Re: [AVTCORE] I-D Action: draft-ietf-avtext-framemarking-15.txt

"Mo Zanaty (mzanaty)" <mzanaty@cisco.com> Wed, 26 July 2023 20:11 UTC

Return-Path: <mzanaty@cisco.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 211BEC151AF9 for <avt@ietfa.amsl.com>; Wed, 26 Jul 2023 13:11:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.604
X-Spam-Level:
X-Spam-Status: No, score=-9.604 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="mPZjpvRz"; dkim=pass (1024-bit key) header.d=cisco.com header.b="onMpYgym"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hX7TMhI0VyeP for <avt@ietfa.amsl.com>; Wed, 26 Jul 2023 13:11:13 -0700 (PDT)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 00AFAC1519A6 for <avt@ietf.org>; Wed, 26 Jul 2023 13:11:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=11956; q=dns/txt; s=iport; t=1690402273; x=1691611873; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=i4995+kqN38KZuU24Zkkl5mugTpgvyqFpEyT1UE4B5s=; b=mPZjpvRzxz/kHsj7CqXOsbBkT8RKuje6EqAkUUonrsJLE8vwwCFA2lsd Y0BRTD3R0mdUYCa1a7wZclo6eHQUZE0dXh2tjmQyoe42x1oIHnPaOLjBB 7+w+IZNGiRQ14Ggi+I/1iPhO/o93h9qS6r0N1josjDeHEuHVkB+dgOt/P Y=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:hNL/1xPvx/5SvWtyZuYl6nfIWUAX0o4cdiYP4ZYhzrVWfbvmotLpP VfU4rNmi1qaFYnY6vcRk+PNqOigQm0P55+drWoPOIJBTR4LiMga3kQgDceJBFe9LavCZC0hF 8MEX1hgrDmgKUYAIM/lfBXJp2GqqzsbGxHxLw1wc+HnE4jbk9Wf3OGp8JqVaAJN13KxZLpoJ 0CupB7K/okO1JJ/I7w4zAfIpHYAd+VNkGVvI1/S1xqp7car95kl+CNV088=
IronPort-Data: A9a23:San8VKwO+qSXDwBLo156t+dQxirEfRIJ4+MujC+fZmUNrF6WrkVRy WIWDGiPMv2CNGb2L98gYIvi9BwHsZaExoBqTwNtqFhgHilAwSbn6Xt1DatR0we6dJCroJdPt p1GAjX4BJloCCea/H9BC5C5xZVG/fngqoHUVqicY0ideSc+EH160U05xbZg6mJVqYHR7z2l6 IuaT/L3YDdJ6xYsWo7Dw/vewP/HlK2aVAIw5jTSV9gS1LPtvyV94KYkGE2EByCQrr+4sQKNb 72rILmRpgs19vq2Yz+vuu6TnkYiGtY+MeUS45Zbc/DKv/RMmsA9+rw5PsIEQkAIsDyAgPVV2 vdBtbyRGBh8a8UgmMxFO/VZOzt1MasD87jdLD3j98eS1EbBNXDrxp2CDmlvYtZeobkxUDoIr KFFQNwORkjra+aexaCyTOBwl+woLdLgO8UUvXQIITTxXK16HsucHvyiCdlw9REw2+VJXqzlV uVGcz8sLwjufF5WEwJCYH45tL742iagG9FCk3qcu7Yf4mXPwkp2yreFDTbOUsaBScMQlUGCq yeauW/4GRodcteYzFJp705AmMfVnynDQKkVS4ax/+FPpE+xymwzKUwJAA7TTeaCtmayXNdWK kox8yUorLQv+EHDcjUbd0DmyJJjlkNCM+e8A9HW+ynWlfWJu1fx6nwsC28eOIZ/5afaUBRzj gfR9+4FEwCDp1F8dJ5w3q2foTX3Mi8PICpeIyQFVgACpdLkpenfby4jrP49SsZZbfWsSVkcJ gxmSgBl193/auZQhs2GEajv2W7Em3QwZlddCv/rdmyk9BhlQ4Wuepal71PWhd4ZctfBFQjf5 iNZx5nOhAzrMX1rvHLVKAnqNO/xj8tpzBWH6bKSN8B7rm/0qyLLkX54sGshTKuWDir0UWa5P BCM0e+gzJRSJ3CtJbRmeJ68Dt9C8EQTPYqNaxwgVfIXOsIZXFbepElGPBfMt0izyxJEuf9kZ v+mnTOEUCxy5VJPlmTmHo/wENYDm0gD+I8kbc2ikUX/i+TCPhZ4i94taTOzUwzw14vdyC39+ NdEPMzMwBJaONASqAGOmWLPBTjm9UQGOK0=
IronPort-HdrOrdr: A9a23:YNCI7qkDJGsnEDeMQXXN4vz80yLpDfOXimdD5ihNYBxZY6Wkfp +V/cjzhCWbtN9OYh4dcIi7SdW9qBPnn6KdkrNhQotKPTOW8ldASbsD0WKM+UyZJ8STzJ856U 4kSdkCNDSSNyk2sS+Z2njCLz9I+rDum8zY5pa9854ud3ARV0gK1XYfNu/vKDwOeOAwP+teKH Pz3Lsim9OnQxkqR/X+IkNAc/nIptXNmp6jSwUBHQQb5A6Hii7twKLmEjCDty1uHA9n8PMHyy zoggb57qKsv7WQ0RnHzVLe6JxQhZ/I1sZDPsqRkcIYQw+cxDpAJb4RGoFqjgpF491H22xa0u UkZC1Qevib3kmhPl1dZyGdnzUIngxerEMKgmXo/0cL6faJNQ7STfAxyb6wtnDimhMdVBYW6t MM40uJ85VQFh/OhyL7+pzBUAxrjFO9pT44nfcUlGE3a/pWVFZ9l/1pwKpuKuZ3IAvqrIQ8VO V+BsDV4/hbNVuccnDCp2FqhNihRG46EBuKSlUL/pX96UkcoFlpi08DgMAPlHYJ85wwD5FC+u TfK6xt0LVDVNUfY65xDPoIBcG3FmvOSxTRN3/6GyWuKIgXf3bW75Ln6rQ84++nPJQO0ZspgZ zEFEhVsGYjEnieffFmHKc7hywlbF/NLwgFkPsul6SRkoeMN4bWDQ==
X-Talos-CUID: 9a23:5S69jmGrtinnoOcaqmJ99kQsAusiLUbUxWj1B12aBWZJaeyKHAo=
X-Talos-MUID: 9a23:OdRG1wkQ+TaQcIo8eGfGdnpLEsc1xqPtUns8vsocvorHKQJveC602WE=
X-IronPort-Anti-Spam-Filtered: true
Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Jul 2023 20:11:11 +0000
Received: from rcdn-opgw-5.cisco.com (rcdn-opgw-5.cisco.com [72.163.7.169]) by rcdn-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 36QKBA2K006608 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <avt@ietf.org>; Wed, 26 Jul 2023 20:11:11 GMT
Authentication-Results: rcdn-opgw-5.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=mzanaty@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.01,232,1684800000"; d="scan'208,217";a="4708253"
Received: from mail-mw2nam12lp2042.outbound.protection.outlook.com (HELO NAM12-MW2-obe.outbound.protection.outlook.com) ([104.47.66.42]) by rcdn-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Jul 2023 20:11:09 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=aTX5F4LQJyuHztiFAZC46dkxz1vQPHaQWef87Jfn10oIfyYkSCrPq1/HA8FwdCR2JY0iWB7FMi7A5Y0haY77xQO00OB7gRLN1ESeiZvVe47qvFeUne3OxzzACxg3jBY5lonFDCKaxlUH8ZFTKn+mY8z7SYs5QKXU0K0fCTEZ42F0h8aDDoysuqfcJQQBusVbTIYVcB8qWJHbSpKkPDzf5IdnuyAodGVDw47PWqAsPjY4qCd2qG8G/DSSlxNTIdidi3AsF1kvm9SR/X4U+7jkSFqjzsUSoCQZGAkf+4dy/ABQ+s02DLaKPbnLGjZK3nLWVkKx7VHAaY4W9l6dbmky/A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Hxj2ynJERL2RyXoOA6nFG8WxSRZOeZADEdcdCCPoc0c=; b=gKxQGjc47IhUOCocXsQEtzprlnJUrBhNM2szasrwzaTxNTdkS7faQPE2rNQzv2OOnmYZeVLE1DbGEXLBVrfLFT60jY/4qkyoXKYUQsvc1t7D0+704v3KiJFnIOqsJW5PBVNzbMYUqL94o2qDZpXr6xSJgVmL5i9XF5ggvILwvMfHsEv9Fq46HPoEewmbP3lNGJrQAkCrMxktZ0DnFbFvBabxE37OSKSLOQ8L9qCX25kb8Tj+JMo22mWpxO+G5OSApuAdSBoUlpz/8JUn3ucPfD2ACeefKSYkiFOi24A49eM55yZd2m4pwzf+uCfoIPnewUCD2NplqBIAmLLK1HWYug==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Hxj2ynJERL2RyXoOA6nFG8WxSRZOeZADEdcdCCPoc0c=; b=onMpYgymFeHVraYZDKeJP7Am3InhxZM67UIOjdHIgHdxH0VrYrWz+a5lbRQ0LF0EitdGarkFsMpQ333QRrtL8E4SNAfAc6kABV0CmOukciZgKAe8DJuEwAsLfEUqtiYmwNS5tEbCGvivZtGdAogaGzPdTaYZ9VOcza+oWjkYkK8=
Received: from BN7PR11MB2753.namprd11.prod.outlook.com (2603:10b6:406:b0::23) by CH3PR11MB7202.namprd11.prod.outlook.com (2603:10b6:610:142::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6609.33; Wed, 26 Jul 2023 20:11:07 +0000
Received: from BN7PR11MB2753.namprd11.prod.outlook.com ([fe80::24bc:b827:b434:3484]) by BN7PR11MB2753.namprd11.prod.outlook.com ([fe80::24bc:b827:b434:3484%7]) with mapi id 15.20.6631.026; Wed, 26 Jul 2023 20:11:07 +0000
From: "Mo Zanaty (mzanaty)" <mzanaty@cisco.com>
To: "avt@ietf.org" <avt@ietf.org>
Thread-Topic: [AVTCORE] I-D Action: draft-ietf-avtext-framemarking-15.txt
Thread-Index: AQHZv/odn49TancL8Eqi4z7aatVyOq/MeDKF
Date: Wed, 26 Jul 2023 20:11:07 +0000
Message-ID: <BN7PR11MB27535E8BA2B4983AC2550364B400A@BN7PR11MB2753.namprd11.prod.outlook.com>
References: <169040084612.3244.3445319869894398282@ietfa.amsl.com>
In-Reply-To: <169040084612.3244.3445319869894398282@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN7PR11MB2753:EE_|CH3PR11MB7202:EE_
x-ms-office365-filtering-correlation-id: 65214a19-cccb-4aed-c17d-08db8e1472a9
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN7PR11MB2753.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(4636009)(136003)(39860400002)(366004)(376002)(346002)(396003)(451199021)(6506007)(71200400001)(186003)(2906002)(66446008)(38100700002)(122000001)(66476007)(166002)(66574015)(52536014)(316002)(53546011)(83380400001)(66556008)(5660300002)(41300700001)(66946007)(33656002)(76116006)(8676002)(64756008)(8936002)(38070700005)(86362001)(55016003)(966005)(9686003)(7696005)(6916009)(478600001)(66899021); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BN7PR11MB27535E8BA2B4983AC2550364B400ABN7PR11MB2753namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN7PR11MB2753.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 65214a19-cccb-4aed-c17d-08db8e1472a9
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Jul 2023 20:11:07.7147 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: J5SYAqR2UCad/sPAz+YPUr7oocAb2CGW/1sDUbv1HdPj7aY9RistguWGMlZHWNQTwKz0IP56V7lCHs5P223L5g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR11MB7202
X-Outbound-SMTP-Client: 72.163.7.169, rcdn-opgw-5.cisco.com
X-Outbound-Node: rcdn-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/avt/IOxFKW6QuuxFjYHX7ntaH2GyQoM>
Subject: Re: [AVTCORE] I-D Action: draft-ietf-avtext-framemarking-15.txt
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jul 2023 20:11:17 -0000

This revision addresses the open DISCUSS related to privacy considerations.

The new text of this section is below.

https://datatracker.ietf.org/doc/html/draft-ietf-avtext-framemarking-15#name-security-and-privacy-consid

4. Security and Privacy Considerations

In the Secure Real-Time Transport Protocol (SRTP) [RFC3711<https://www.rfc-editor.org/info/rfc3711>], RTP header extensions are authenticated and optionally encrypted [RFC9335<https://www.rfc-editor.org/info/rfc9335>]. When unencrypted header extensions are used, some metadata is exposed and visible to middle boxes on the network path, while encrypted media data and metadata in encrypted header extensions are not exposed.

The primary utility of this specification is for RTP switches to make proper media forwarding decisions. RTP switches are the SRTP peers of endpoints, so they can access encrypted header extensions, but not end-to-end encrypted private media payloads. Other middle boxes on the network path can only access unencrypted header extensions, since they are not SRTP peers.

RTP endpoints which negotiate this extension should consider whether this video frame marking metadata needs to be exposed to the SRTP peer only, in which case the header extension can be encrypted; or whether other middle boxes on the network path also need this metadata, for example, to optimize packet drop decisions that minimize media quality impacts, in which case the header extension can be unencrypted, if the endpoint accepts the potential privacy leakage of this metadata. For example, it would be possible to determine keyframes and their frequency in unencrypted header extensions. This information can often be obtained via statistical analysis of encrypted data. For example, keyframes are usually much larger than other frames, so frame size alone can leak this in the absence of any unencrypted metadata. However, unencrypted metadata provides a reliable signal rather than a statistical probability; so endpoints should take that into consideration to balance the privacy leakage risk against the potential benefit of optimized media delivery when deciding whether to negotiate and encrypt this header extension.

________________________________
From: avt <avt-bounces@ietf.org> on behalf of internet-drafts@ietf.org <internet-drafts@ietf.org>
Sent: Wednesday, July 26, 2023 12:47:26 PM
To: i-d-announce@ietf.org <i-d-announce@ietf.org>
Cc: avt@ietf.org <avt@ietf.org>
Subject: [AVTCORE] I-D Action: draft-ietf-avtext-framemarking-15.txt


A New Internet-Draft is available from the on-line Internet-Drafts
directories. This Internet-Draft is a work item of the Audio/Video Transport
Core Maintenance (AVTCORE) WG of the IETF.

   Title           : Video Frame Marking RTP Header Extension
   Authors         : Mo Zanaty
                     Espen Berger
                     Suhas Nandakumar
   Filename        : draft-ietf-avtext-framemarking-15.txt
   Pages           : 16
   Date            : 2023-07-26

Abstract:
   This document describes a Video Frame Marking RTP header extension
   used to convey information about video frames that is critical for
   error recovery and packet forwarding in RTP middleboxes or network
   nodes.  It is most useful when media is encrypted, and essential when
   the middlebox or node has no access to the media decryption keys.  It
   is also useful for codec-agnostic processing of encrypted or
   unencrypted media, while it also supports extensions for codec-
   specific information.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-avtext-framemarking/

There is also an htmlized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-avtext-framemarking-15

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-avtext-framemarking-15

Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts


_______________________________________________
Audio/Video Transport Core Maintenance
avt@ietf.org
https://www.ietf.org/mailman/listinfo/avt