Re: [AVT] draft-ietf-avt-ports-for-ucast-mcast-rtp-04: Review Comments [csp]

"Ali C. Begen (abegen)" <abegen@cisco.com> Thu, 02 December 2010 15:23 UTC

Return-Path: <abegen@cisco.com>
X-Original-To: avt@core3.amsl.com
Delivered-To: avt@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 323F528C15D for <avt@core3.amsl.com>; Thu, 2 Dec 2010 07:23:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -8.608
X-Spam-Level:
X-Spam-Status: No, score=-8.608 tagged_above=-999 required=5 tests=[AWL=-1.609, BAYES_00=-2.599, J_CHICKENPOX_12=0.6, J_CHICKENPOX_13=0.6, J_CHICKENPOX_15=0.6, J_CHICKENPOX_17=0.6, J_CHICKENPOX_18=0.6, J_CHICKENPOX_19=0.6, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X8GyA511VBAX for <avt@core3.amsl.com>; Thu, 2 Dec 2010 07:23:15 -0800 (PST)
Received: from sj-iport-6.cisco.com (sj-iport-6.cisco.com [171.71.176.117]) by core3.amsl.com (Postfix) with ESMTP id AF83E28C158 for <avt@ietf.org>; Thu, 2 Dec 2010 07:23:15 -0800 (PST)
Authentication-Results: sj-iport-6.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AvsEAN5I90yrR7H+/2dsb2JhbACjIXGnYZsRhUcEhF6JHw
X-IronPort-AV: E=Sophos;i="4.59,288,1288569600"; d="scan'208";a="629552320"
Received: from sj-core-2.cisco.com ([171.71.177.254]) by sj-iport-6.cisco.com with ESMTP; 02 Dec 2010 15:24:31 +0000
Received: from xbh-sjc-231.amer.cisco.com (xbh-sjc-231.cisco.com [128.107.191.100]) by sj-core-2.cisco.com (8.13.8/8.14.3) with ESMTP id oB2FOVnL002522; Thu, 2 Dec 2010 15:24:31 GMT
Received: from xmb-sjc-215.amer.cisco.com ([171.70.151.169]) by xbh-sjc-231.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Thu, 2 Dec 2010 07:24:31 -0800
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 02 Dec 2010 07:24:16 -0800
Message-ID: <04CAD96D4C5A3D48B1919248A8FE0D540DC93C63@xmb-sjc-215.amer.cisco.com>
In-Reply-To: <4CF7A62A.808@ericsson.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [AVT] draft-ietf-avt-ports-for-ucast-mcast-rtp-04: Review Comments [csp]
Thread-Index: AcuSKRgF4vuXiSzAQ82y8b5uOmVZOQABRSCg
References: <4CF3BAB3.2000501@ericsson.com> <04CAD96D4C5A3D48B1919248A8FE0D540DC93041@xmb-sjc-215.amer.cisco.com> <EDC0A1AE77C57744B664A310A0B23AE21E36365E@FRMRSSXCHMBSC3.dc-m.alcatel-lucent.com> <396D3FC7-9DA5-416E-9883-7FABD7234652@csperkins.org> <04CAD96D4C5A3D48B1919248A8FE0D540DC93B87@xmb-sjc-215.amer.cisco.com> <4CF7A62A.808@ericsson.com>
From: "Ali C. Begen (abegen)" <abegen@cisco.com>
To: Magnus Westerlund <magnus.westerlund@ericsson.com>
X-OriginalArrivalTime: 02 Dec 2010 15:24:31.0236 (UTC) FILETIME=[043F2440:01CB9235]
Cc: Colin Perkins <csp@csperkins.org>, IETF AVT WG <avt@ietf.org>
Subject: Re: [AVT] draft-ietf-avt-ports-for-ucast-mcast-rtp-04: Review Comments [csp]
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Audio/Video Transport Working Group <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Dec 2010 15:23:18 -0000

Inline.

> -----Original Message-----
> From: Magnus Westerlund [mailto:magnus.westerlund@ericsson.com]
> Sent: Thursday, December 02, 2010 8:59 AM
> To: Ali C. Begen (abegen)
> Cc: Colin Perkins; IETF AVT WG
> Subject: Re: [AVT] draft-ietf-avt-ports-for-ucast-mcast-rtp-04: Review Comments [csp]
> 
> Hi,
> 
> My views on some of these comments
> 
> Ali C. Begen (abegen) skrev 2010-12-02 02:56:
> 
> >> - Section 3.2, 4th bullet on page 8: the discussion of how the token may remain valid for multiple sessions is unclear. It
> may
> >> be clearer to say that the token is valid for that port on the server until its expiration time, irrespective of what that port is
> >
> > Yes, reworded as requested.
> >
> >> used for. Following on from this, would it be appropriate to add a warning that the server port SHOULD NOT be reused for
> >> other RTP sessions until the expiration time of the tokens issued?
> >
> > Not sure why we would need this.
> 
> I think this is actually an interesting aspect of this. The draft seems
> to be missing text on the issues of re-using a unicast session for
> another usage. And here I think there are several aspects of this.
> - Reusing a unicast session for different type of RTCP requests (which
> may work

This is not a problematic case.

> - Reusing a unicast session for different multimedia session, which I
> think implies having them share the FTap.

This is not a problematic case, either.
> - Reuse over time of the port for different services. (which is the one
> I think Colin was going after).

OK, this is interesting. Lets discuss it. Remember that the PT port (server side) is advertised in the SDP at media or session level.

If advertised at the media level, PT is the port where the clients (who plan to start that particular unicast session with the server) send their token request message. This is illustrated in the SDP example in the draft.

If advertised at the session level, PT will be the port for obtaining a Token for any unicast session that is run between the server(s) and clients. Recall that existence of the 'portmapping-req' attribute indicates that a Token is required for all unicast sessions. Note that different unicast session may have different server addresses, the attribute above only indicates the common port for them.

Maybe, we should add the following SDP example to the draft. Here there are two SSMs with unicast feedback (4 "m" lines), the 'portmapping-req' is used at the session level. Each SSM has a different feedback target address.

        v=0
        o=ali 1122334455 1122334466 IN IP4 nack.example.com
        s=Local Retransmissions
        t=0 0
        a=group:FID 1 2
        a=group:FID 3 4
        a=rtcp-unicast:rsi
        a=portmapping-req:30000
        m=video 41000 RTP/AVPF 98
        i=Multicast Stream
        c=IN IP4 233.252.0.2/255
        a=source-filter:incl IN IP4 233.252.0.2 198.51.100.1 
        a=rtpmap:98 MP2T/90000
        a=multicast-rtcp:41500
        a=rtcp:42000 IN IP4 192.0.2.1
        a=rtcp-fb:98 nack
        a=mid:1
        m=video 42000 RTP/AVPF 99
        i=Unicast Retransmission Stream
        c=IN IP4 192.0.2.1
        a=sendonly
        a=rtpmap:99 rtx/90000
        a=rtcp-mux                            
        a=rtcp:42500
        a=fmtp:99 apt=98; rtx-time=5000
        a=mid:2
        m=video 51000 RTP/AVPF 98
        i=Multicast Stream
        c=IN IP4 233.252.0.3/255
        a=source-filter:incl IN IP4 233.252.0.3 198.51.100.2 
        a=rtpmap:98 MP2T/90000
        a=multicast-rtcp:51500
        a=rtcp:52000 IN IP4 192.0.2.2
        a=rtcp-fb:98 nack
        a=mid:3
        m=video 52000 RTP/AVPF 99
        i=Unicast Retransmission Stream
        c=IN IP4 192.0.2.2
        a=sendonly
        a=rtpmap:99 rtx/90000
        a=rtcp-mux                            
        a=rtcp:52500
        a=fmtp:99 apt=98; rtx-time=5000
        a=mid:4 
 
I also added the following to the SDP section for the 'portmapping-req' attribute:

" If used at a media level, the attribute MUST be used for a unicast media stream."

> >> - Section 5.3 should give a normative list of which RTCP packet types require the token verification messages. Does the
> RTCP
> >> BYE packet need this?
> >
> > I don’t think BYE messages need a Token. NACKs, RAMS-R and RAMS-T require Tokens.
> >
> 
> Ali, don't BYE also need it at least in the RAMS case? There a BYE
> message stops all bursts.

You are right. Somebody else may prematurely end your burst. This is true even in normal retransmission scenarios.
 
> I would say anyone that has any type of control function.

Right.
 
> > There could be some future packet formats or message types that might require a Token. How could we word this better?
> Any ideas?
> 
> I would divide them up into 3 categories:
> 
> 1. The ones that needs a special unicast session to work.
> - NACK
> - RAMS-R
> 
> 2. Control messages that could use the verification that they are
> comming from whom we previously has communicated with at this IP address.
> - CCM messages
> - RTCP Bye

These are the BYEs sent for the unicast sessions not multicast sessions which we do not need to use Token for. Agree?
 
> 3. Reports etc that no direct impact, although secondary impact can be
> present.
> 
> I do note that stronger source authentication mechanisms should be
> considered in all these cases.

Thanks, will change the text accordingly.

-acbegen