best,
>>
>> Spencer
>>
>>
>>> Best,
>>>
>>> Spencer
>>>
>> _______________________________________________
>> Audio/Video Transport Core Maintenance
>> avt@ietf.org
>> https://www.ietf.org/mailman/listinfo/avt
>>
>