Re: [avtext] Proposed text for Alia and other AD's DISCUSS

"Ben Campbell" <ben@nostrum.com> Tue, 21 June 2016 21:45 UTC

Return-Path: <ben@nostrum.com>
X-Original-To: avtext@ietfa.amsl.com
Delivered-To: avtext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBE5B12D63E; Tue, 21 Jun 2016 14:45:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.326
X-Spam-Level:
X-Spam-Status: No, score=-3.326 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-1.426] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JyGlLXif77ZF; Tue, 21 Jun 2016 14:45:52 -0700 (PDT)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 745AE12DA70; Tue, 21 Jun 2016 14:45:52 -0700 (PDT)
Received: from [10.0.1.4] (cpe-66-25-7-22.tx.res.rr.com [66.25.7.22]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id u5LLjZTB003905 (version=TLSv1 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO); Tue, 21 Jun 2016 16:45:36 -0500 (CDT) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-66-25-7-22.tx.res.rr.com [66.25.7.22] claimed to be [10.0.1.4]
From: Ben Campbell <ben@nostrum.com>
To: Alia Atlas <akatlas@gmail.com>
Date: Tue, 21 Jun 2016 16:45:35 -0500
Message-ID: <E30D5C7F-33C4-4C02-8196-0C9FAA15A20A@nostrum.com>
In-Reply-To: <CAG4d1rfiY+wOZ4E38WOtVtvgLW-GEy=87AXyOG2Z1rZE3SKxDw@mail.gmail.com>
References: <20160615183734.26197.55835.idtracker@ietfa.amsl.com> <B8BB63C9-B261-4BBC-8CEE-5058010A8D8C@csperkins.org> <6BB6D77A-579F-4690-8582-A6B41A70CB4C@kuehlewind.net> <A3B3AC0F-40D9-418F-94CA-0B2988471BA3@gmail.com> <51E6A56BD6A85142B9D172C87FC3ABBB86ED8BD9@nkgeml513-mbx.china.huawei.com> <0B7CD9BF-8C01-4CED-AE2F-202DB6B477ED@nostrum.com> <CAG4d1rfiY+wOZ4E38WOtVtvgLW-GEy=87AXyOG2Z1rZE3SKxDw@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Mailer: MailMate (1.9.4r5234)
Archived-At: <https://mailarchive.ietf.org/arch/msg/avtext/vnMlRTkiKukp3I5G6WbPGCVBEdQ>
X-Mailman-Approved-At: Tue, 21 Jun 2016 14:50:33 -0700
Cc: "jonathan@vidyo.com" <jonathan@vidyo.com>, "avtext@ietf.org" <avtext@ietf.org>, "avtext-chairs@ietf.org" <avtext-chairs@ietf.org>, "kathleen.moriarty.ietf@gmail.com" <kathleen.moriarty.ietf@gmail.com>, Mirja Kuehlewind <ietf@kuehlewind.net>, The IESG <iesg@ietf.org>, "draft-ietf-avtext-splicing-notification@ietf.org" <draft-ietf-avtext-splicing-notification@ietf.org>, Colin Perkins <csp@csperkins.org>
Subject: Re: [avtext] Proposed text for Alia and other AD's DISCUSS
X-BeenThere: avtext@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Audio/Video Transport Extensions working group discussion list <avtext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avtext>, <mailto:avtext-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/avtext/>
List-Post: <mailto:avtext@ietf.org>
List-Help: <mailto:avtext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avtext>, <mailto:avtext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 Jun 2016 21:45:55 -0000

On 21 Jun 2016, at 16:36, Alia Atlas wrote:

> This is useful clarification, but it still contains no hint that the
> receiver has agreed.  It doesn't
> alter the SHOULD or MUSTs associated with hiding this from receivers.
>
> I am looking for a balanced explanation - the motivations here give me 
> more
> than heartburn.
> It's clearly deciding for the content provider.

I'm slightly confused. Why does the receiver have an interest in how the 
content provider composes content?

This is not (or at least should not be) a case where A produces content, 
B messes with it, and C wanted to receive the originally, un-messed-with 
content. It's a case where A provides content that happens to have 
real-time insertions at a splicer operating on A's behalf, and C 
receives it. One assumes C has the right to go somewhere else for their 
content, or maybe request a different, non-spliced stream if A is 
willing to provide it. But otherwise, why does C an interest in how A 
composes the stream?

I suppose there's a possibility for this to be truly abused--but the 
notification comes in the media stream between the content provider and 
the splicer, not from a third party. Obviously there are security 
considerations to make sure that's really true, but that is true for any 
media stream.

(It's entirely possible, nay even likely, that I am missing something. 
Maybe even a whole use case that looks more like a MiTM?)

Thanks!

Ben.

>
> Regards,
> Alia
>
> On Tue, Jun 21, 2016 at 3:32 PM, Ben Campbell <ben@nostrum.com> wrote:
>
>> Hi, some comments inline:
>>
>> On 21 Jun 2016, at 7:58, Huangyihong (Rachel) wrote:
>>
>> Hi All,
>>>
>>> Here's my proposal for addressing Alia's and other AD's similar 
>>> DISCUSS.
>>> The main idea is to add a new subsection in Section 2, which is 
>>> showed as
>>> following:
>>>
>>> "
>>> 2.1 Overview of RTP Splicing
>>>
>>>    RTP Splicing is to replace some multimedia content with certain
>>>    substitutive multimedia content, and then forward it to the 
>>> receivers
>>>    for a period of time. This process is authorized by the service
>>>    provider who sends the multimedia content to these receivers. A
>>>    typical usage is that IPTV service providers use their own 
>>> regional
>>>    advertising content to replace national advertising content 
>>> provided
>>>    by the content providers.
>>>
>>
>> I think this could be strengthened a bit. IIUC, this mechanism 
>> assumes the
>> splicing interval is sent _by_ the main content provider. That is, 
>> this
>> mechanism only works with the permission of the content provider. If 
>> they
>> don't consent, they simply won't send the splicing interval.
>>
>> This relationship might be more clear if the example talked about the 
>> main
>> content provider offering a time window for the regional advertising
>> insert, rather than about replacing national advertising. While that 
>> might
>> in fact replace national content, it should be clear that the main 
>> provider
>> _intends_ for the insert to happen.
>>
>>
>>>    The splicer is a middlebox handling RTP splicing. It receives 
>>> main
>>>    content and substitutive content simultaneously but only chooses 
>>> to
>>>    send one of them to the receiver at any point of time. When RTP
>>>    splicing begins, the splicer sends the substitutive content to 
>>> the
>>>    receivers instead of the main content. When RTP splicing ends, 
>>> the
>>>    splicer switches back to sending the main content to the 
>>> receivers.
>>>
>>>    The middle box working as the splicer is either a translator or a
>>>    mixer. [RFC6828] specifies a splicer implemented as a mixer that 
>>> uses
>>>    its own SSRC, sequence number space, and timing model when 
>>> generating
>>>    the output stream to receivers. The mixer must not insert the 
>>> SSRC of
>>>    the main RTP stream or the SSRC of the substitutive RTP stream 
>>> into
>>>    the contributing source (CSRC) list in the output media stream 
>>> when
>>>    implementing undetectable splicing.
>>>
>>
>> I suggest promoting that last sentence a bit, and removing any hint 
>> of
>> 2119 language. For example:
>>
>> "The splicer, operating on behalf of the content provider, may not 
>> wish to
>> reveal that splicing has occurred. In this case, the splicer does not
>> insert the SSRCs from either the main or substitutive RTP streams 
>> into the
>> CSRC list in the resulting output media stream.."
>>
>> Since it works as the mixer, it
>>>    splits the RTCP flow between the sender and receiver into two
>>>    separate RTCP loops. This implies additional considerations 
>>> should be
>>>    taken into account when handling congestion control, see Section 
>>> 4.4
>>>    of [RFC6828].
>>>
>>>    A translator [RFC3550] can also be a splicer by forwarding the 
>>> RTP
>>> packets with
>>>    their SSRCs intact, where the congestion control runs between
>>>    original sender and receiver, or between substitutive sender and
>>>    receiver. In such a case, the RTCP feedback message must be 
>>> passed to
>>>    the right sender to let the congestion control work. And 
>>> undetectable
>>>    splicing will not be fulfilled when the translator works as the
>>>    splicer.
>>> "
>>>
>>> Besides that, a new terminology is defined in section 1.1 to define
>>> "Undetectable Splicing", see below:
>>>
>>> "
>>> Undetectable Splicing:
>>>
>>> The RTP receivers are not able to detect any splicing points in the 
>>> RTP
>>> layer. Sometimes, service providers may require an undetectable 
>>> splicing to
>>> avoid the RTP receivers from filtering out the advertisement 
>>> content.
>>>
>>
>> That particular motivation gives me a bit of heartburn. But I think 
>> the
>> reality is that the content provider wants to provide an apparently
>> continuous stream, and they don't think the the splicing details are 
>> the
>> business of the recipient (any more than the splices that occur in 
>> the
>> original media stream incident to the normal editing of the content.)
>>
>>
>>
>>> "
>>>
>>> Your further thoughts or comments are welcomed. We'll bring a new 
>>> version
>>> as soon as consensus is achieved.
>>>
>>> BR,
>>> Rachel
>>>
>>>
>>> -----Original Message-----
>>>> From: kathleen.moriarty.ietf@gmail.com
>>>> [mailto:kathleen.moriarty.ietf@gmail.com]
>>>> Sent: Monday, June 20, 2016 9:14 PM
>>>> To: Mirja Kuehlewind (IETF)
>>>> Cc: Colin Perkins; avtext-chairs@ietf.org;
>>>> draft-ietf-avtext-splicing-notification@ietf.org; avtext@ietf.org; 
>>>> The
>>>> IESG;
>>>> jonathan@vidyo.com
>>>> Subject: Re: [avtext] Kathleen Moriarty's No Objection on
>>>> draft-ietf-avtext-splicing-notification-07: (with COMMENT)
>>>>
>>>>
>>>>
>>>> Sent from my iPhone
>>>>
>>>> On Jun 20, 2016, at 5:29 AM, Mirja Kuehlewind (IETF) <
>>>>> ietf@kuehlewind.net>
>>>>>
>>>> wrote:
>>>>
>>>>>
>>>>> Hi Colin,
>>>>>
>>>>> see below.
>>>>>
>>>>> Am 16.06.2016 um 00:34 schrieb Colin Perkins <csp@csperkins.org>:
>>>>>>>
>>>>>>> On 15 Jun 2016, at 19:37, Kathleen Moriarty
>>>>>>>
>>>>>> <kathleen.moriarty.ietf@gmail.com> wrote:
>>>>
>>>>>
>>>>>>> Kathleen Moriarty has entered the following ballot position for
>>>>>>> draft-ietf-avtext-splicing-notification-07: No Objection
>>>>>>>
>>>>>>> When responding, please keep the subject line intact and reply 
>>>>>>> to
>>>>>>> all email addresses included in the To and CC lines. (Feel free 
>>>>>>> to
>>>>>>> cut this introductory paragraph, however.)
>>>>>>>
>>>>>>>
>>>>>>> Please refer to
>>>>>>> https://www.ietf.org/iesg/statement/discuss-criteria.html
>>>>>>> for more information about IESG DISCUSS and COMMENT positions.
>>>>>>>
>>>>>>>
>>>>>>> The document, along with other ballot positions, can be found 
>>>>>>> here:
>>>>>>> https://datatracker.ietf.org/doc/draft-ietf-avtext-splicing-notifica
>>>>>>> tion/
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> --------------------------------------------------------------------
>>>>>>> --
>>>>>>> COMMENT:
>>>>>>> --------------------------------------------------------------------
>>>>>>> --
>>>>>>>
>>>>>>> I strongly support Mirja's and Alia's discuss points and would 
>>>>>>> like
>>>>>>> to see more of a discussion of the capability to hide splicing 
>>>>>>> in
>>>>>>> the security considerations text.  My ballot would be discuss, 
>>>>>>> but
>>>>>>> they pulled out the relevant sections and that would be 
>>>>>>> duplication.
>>>>>>> I'd like to review agreed upon text though to address these 
>>>>>>> concerns.
>>>>>>>
>>>>>>> I don't like the idea of enabling a MiTM, but do see the draft 
>>>>>>> talks
>>>>>>> about how to protect headers when this happens and 
>>>>>>> confidentiality
>>>>>>> is needed as well as session protection between the endpoints 
>>>>>>> and
>>>>>>> the splicer (which I don't like either, but you do call out the
>>>>>>> security considerations of this and that's what is needed).
>>>>>>>
>>>>>>
>>>>>> The mechanism described doesn’t work unless the receiver 
>>>>>> explicitly
>>>>>>
>>>>> chooses to receive media content delivered via the splicer. I 
>>>>> agree
>>>> that the
>>>> draft could be more clearly written, but it doesn’t seem to be 
>>>> “enabling
>>>> a
>>>> MiTM” attack, since the receiver opts in.
>>>>
>>>>>
>>>>> This definitely need from clarification in the draft!
>>>>>
>>>>
>>>> Yes, can we see some proposed text?
>>>>
>>>> Thank you,
>>>> Kathleen
>>>>
>>>>>
>>>>> Mirja
>>>>>
>>>>>
>>>>>
>>>>>> --
>>>>>> Colin Perkins
>>>>>> https://csperkins.org/
>>>>>>
>>>>>
>>>>>