Re: [avtext] WGLC for draft-ietf-avtext-rtp-duplication-02

Magnus Westerlund <magnus.westerlund@ericsson.com> Tue, 20 August 2013 08:09 UTC

Return-Path: <magnus.westerlund@ericsson.com>
X-Original-To: avtext@ietfa.amsl.com
Delivered-To: avtext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 701D911E81EB for <avtext@ietfa.amsl.com>; Tue, 20 Aug 2013 01:09:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.602
X-Spam-Level:
X-Spam-Status: No, score=-103.602 tagged_above=-999 required=5 tests=[AWL=-1.003, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fO6sJSq4az6e for <avtext@ietfa.amsl.com>; Tue, 20 Aug 2013 01:09:28 -0700 (PDT)
Received: from sesbmg20.ericsson.net (sesbmg20.ericsson.net [193.180.251.56]) by ietfa.amsl.com (Postfix) with ESMTP id E63F311E81A3 for <avtext@ietf.org>; Tue, 20 Aug 2013 01:09:22 -0700 (PDT)
X-AuditID: c1b4fb38-b7fcf8e0000062b8-c0-521324312981
Received: from ESESSHC015.ericsson.se (Unknown_Domain [153.88.253.124]) by sesbmg20.ericsson.net (Symantec Mail Security) with SMTP id F7.7D.25272.13423125; Tue, 20 Aug 2013 10:09:21 +0200 (CEST)
Received: from [127.0.0.1] (153.88.183.148) by smtp.internal.ericsson.com (153.88.183.65) with Microsoft SMTP Server id 14.2.328.9; Tue, 20 Aug 2013 10:09:20 +0200
Message-ID: <5213244D.8020207@ericsson.com>
Date: Tue, 20 Aug 2013 10:09:49 +0200
From: Magnus Westerlund <magnus.westerlund@ericsson.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/20130801 Thunderbird/17.0.8
MIME-Version: 1.0
To: Jonathan Lennox <jonathan@vidyo.com>
References: <8DB3E9B2-31D2-4817-9A62-EBB044D72B30@vidyo.com>
In-Reply-To: <8DB3E9B2-31D2-4817-9A62-EBB044D72B30@vidyo.com>
X-Enigmail-Version: 1.5.2
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprNLMWRmVeSWpSXmKPExsUyM+Jvja6hinCQwfunmhYf791gtbjb1MVu sX/xeWYHZo8lS34yeXy5/JnNo+3ZHfYA5igum5TUnMyy1CJ9uwSujKnrH7EVTDarOL3vKnMD Y79OFyMnh4SAicT1f3tYIWwxiQv31rOB2EICRxklnlwp6GLkArKXM0r8unmOESTBK6At8Xn/ aTCbRUBVYvPl4+wgNpuAhcTNH41gzaICwRLt27+yQdQLSpyc+YQFxBYR0JC4+OwDG8hQZoFJ jBL3NnWDJYQFnCWan70DSnAAbbORmHsI7DhOAVuJPx87mSCOk5TYtugY2C5mAT2JKVdbGCFs eYnmrbOZIY7Wlmho6mCdwCg0C8nqWUhaZiFpWcDIvIqRozi1OCk33chgEyMwgA9u+W2xg/Hy X5tDjNIcLErivFv0zgQKCaQnlqRmp6YWpBbFF5XmpBYfYmTi4JRqYBS7pZWR/WyRoIDCFHUd BTF2g+kb+zIl0vaJrL76YnfY4wcXjj1J7V627/Lh2BK9/FgRiyyJ6cLPTR/Pfz+L+8YZrsY3 T8yd2QqFJ26YYqJ3YkeB1MHQ1g+sPhnvLYvd1Z9H/DrwLel+39brK6ZM+CdbLfVtO5/Mno/9 Xd9DVD1ZfgpKyCXG1SmxFGckGmoxFxUnAgBuUV6xLgIAAA==
Cc: "avtext@ietf.org" <avtext@ietf.org>, "draft-ietf-avtext-rtp-duplication@tools.ietf.org" <draft-ietf-avtext-rtp-duplication@tools.ietf.org>
Subject: Re: [avtext] WGLC for draft-ietf-avtext-rtp-duplication-02
X-BeenThere: avtext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Audio/Video Transport Extensions working group discussion list <avtext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avtext>, <mailto:avtext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avtext>
List-Post: <mailto:avtext@ietf.org>
List-Help: <mailto:avtext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avtext>, <mailto:avtext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Aug 2013 08:09:33 -0000

Hi,

I have reivewed this draft and have a few comments.

1. Section 5. Source and duplicate association.

Where the single RTP session association at least have one safe but
signalling support dependent solution (using SDP and ssrc-group) the
spatial separated one only has half a solution. As the source and
duplication goes in different RTP sessions, in cases where each session
contains multiple SSRCs that has the same SDES CNAME then explicit
association is not provided. Instead heuristics needs to be applied.

My understanding is that these heuristics will look something like this.
Look at RTP packets Seq and TS field and match those between the two RTP
sessions. I agree this will work in the majority of the cases, but it is
not fail-safe. If one starts two audio streams with the same codec and
packetization parameters using a common starting point and the same TS
and Seq they will not be possible to correctly separate. Having multiple
audio streams may actually be common in environments where multiple
audio tracks are provided. Having the same Seq and TS is unlikely in
cases of good implementation, but can occur when randomization of Seq
and TS start is not implemented.

First of all, if heuristics are expected to be used, I think some basic
heuristics and its failure cases should be described in this document.

The SDP grouping mechanism as currently defined is not sufficient for
this. The issue is that you want to group one SSRC in one RTP session
with another SSRC in another RTP session. That is not supported by
grouping framework that groups RTP sessions (m= blocks) and
SSRC-grouping that groups SSRCs within the same RTP session (m= block).

I think the best solution for this problem would be to have a RTCP SDES
item that identifies identical streams. However, we have clearly not yet
reached a consensus for how the different type of grouping identifiers
need is supposed to work. Should they be hierarchical or purpose
specific. This is the discussion around SRCNAME.
https://datatracker.ietf.org/doc/draft-westerlund-avtext-rtcp-sdes-srcname/

It may not be necessary to have this document hold up for a solution be
finished here. I think one or more will become available. However, I
think it is essential that the issue, when it can arise and the
requirement on a solution to be documented.

2. Congestion Considerations

I think this document do need a congestion consideration section. Yes,
it can double or triple the bandwidth requirement and that is worth a
bit more discussion. However the bigger issue is that spatial vs single
RTP session usage has different ways a congestion control needs to act.
That is definitely needing a discussion.

So lets consider the single RTP session duplication. As the duplicate
stream has the same five tuple, and only SSRC differs it can be expected
to share UDP flow and path through the network. Thus in this case the
original and the duplicate must be expected to share bottlenecks. Thus
any congestion control needs to operate on the aggregate of the two
streams. Due to the tight coupling, even if only the source stream is
congestion controlled end-to-end there will be reaction to a congestion
situation in the shared bottleneck. However, if not taking the
duplication into account the reaction will be less than for a single non
duplicated stream with double the bandwidth from the original.

In spatial separation cases, the congestion control may not know if the
congested part is a shared bottleneck or not. Thus independent
congestion control loops are needed for the original and the duplicate.
Then as they are tightly couple the actual used bandwidth needs to be
the lower common denominator between the independent controllers.
Otherwise if the bottleneck is not shared and on the duplicate path,
then the original will go through fine, but not the duplicate.

Thirdly, the congestion state with end-to-end vs between the duplication
point and re-assembly point needs to be discussed. This is the same
issue that using FEC below the RTP stack has. As the end-receiver are
not seeing the losses, except for losses in both streams, the receiver
sees a more ideal path than reality. Thus injected RTCP reports from the
re-assembly point or even congestion control messages to the media
source from re-assembly needs to be considered to make the system work.

These issues I do expect to see discussed in a congestion control
considerations section.

3. Section 7.

I think the end-to-end usage of SRTP encryption and authentication with
on the path duplication and de-duplication needs to be a bit more
explicit about that this can be done, as long as the RTP headers
entering the duplication node is identical after de-duplication. If not
the end-receiver can not decrypt or authenticate the packets successfully.

Then the next issue is the protection of any such duplication system.
The basic threat I see is that if I know a duplication service is
running in a network and know which 5-tuple filters it is using, I could
use that node to amplify my DDOS attack. Thus letting the target
networks services be used against itself. If one believe this is a
threat then one needs to authenticate the incomming traffic prior to
duplication as being the traffic authorized for duplication. I think
several solutions exist to that problem.


Cheers

Magnus





On 2013-08-13 18:14, Jonathan Lennox wrote:
> (As WG cochair)
> 
> This is to announce a working group last call for draft-ietf-avtext-rtp-duplication-02:
> 
> http://datatracker.ietf.org/doc/draft-ietf-avtext-rtp-duplication/?include_text=1
> 
> Please respond to the list by Tuesday, September 3, 2013 (i.e. 3 weeks time) with any comments.
> 
> This is intended as a standards track RFC.
> 
> It is helpful to attempt to categorise the type of your comment (including severity) and also to assist to provide any replacement text you feel is necessary.
> 
> If you review the document and have no comments, please tell the chairs that you have reviewed it. This is always useful information in assessing the degree of WG review and consensus behind the document.
> 
> 
> --
> Jonathan Lennox
> jonathan@vidyo.com
> 
> 
> _______________________________________________
> avtext mailing list
> avtext@ietf.org
> https://www.ietf.org/mailman/listinfo/avtext
> 
> 


-- 

Magnus Westerlund

----------------------------------------------------------------------
Multimedia Technologies, Ericsson Research EAB/TVM
----------------------------------------------------------------------
Ericsson AB                | Phone  +46 10 7148287
Färögatan 6                | Mobile +46 73 0949079
SE-164 80 Stockholm, Sweden| mailto: magnus.westerlund@ericsson.com
----------------------------------------------------------------------