Re: [AVTCORE] Roman Danyliw's Discuss on draft-ietf-avtcore-rtp-scip-04: (with DISCUSS and COMMENT)

"Dan.Hanson@gd-ms.com" <Dan.Hanson@gd-ms.com> Tue, 07 February 2023 19:34 UTC

Return-Path: <Dan.Hanson@gd-ms.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26B4DC153CA8; Tue, 7 Feb 2023 11:34:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gd-ms.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hgSsAdpW6YB3; Tue, 7 Feb 2023 11:34:01 -0800 (PST)
Received: from vadc01-egs01.gd-ms.com (vadc01-egs01.gd-ms.com [137.100.132.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92986C153CA0; Tue, 7 Feb 2023 11:34:00 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=gd-ms.com; i=@gd-ms.com; q=dns/txt; s=esa; t=1675798440; x=1707334440; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=Pd/bk1LFuIAsVUqAgFLkswiJck3Tqz4E9nEJbCivtGA=; b=Zmflx8sdpYSNZHILWCGYKwnY8ZJG4hCgb+8p4nMwvsbwp6jwHxPj4GTO rAUaRG5yDt6fa++QLDZZ1WRKeDJyPM1jnYW5HqNRLiM1Q9S4KYBuQJzJw I5m86gV3lWcnKb6sGwvZ2D767dBicDZykqSGYYsw/j1nYqBo9vwatUTk6 YuLDxLTbAGZtN5ew8//6K8pditDJLuwaXrX3LynFeNSD89vNfbaVoyNyk 4s4NJerWqz94E3fQvyXMsEmT0quw16Ds/UNi3pvsZoIS1niHjbGVGq+iF TODGI38TstOr01rz07ZABZxPw9MupkkYAaDWoZj81NMbjPQYVIF+/6ypb Q==;
X-IronPort-AV: E=Sophos; i="5.97,278,1669093200"; d="scan'208,217"; a="44838692"
Received: from unknown (HELO eadc-e-fmsprd01.eadc-e.gd-ais.com) ([10.96.30.97]) by vadc01-egs01.gd-ms.com with ESMTP; 07 Feb 2023 14:33:59 -0500
Received: from VADC-MMB03.GD-MS.US (vadc-mmb03.gd-ms.us [10.132.100.63]) by eadc-e-fmsprd01.eadc-e.gd-ais.com (Postfix) with ESMTP id 34B36FB04FC; Tue, 7 Feb 2023 19:33:59 +0000 (UTC)
Received: from VADC-MCA02.GD-MS.US (10.132.100.43) by VADC-MMB03.GD-MS.US (10.132.100.63) with Microsoft SMTP Server (TLS) id 15.0.1497.45; Tue, 7 Feb 2023 14:33:58 -0500
Received: from USG02-CY1-obe.outbound.protection.office365.us (137.100.132.86) by VADC-MCA02.GD-MS.US (10.132.100.79) with Microsoft SMTP Server (TLS) id 15.0.1497.45 via Frontend Transport; Tue, 7 Feb 2023 14:33:57 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=CkLP5jPWdNX0aZgG6i+JgNJV+L9Bn+chUq712S6cXM1ylKDA3RLeM11BdBwt81FMNacX70pO1Ry77+lYp7JE4XBfeKw5gNk91oBKIfZjmCUyBloIr0lvUIKQEqbXgIQyvat2r/FUbqnUOmIy+vlhOBOI+ED4TWayyxMXkpCpcz/BTpGphAT7XaIlvwaTijRcGjuxezYzf0CajZ1y+ZVQv8RsGu1XPlZK+YTDwgPsVrTrv7fdylFwzX3lGW7CxOlfD3KzqbVZzp4Zj+fS9OdN7MUppBQCkVmH0MKBQnWZ93Vr+3Kuts55IMhfLLTbaAM5vMd/PSSPHM5I/5tP7oLywQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=aUu8bvc3wLeQw1vtzzAZVB5ZmYW/AiYxtq0TheS7FsA=; b=kDqu5dma6vqU3W99cE76ZqGkg1ZiK5J4Z9SQJtK+8c0EuhlHBVH+7ZztSkd0lrUhClhE0vYfUex5XNrZhQ+cclTpcsaQcyNyiKNEKeRp5nx0Mm12ujI0riIy4aSq1Fp427ffDDTQHHo7td3ALvATfSvY1vJAn11KEyPcxHq5D3DCg74jft+4ZE/kTyoGpyhMeduugwP78WVEtDKb+bCUi+gS3yKBETlO/zG+piJL+sIrPIQkZCJcB6Yid02XPatmqbo64dzh+sZo2scyuYu1ibV/wGyFy6N7DsyPMz2n10/GbooGz4+y2gZXKS7/p6hgmCmZSEuA+1RZEw2n4K2Ihg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=gd-ms.com; dmarc=pass action=none header.from=gd-ms.com; dkim=pass header.d=gd-ms.com; arc=none
Received: from PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:189::10) by PH1P110MB1726.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:176::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6064.36; Tue, 7 Feb 2023 19:33:56 +0000
Received: from PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM ([fe80::a9b6:c577:6dac:7c71]) by PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM ([fe80::a9b6:c577:6dac:7c71%6]) with mapi id 15.20.6064.034; Tue, 7 Feb 2023 19:33:56 +0000
From: "Dan.Hanson@gd-ms.com" <Dan.Hanson@gd-ms.com>
To: Roman Danyliw <rdd@cert.org>, The IESG <iesg@ietf.org>
CC: "draft-ietf-avtcore-rtp-scip@ietf.org" <draft-ietf-avtcore-rtp-scip@ietf.org>, "avtcore-chairs@ietf.org" <avtcore-chairs@ietf.org>, "avt@ietf.org" <avt@ietf.org>, "jonathan.lennox@8x8.com" <jonathan.lennox@8x8.com>, "bernard.aboba@gmail.com" <bernard.aboba@gmail.com>
Thread-Topic: Roman Danyliw's Discuss on draft-ietf-avtcore-rtp-scip-04: (with DISCUSS and COMMENT)
Thread-Index: AQHZH6UKfqe/eIKZVk6oB7VAzvpJCK6OnqDwgAMQf4CAErJxkIAftLUw
Date: Tue, 07 Feb 2023 19:33:56 +0000
Message-ID: <PH1P110MB117233E0B23CBFB61A19FF94D5DB9@PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM>
References: <167277215682.29620.18106963117546535615@ietfa.amsl.com> <PH1P110MB1172517274360EB464E94EB5D5F59@PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM> <BN2P110MB1107234793FC7AA980448D90DCFB9@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM> <PH1P110MB117201973DA5F806B0B2ECCED5C79@PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM>
In-Reply-To: <PH1P110MB117201973DA5F806B0B2ECCED5C79@PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=gd-ms.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH1P110MB1172:EE_|PH1P110MB1726:EE_
x-ms-office365-filtering-correlation-id: 7bcda003-f3e4-43f6-48fe-08db094240e0
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230025)(366004)(451199018)(55016003)(86362001)(110136005)(54906003)(186003)(33656002)(7696005)(71200400001)(4326008)(66946007)(76116006)(5660300002)(8676002)(8936002)(66556008)(66446008)(66476007)(64756008)(26005)(2906002)(9686003)(498600001)(53546011)(966005)(6506007)(82960400001)(38100700002)(166002)(52536014)(83380400001)(38070700005)(122000001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: FGykYbBhLLFvz94UgNm+J1Uy4Olu4u84WhpV4MSlwklroghXiHK998NdTGSXeK+U8WikRsrPYAv8e4PnzguaMz06VLlUPbS58G2uok92AJiaJN43FoWETKYUrymJZOCtiDOjcHOIpPfkUTUx4AifQFrHBbELrBMBW8rHigWa62AwLINVLSjbMvtqp9rt1SCdCtil8f6wTIJw0NQPjguQKzLxu1LqDg+GtFFwmmv99LwC36ahtJuHJdAenBt7YsbLCSG41ZZXxABoe23ZwKgEi6fwhUomV8drZJxdUTJN7UBJ5sCPpcTihH2TsG+WgGP/RNzbOe316pLP4oHHIcDylXJEr0Lz50wVVv1U4CUEnj+05iB6x5s8rabx6nzFax8RYKAGQ4OX+dEKklH3ePc4WcocKCVqEPVYoA3Zl4WiOpo=
Content-Type: multipart/alternative; boundary="_000_PH1P110MB117233E0B23CBFB61A19FF94D5DB9PH1P110MB1172NAMP_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH1P110MB1172.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 7bcda003-f3e4-43f6-48fe-08db094240e0
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Feb 2023 19:33:56.3363 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 7c5a26cf-ddf0-400c-9703-4070b4e3a54d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH1P110MB1726
X-OriginatorOrg: gd-ms.com
X-TM-SNTS-SMTP: E3F954CD73F8FC5DD723B07E8FC64CEF52B054EB6D51E7CCD50626F18CD33BC42000:8
X-Content-Scanned: Fidelis Mail
Archived-At: <https://mailarchive.ietf.org/arch/msg/avt/NxS0Vefdzq1QVHE_yjYqazJVfi8>
Subject: Re: [AVTCORE] Roman Danyliw's Discuss on draft-ietf-avtcore-rtp-scip-04: (with DISCUSS and COMMENT)
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Feb 2023 19:34:05 -0000

Roman,

Have you received a copy of the SCIP-210 document?  It would answer most of your concerns.  Contact ncia.cis3@ncia.nato.int to receive a copy.

Dan Hanson
General Dynamics Mission Systems

From: Hanson, Daniel C
Sent: Wednesday, January 18, 2023 10:45 AM
To: Roman Danyliw <rdd@cert.org>; Dan.Hanson@gd-ms.com <Dan.Hanson=40gd-ms.com@dmarc.ietf.org>; The IESG <iesg@ietf.org>
Cc: draft-ietf-avtcore-rtp-scip@ietf.org; avtcore-chairs@ietf.org; avt@ietf.org; jonathan.lennox@8x8.com; bernard.aboba@gmail.com
Subject: RE: Roman Danyliw's Discuss on draft-ietf-avtcore-rtp-scip-04: (with DISCUSS and COMMENT)

Roman,

Have you received a copy of the SCIP-210 document?  It would answer most of your concerns.

More responses below.

Dan Hanson
General Dynamics Mission Systems

From: Roman Danyliw <rdd@cert.org<mailto:rdd@cert.org>>
Sent: Friday, January 06, 2023 12:49 PM
To: Dan.Hanson@gd-ms.com<mailto:Dan.Hanson@gd-ms.com> <Dan.Hanson=40gd-ms.com@dmarc.ietf.org<mailto:Dan.Hanson=40gd-ms.com@dmarc.ietf.org>>; The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>
Cc: draft-ietf-avtcore-rtp-scip@ietf.org<mailto:draft-ietf-avtcore-rtp-scip@ietf.org>; avtcore-chairs@ietf.org<mailto:avtcore-chairs@ietf.org>; avt@ietf.org<mailto:avt@ietf.org>; jonathan.lennox@8x8.com<mailto:jonathan.lennox@8x8.com>; bernard.aboba@gmail.com<mailto:bernard.aboba@gmail.com>
Subject: RE: Roman Danyliw's Discuss on draft-ietf-avtcore-rtp-scip-04: (with DISCUSS and COMMENT)

External E-mail --- CAUTION: This email originated from outside GDMS. Do not click links or open attachments unless you recognize the sender and know the content is safe.

Hi Dan!

Thanks for the follow-up.  More inline ...

From: iesg <iesg-bounces@ietf.org<mailto:iesg-bounces@ietf.org>> On Behalf Of Dan.Hanson@gd-ms.com<mailto:Dan.Hanson@gd-ms.com>
Sent: Wednesday, January 4, 2023 2:04 PM
To: Roman Danyliw <rdd@cert.org<mailto:rdd@cert.org>>; The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>
Cc: draft-ietf-avtcore-rtp-scip@ietf.org<mailto:draft-ietf-avtcore-rtp-scip@ietf.org>; avtcore-chairs@ietf.org<mailto:avtcore-chairs@ietf.org>; avt@ietf.org<mailto:avt@ietf.org>; jonathan.lennox@8x8.com<mailto:jonathan.lennox@8x8.com>; bernard.aboba@gmail.com<mailto:bernard.aboba@gmail.com>
Subject: RE: Roman Danyliw's Discuss on draft-ietf-avtcore-rtp-scip-04: (with DISCUSS and COMMENT)

Roman,

Responses to comments below in [DH] red.

Dan Hanson
General Dynamics Mission Systems

-----Original Message-----
From: Roman Danyliw via Datatracker <noreply@ietf.org<mailto:noreply@ietf.org>>
Sent: Tuesday, January 03, 2023 1:56 PM
To: The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>
Cc: draft-ietf-avtcore-rtp-scip@ietf.org<mailto:draft-ietf-avtcore-rtp-scip@ietf.org>; avtcore-chairs@ietf.org<mailto:avtcore-chairs@ietf.org>; avt@ietf.org<mailto:avt@ietf.org>; jonathan.lennox@8x8.com<mailto:jonathan.lennox@8x8.com>; bernard.aboba@gmail.com<mailto:bernard.aboba@gmail.com>; bernard.aboba@gmail.com<mailto:bernard.aboba@gmail.com>
Subject: Roman Danyliw's Discuss on draft-ietf-avtcore-rtp-scip-04: (with DISCUSS and COMMENT)

----
External E-mail --- CAUTION: This email originated from outside GDMS. Do not click links or open attachments unless you recognize the sender and know the content is safe.

Roman Danyliw has entered the following ballot position for
draft-ietf-avtcore-rtp-scip-04: Discuss

When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.)


Please refer to https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/
for more information about how to handle DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-avtcore-rtp-scip/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

(I conducted my review without access to [SCIP210])

** Section 4.  It isn't clear what the format of the payload is from the
description provided in this text beyond asserting that it is negotiated via
SCIP-210 and that the SCIP codec is an encrypted bitstream.  Are all details
entirely opaque?  If so, can the text please be more explicit in stating that.

[DH] All of the security properties are within the SCIP-210 session establishment protocol so it is "opaque" at the RTP payload level.

[Roman] I appreciate this clarification.  I'm still confused.  Taking the title of this document ("RTP Payload Format for the Secure Communication Interoperability Protocol (SCIP) Codec") and the associated section title ("Section 4.  Payload Format") literally, and considering that this document has proposed standard status, I was expecting the text to explain in a normative fashion how to decode or interpret the contents of the RTP payload.  Two common ways I could envision that could be done is by putting text in this document or via normative references.

[Roman] The text that is present here makes an informal reference to SCIP-210 and provides no further guidance on how to read the RTP payload.  As a reader, I don't have sufficient information to understand the RTP payload.  It's fine that it's blob (in a sense, all RTP payload is a blob of some kind), but where is the normative reference to parse the blob.

[Roman] Appreciating there is a rich IETF history in publishing "RTP Payload" documents, I conducted a quick survey to confirm that their substance is consistent with my expectations described above.  My quick survey of other "RTP Payload" format documents seems to confirm that they all devote some text to explaining how to decode what is in the RTP payload and crucially provide a normative reference to the associated codec/payload.  I looked that these:

-- RFC4578 (RTP Payload Format for H.261 Video Streams)
-- RFC6184 (RTP Payload Format for H.264 Video)
-- RFC7587 (RTP Payload Format for the Opus Speech and Audio Codec)
-- RFC7798 (RTP Payload Format for High Efficiency Video Coding (HEVC))
-- RFC9134 (RTP Payload Format for ISO/IEC 21122)
-- draft-ietf-payload-vp9 (RTP Payload Format for VP9 Video)
-- draft-ietf-avtcore-rtp-v3c (RTP Payload Format for Visual Volumetric Video-based Coding)

[Roman] Can the WG explain how it's possible to describe an RTP payload format without citing or explaining the details of that format in a normative fashion?

[DH] The WG decided a while back that SCIP-210 would be a informative reference.  Any implementor that would build a SCIP device would have access to the SCIP-210 specification.  Network devices (e.g., SBCs, Proxies, ...) do not need 'decode' or 'encode' the SCIP payload blob.  They merely need to pass it on.


** Section 6.  RFC7202 appears to be cited here as a reminder to the reader
that there are a variety of possible security solutions in the RTP ecosystem.
My confusion is that it isn't clear how this flexibility applies in the case of
SCIP.  It appears that there is tight coupling between the SCIP session
negotiation and the embedded content in the RTP stream.  Specifically, Section
4 notes that "The SCIP codec produces an encrypted bitstream that is
transported over RTP."  Doesn't the use of an SCIP payload (the blob generated
by a SCIP codec) imply a set of security properties?  Where are those formally
documented?  Section 2 hints at them being "end-to-end security at the
application layer, authentication of user identity, the ability to apply
different security levels for each secure session, and secure communication
over any end-to-end data connection."

[DH] All of the security properties are specified in SCIP-210. While the SCIP payload is encrypted, it does not address many of the RTP security issues identified in RFC7202. For example, there is no RTP header authentication as specified SRTP (RFC3711), nor are RTCP messages encrypted or authenticated.  Therefore we feel this Security Considerations boilerplate text still applies.

[Roman] Thanks for explaining.  I respectfully disagree that the RFC7202 boilerplate is sufficient here.  My high-level read of RFC7202 is that there are a range of solutions in the rich RTP ecosystem by which a generic RTP stream could be secured - these would apply to SCIP or anything else - and applications need to make the specific decisions.  What is different in the case of SCIP is that unlike RTP payloads such as H.261, H.264, H.265, V9, etc, the SCIP payload has and provides security services above an beyond whatever would be provided by RTP.  If the RTP payload of SCIP is being described by the document, the residual (above an beyond RTP) protections it affords need to be described or cited.

[DH] SCIP only encrypts the payload; it does not provide the other security services suggested in RFC7202.

----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

[snip]

[DH] With respect to network equipment manufacturers, the intent is to inform them of the existence of the "scip" payload so they can allow "scip" to traverse their networks.  There is no "implementation" of SCIP itself in network equipment such as Session Border Controllers or Call Managers.

[Roman] The WG understand the community better than me.  In my view, if the primary purpose of the document is intended to inform about the existence of the SCIP payload, why are the media registrations insufficient (https://www.iana.org/assignments/media-types/video/scip, https://www.iana.org/assignments/media-types/audio/scip)?

[DH] It is our understanding that in order to get network devices (SBCs, Call Managers, ...) to support SCIP, a more substantial reference beyond an IANA registration is needed.


Regards,
Roman