Re: [dispatch] Magnus Westerlund's Block on charter-ietf-sframe-00-00: (with BLOCK and COMMENT)

Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com> Tue, 08 September 2020 20:03 UTC

Return-Path: <sergio.garcia.murillo@gmail.com>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 399613A10C0 for <dispatch@ietfa.amsl.com>; Tue, 8 Sep 2020 13:03:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.045
X-Spam-Level:
X-Spam-Status: No, score=-3.045 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.948, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4qelWpEaFNp2 for <dispatch@ietfa.amsl.com>; Tue, 8 Sep 2020 13:03:46 -0700 (PDT)
Received: from mail-wm1-x32f.google.com (mail-wm1-x32f.google.com [IPv6:2a00:1450:4864:20::32f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 251B93A1030 for <dispatch@ietf.org>; Tue, 8 Sep 2020 13:03:46 -0700 (PDT)
Received: by mail-wm1-x32f.google.com with SMTP id z9so202416wmk.1 for <dispatch@ietf.org>; Tue, 08 Sep 2020 13:03:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language; bh=ShlOZIustcwG4bjzBLCtQrqbfglob+NUyju2TSY3b5s=; b=CFXdAZvoO7A7RWXDo2XCgtdnYazjJJOwKL7a+WUC0KdexXE9gZWKNB/z9uDwAMV3eK tuxbuUBAD5x8uXmHfcLH4MbxgwQqiD/KaZ6fHMBewWJ9yJtYCYi+3h6PY3u+4IbzkSx0 cmfyOQXdOlXXQhxLfAOLkJrAn9O3CHVDKjgDD9j9ndNS0mXWc678rox7g2PXwRd19faB /VCfRoBMbJ8BXarm5GDIQeAtRrwociow64MZe0WDM8KnHRdWKTXo43NfaGD/o0WNeCnh Z+A2cVnWec2NpQ+J6oFaqxohMKbbyNBgJxlsmiZpeG1RSe4HrRMVZlYa3mlifdMs2DPJ lIcg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language; bh=ShlOZIustcwG4bjzBLCtQrqbfglob+NUyju2TSY3b5s=; b=W0FI8/AKwxIZXI4Kd85h4/BPcIfJugHA+n5prOXI2ZXVv62wTggpacbT/V/caEBEd6 lTM2lIGJyCzsC3cGgvy6g+SYAjiguuNItjNGTA2oHzf9OUmjkf+tybLpSMzAyhj1O32g EE7bbzg/I4A9R7rQSMs72Qxf1wtxLOxSnUA+mtqtPbOhMmPZibIr2ZgftTCvDIsacHnb KuTFk2xGzdkySeZrda6kdgAzKKEDnN77OCkzznZRYkgX4yphAGLUIZeJs+GVftZqkKhw p2g+AwLlvCn0bZHLE6chF54FsMdxpcHqM7RxZFGV9s4Wz57GGmFqND1wLahViRlVxFZR fMXA==
X-Gm-Message-State: AOAM531yNa/Gb0Nd4aKUXcLJ+E4maHosRTEROLPrlnOH8IfDCTe5UTTk Qb/hsmFW5+fAaK07rPuhjePBc1B6hOFHAQ==
X-Google-Smtp-Source: ABdhPJw1MF5KkssL7Lv+BuYvJo3L8OhnKLrXlSrgVQqfCUoIQeXmvZVxNwA/67ovu4S3kLzWDS40vw==
X-Received: by 2002:a1c:f018:: with SMTP id a24mr87866wmb.7.1599595424281; Tue, 08 Sep 2020 13:03:44 -0700 (PDT)
Received: from [192.168.0.11] (79.108.125.160.dyn.user.ono.com. [79.108.125.160]) by smtp.googlemail.com with ESMTPSA id w7sm661460wrm.92.2020.09.08.13.03.43 for <dispatch@ietf.org> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 08 Sep 2020 13:03:43 -0700 (PDT)
To: dispatch@ietf.org
References: <CAOW+2du0dzb4g7WkSR_6tXW8qJ8_RGWda6FnDGJNM5kJMoHJMw@mail.gmail.com>
From: Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>
Message-ID: <cdd48760-c48c-3249-0d48-c3ea81772829@gmail.com>
Date: Tue, 08 Sep 2020 22:03:44 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0
MIME-Version: 1.0
In-Reply-To: <CAOW+2du0dzb4g7WkSR_6tXW8qJ8_RGWda6FnDGJNM5kJMoHJMw@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------21D72111064283A05FB03C7C"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/dispatch/sttCMk6orAob_hzHt5xQSUJXpuI>
Subject: Re: [dispatch] Magnus Westerlund's Block on charter-ietf-sframe-00-00: (with BLOCK and COMMENT)
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 08 Sep 2020 20:03:48 -0000

On 08/09/2020 14:30, Bernard Aboba wrote:
> Sergio said:
>
> "SFRAME content should be treated just as an opaque payload and when used
> within RTP, there should no additional identification inside the SFRAME
> payload itself (except the ones strictly needed for encrypting/decrypting)."
> [BA] But the SFRAME content (RTCEncodedVideoFrame.data) isn't treated as opaque today, correct?
> I am thinking of the first three octets of data, which cannot be encrypted. Isn't that expected to contain the VP8 Payload Header?

We need to skip the first bytes of the VP8 frame because we a limitation 
on the chrome implementation of the insertable streams and due to the 
fact that we are using the vp8 packetizer and not a codec-agnostic 
packetization but the vp8 rtp one. Ideally, when using a codec agnostic 
packetizer, the whole frame payload should be feed into sframe and the 
result be treated as a black box.


> "What I think it is missing in the charter is define what will happen if
> we find that there is any piece missing in RTP to be able to use SFRAME
> with it. Should we produce them within this group or just write the
> requirements and liaise with the appropriate ietf group so they are
> completed there?"
> [BA] I think we have a decent idea of what kind of RTP info we are talking about.  Basically, this is the information used by the SFU in order to decide whether to forward or drop the packet.  The info is inserted before data within each RTP packet (e.g. VP8 payload descriptor and/or frame forwarding RTP header extension), correct?
> If so, this can be handled by a reference within the SFrame specifications.

My doubt is if we find that there is no suitable reference available, 
what should we do?


> "In no way SFRAME should be required to have knowledge about SSRCS."
> [BA] I think you mean that we don't want SSRCs to be used to identify the keys. As we saw in PERC this creates backwards compatibility issues in SFUs with respect to SSRC modification. But some "knowledge" of SSRCs is required in the system.
> An RTP packetizer needs to fill in the SSRC field in the RTP header, and this info will also be available to the depacketizer. Also, the RTCEncodedVideoFrameMetadata includes both SSRCs and CSRCs (see:https://w3c.github.io/webrtc-insertable-streams/)

Yes, my point is that the SSRCS/rids should not be used as metadata for 
SFRAME encryption/decryption as we have seen it causes issues with SFU 
functionality. Obviously the rtp layer would still need to handle it and 
we may need how to map simulcast/svc behavior with SFRAME operations (as 
it is already captioned on current draft).


> "There are several ways of performing that without imposing any
> limitations on the SFU. Some of which would require extra specification
> work, but I would not like to jump directly into the technical proposals
> while still discussing about the charter."
>
> [BA] I agree that this doesn't seem like a Charter issue. It is more about what information the SFU has available to it (e.g. RTP header, RTP header extensions and possibly a portion of the payload). Based on this information, the SFU needs to be able to decide whether to drop or forward an RTP packet or whether to attempt repair. However, from the SFU's point of view, the repair process operates normally, correct?


I agree.


Best regards

Sergio