[AVTCORE] draft-ietf-avtcore-mprtp-03

Ted Hardie <ted.ietf@gmail.com> Fri, 07 April 2017 21:49 UTC

Return-Path: <ted.ietf@gmail.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 79E70127871 for <avt@ietfa.amsl.com>; Fri, 7 Apr 2017 14:49:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jeAjGa7u6bv3 for <avt@ietfa.amsl.com>; Fri, 7 Apr 2017 14:49:35 -0700 (PDT)
Received: from mail-qk0-x22e.google.com (mail-qk0-x22e.google.com [IPv6:2607:f8b0:400d:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26D3D127097 for <avt@ietf.org>; Fri, 7 Apr 2017 14:49:35 -0700 (PDT)
Received: by mail-qk0-x22e.google.com with SMTP id h67so73982051qke.0 for <avt@ietf.org>; Fri, 07 Apr 2017 14:49:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=caReqXfm1xzl+3X99oqp5s/RlHer4kPqs7m/yaVnl60=; b=sXwLI5ea5kaK/PLKdjFlhwpFILxeEnywnuWzPBmmfbMhyd+9QMMfxPN61tTAn+cVpi wQvgiye9Y5SNi7NT6v4foCd8n4AvioTM/kgiBKOK8gqTYnhM61Psz5U7HtJmkBz7H714 UPN4j5feRKeXSE25nSkvCIXjZihYbkh5z0EcKI/A8A8QA908p2TuZhyVQrYi7rf+FV0T N532aouAnyM7BKLvtyTJ2kBc2vw2OsjgSWuiM692lqXoaYRVnKYzo33PNdSdIWAB7gVo GpiGQtGxisCs3M7br+3QjuvGOh8NnKHJZFXaZO1fvL+o9gfrRnr5Att6+I/S24ORdWix 5b+w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=caReqXfm1xzl+3X99oqp5s/RlHer4kPqs7m/yaVnl60=; b=FpWGCCZ+XIIhtYLAs48H36fFzX9z70oHPDvrfK8sfppkeUUr5zl+FRUyR4i+D6Mx17 v36ozewlDkv9jbDhXIv4qIzxKuacqs1ZSHAxdCxIZwHuBLXRI8/MubGpQQdLJgMPfmGs BtwG297lvxkv/3HhX9WAcZK423b+16FKsoZf+SQrbWGJs9SNAN2cRNsLwo5D/NJ/PqxI oaho/GAJC8nUrRooxqncDOgdLV0SMm4xx8KkNLBEWySwrLTdpNp6V2L3COZ/ClFPOJlQ b0vuBKZmkfpkuMRpssLfzkdWKAnrhCaZWj0YbIjq4CMDHbDcXnRSWLiRKIaveiZcGbEN 2eag==
X-Gm-Message-State: AN3rC/5E2drHK2K8N2OA+dA9UlhDQSLhFgluQuzvZEUW4zp8bQblidaXjOoAgYNCEc7SK6rrkD3gIkmom2qGGA==
X-Received: by 10.55.159.136 with SMTP id i130mr12793517qke.94.1491601773865; Fri, 07 Apr 2017 14:49:33 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.200.54.2 with HTTP; Fri, 7 Apr 2017 14:49:03 -0700 (PDT)
From: Ted Hardie <ted.ietf@gmail.com>
Date: Fri, 07 Apr 2017 14:49:03 -0700
Message-ID: <CA+9kkMDDPAxtEZ6ih0-DfQWMyznSLG9LpidQ0+P-LVJ9nQv0sA@mail.gmail.com>
To: avt@ietf.org, jonathan <jonathan@vidyo.com>
Content-Type: multipart/alternative; boundary="001a114d8db6e0b146054c9a996d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/avt/_VfCiW5ESVGwFaJ0WDkuvsIAYYE>
Subject: [AVTCORE] draft-ietf-avtcore-mprtp-03
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Apr 2017 21:49:41 -0000

Howdy,

I was asked to review this draft in Chicago; sorry for not getting to it
sooner.

First, the security considerations seem to be TBD entirely, which seems
surprising.  I was particularly interested to see how this draft would
tackle linkability, since it is an ongoing discussion in other groups (e.g.
QUIC).  I think that the security considerations, when written, need to
tackle both linkability (the ability of an observer to cross-correlate
traffic on two different paths as belonging to the same endpoint) and
consent freshness.

Second, I believe this requirement:

   Multipath RTP (MPRTP) MUST be backwards compatible; an MPRTP Stream
   needs to fall back to be compatible with legacy RTP stacks if MPRTP
   support is not successfully negotiated.

may need re-wording. I initially misread this team that MPRTP would appear
to be non-multipath RTP if the MPRTP support were not available (following
what was said about NAT bindings); it seems you mean instead that an MPRTP
stack must fall back to non-multipath RTP.  Clarifying this would be useful.

On the use cases,  the use case for fault tolerance has some very simple
applications that I have seen proposed in the past.  In one case, ambulance
telemetry was sent over multiple cellular networks--there, full duplication
was appropriate and the receiver simply threw away any information already
received from a different interface.  Load balancing applications are
harder, and I believe the draft may want to explicitly consider how
differential packet traversal times across different paths will impact the
number of applications that can use this.  If I understand this correctly,
a system with a playout buffer would be able to interleave RTP packets from
different subflows successfully.  A system without such a buffer or with
one too small for late arrivals will end up losing information.  There are
ways to get around this, but the document does not go into them in detail.
Will they be covered by later documents?

Also, the document says:

In contrast to RTCP, SDP offers a reliable
communication channel so that no separate retransmissions logic is
necessary.  In SDP, especially when combined with ICE, connectivity
check mechanisms including sophisticated rules are readily available.

While SDP is not inherently protected, suitable security may need to
be applied anyway to the basic session setup.

It's not clear what the draft means when it is saying "SDP offers a reliable
communication channel"; does this man to say SIP?

I am not currently subscribed to this list, so if there are comments in
response, please cc me.

thanks,

Ted