Re: [hackathon] Open Source Software and network protocol standards

Maxim Sharabayko <maxsharabayko@haivision.com> Sun, 20 March 2022 13:25 UTC

Return-Path: <maxsharabayko@haivision.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7EBF63A0A04 for <hackathon@ietfa.amsl.com>; Sun, 20 Mar 2022 06:25:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=haivision.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dZPhrFi8UFzE for <hackathon@ietfa.amsl.com>; Sun, 20 Mar 2022 06:25:45 -0700 (PDT)
Received: from CAN01-TO1-obe.outbound.protection.outlook.com (mail-to1can01on0608.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe5d::608]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DF5F13A09FA for <hackathon@ietf.org>; Sun, 20 Mar 2022 06:25:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=haivision.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ehcldGDbLvlrGiVTxZiLLGW0kAJHL7v79ZlsvaRHZxE=; b=F+xyhXzWZTYOTpySt647ZX9II/WKIUkH8CyYbGH6rNaVqcQQp19cGwLdfpOn5SjhUI5ko4tA2Uh2ApDFgAba96X76VWX1rwlTC6XP6gcGHHI7YtZgRPwcs+ZIfbDJ7QX61z3LCbURiLhzvhJljRrEZFXFU8Q/7QLnCkilbNsE6s=
Received: from YT3PR01CA0149.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:b01:83::35) by YT2PR01MB4080.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:b01:37::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Sun, 20 Mar 2022 13:25:38 +0000
Received: from TO1CAN01FT008.eop-CAN01.prod.protection.outlook.com (2603:10b6:b01:83:cafe::d2) by YT3PR01CA0149.outlook.office365.com (2603:10b6:b01:83::35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14 via Frontend Transport; Sun, 20 Mar 2022 13:25:38 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 51.81.185.125) smtp.mailfrom=haivision.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=haivision.com;
Received-SPF: Pass (protection.outlook.com: domain of haivision.com designates 51.81.185.125 as permitted sender) receiver=protection.outlook.com; client-ip=51.81.185.125; helo=hil1-relay.sendergen.com;
Received: from hil1-relay.sendergen.com (51.81.185.125) by TO1CAN01FT008.mail.protection.outlook.com (10.152.122.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14 via Frontend Transport; Sun, 20 Mar 2022 13:25:37 +0000
Received: from localhost (localhost [127.0.0.1]) by hil1-relay.sendergen.com (Postfix) with ESMTP id 31A9840226426 for <hackathon@ietf.org>; Sun, 20 Mar 2022 09:25:37 -0400 (EDT)
Received: from CAN01-QB1-obe.outbound.protection.outlook.com (mail-qb1can01lp2058.outbound.protection.outlook.com [104.47.60.58]) by hil1-relay.sendergen.com (envelope-sender <maxsharabayko@haivision.com>) (MIMEDefang) with ESMTP id B204240225EF5; Sun, 20 Mar 2022 09:25:37 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dSXSNaeqcrYzQf1vtlAcm5y6YGNJpa20zFMKVJ1NrKVWYUV/oHP0c7/RUJzqXOm4FTiW1zI3vau60plU1cArn11yW0pgHJfr5dgzIHbuW9UGhPV/JxOj64lllF4nKeZZh/zR9EO36teZrZ0FHlw2lfvTu53pR/x6Vcf1Gjd3r581GtKtyTAw/wE+dWsRaCoV5ez9YjBXaeDHytUhchKdn/HsGVLBqfW3pw/KPQDZhvsXbYXah1HRMMqD+9tM6DFC+3GsZ7YSWwydmSUd5ZQyC78+0nI4c3kkXnAw/BRqnhWZQS4nEM4CAMAKRMEs59P9UWEOg+ntjIf7pHmpNN54aQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=nZIx0bRyowrax/Ckj+/6ih13i8Abobr+L2Cn1sgKE40=; b=JjoM2NI2tLB0HBD5ss9NMOGk2XREsb+bMQDFK96EliOz+rQfMiSBX700Qjsz20OA6zwi5KeXxjCGdWl6tZd0qWeLjM8YoF9ZCBNheSv7BylO2RKbRT9FlUqF3J0db3U6LxQMWwSy/VCDeSAiiT5pMatmJFhmFxF6RSRY97uOk7wP/O0PJH0GdAxpP4SwHY9/NtrwxmrvFy0JQFvwccP7RJhYDMAKThMURKYfzcDfebeXgFoqmahKRRdolauseoakizgjVtCJI5Q3cz6rsQSr4U4WfYymlCMmvjD0rQvnTIMND425ORjLFou7N1r3oLa7qv6UPmhBT2YX5XK1eEE42w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=haivision.com; dmarc=pass action=none header.from=haivision.com; dkim=pass header.d=haivision.com; arc=none
Received: from YT2PR01MB5933.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:b01:59::12) by YT2PR01MB9366.CANPRD01.PROD.OUTLOOK.COM (2603:10b6:b01:a5::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.17; Sun, 20 Mar 2022 13:25:33 +0000
Received: from YT2PR01MB5933.CANPRD01.PROD.OUTLOOK.COM ([fe80::cd00:95a3:4405:52fd]) by YT2PR01MB5933.CANPRD01.PROD.OUTLOOK.COM ([fe80::cd00:95a3:4405:52fd%9]) with mapi id 15.20.5081.022; Sun, 20 Mar 2022 13:25:33 +0000
From: Maxim Sharabayko <maxsharabayko@haivision.com>
To: Stuart Cheshire <cheshire=40apple.com@dmarc.ietf.org>, "hackathon@ietf.org" <hackathon@ietf.org>
Thread-Topic: [hackathon] Open Source Software and network protocol standards
Thread-Index: AQHYPF35PR77Mb64gUmw9Z8V0raa6w==
X-SG-Signature: true
Date: Sun, 20 Mar 2022 13:25:33 +0000
Message-ID: <YT2PR01MB593327BB9DC7C59F9C7859EDB2159@YT2PR01MB5933.CANPRD01.PROD.OUTLOOK.COM>
References: <BA619D4C-1167-4107-98FB-C01DBAFFC0E3@apple.com>
In-Reply-To: <BA619D4C-1167-4107-98FB-C01DBAFFC0E3@apple.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=haivision.com;
X-MS-Office365-Filtering-Correlation-Id: 8cac0584-6a3c-4e16-0ce7-08da0a751f6f
x-ms-traffictypediagnostic: YT2PR01MB9366:EE_|TO1CAN01FT008:EE_|YT2PR01MB4080:EE_
X-Microsoft-Antispam-PRVS: <YT2PR01MB408024BCA016B0107EB7DB8EB2159@YT2PR01MB4080.CANPRD01.PROD.OUTLOOK.COM>
x-sg-stamp: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:YT2PR01MB5933.CANPRD01.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(71200400001)(38070700005)(508600001)(38100700002)(122000001)(966005)(55016003)(8676002)(64756008)(66446008)(66476007)(66556008)(91956017)(76116006)(66946007)(186003)(26005)(6506007)(7696005)(83380400001)(110136005)(9686003)(53546011)(2906002)(5660300002)(52536014)(33656002)(8936002)(86362001)(166002)(76236003)(316002); DIR:OUT; SFP:1101;
Content-Type: multipart/alternative; boundary="_000_YT2PR01MB593327BB9DC7C59F9C7859EDB2159YT2PR01MB5933CANP_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: YT2PR01MB9366
X-Scanned-By: 'EmailPostmaster' on 51.81.185.125
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: TO1CAN01FT008.eop-CAN01.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: 3595a301-124a-4ec5-aca4-08da0a751c8c
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:51.81.185.125; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:hil1-relay.sendergen.com; PTR:hil1-relay.sendergen.com; CAT:NONE; SFS:(13230001)(4636009)(46966006)(36840700001)(110136005)(508600001)(76236003)(336012)(316002)(26005)(186003)(82310400004)(166002)(86362001)(966005)(33656002)(5660300002)(2906002)(53546011)(55016003)(70206006)(70586007)(8936002)(36860700001)(9686003)(6506007)(47076005)(7696005)(33964004)(8676002)(356005)(52536014)(7636003)(83380400001)(7596003); DIR:OUT; SFP:1101;
X-OriginatorOrg: haivision.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Mar 2022 13:25:37.9294 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 8cac0584-6a3c-4e16-0ce7-08da0a751f6f
X-MS-Exchange-CrossTenant-Id: a88156c4-f3f7-4104-8fad-43b93f27493d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=a88156c4-f3f7-4104-8fad-43b93f27493d; Ip=[51.81.185.125]; Helo=[hil1-relay.sendergen.com]
X-MS-Exchange-CrossTenant-AuthSource: TO1CAN01FT008.eop-CAN01.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: YT2PR01MB4080
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/LRnZ-23-GlYoFQyIiaTb04vyQtg>
Subject: Re: [hackathon] Open Source Software and network protocol standards
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 20 Mar 2022 13:25:51 -0000

Hi Stuart,

The Secure Reliable Transport (SRT) protocol might be an interesting example.
https://github.com/Haivision/srt
It has become an extremely popular network protocol for a sub-second latency live video contribution and distribution.

It is an implementation-driven protocol built on top of UDP. First created in 2013 based on the UDT<https://datatracker.ietf.org/doc/html/draft-gg-udt-03>. Made free and open source in 2017.
The protocol has gained a notable success because anyone could take the library, easily integrate it in his/her project and have things ready for live streaming in quite a short time. Later the protocol was also included into open-source projects like FFmpeg, VLC, GStreamer, Wireshark, etc. That had further simplified the effort needed to get things up and running.

The  SRT RFC draft<https://datatracker.ietf.org/doc/html/draft-sharabayko-srt-01> followed in 2021 to provide a normative description of how the protocol works, and to serve a reference point for further improvements and extensions.


--
Kind regards,
Maxim Sharabayko

From: hackathon <hackathon-bounces@ietf.org> on behalf of Stuart Cheshire <cheshire=40apple.com@dmarc.ietf.org>
Date: Saturday, 19. March 2022 at 00:47
To: hackathon@ietf.org <hackathon@ietf.org>
Subject: [EXTERNAL] [hackathon] Open Source Software and network protocol standards
Dear Hackathon crew!

I have a question about the relationship between Open Source Software and network protocol standards.

My intuition is that in recent years Open Source Software has had a significant impact on network protocol standards, both in the availability of easily accessible open implementations contributing to the success of network protocol standards, and, in contrast, the lack of easily accessible open implementations contributing to less success for those network protocol standards.

I suspect that many in the IETF Hackathon community share this intuition, but it would be interesting to back up that intuition with concrete data.

I’d like to build a list of compelling examples.

Can you think of cases where an Open Source Software implementation clearly helped a networking protocol become successful? Was that Open Source implementation driven by the people (or companies) actively working on the protocol standard? Or was it created by an independent community following the standards development process?

Are there cases of a networking protocol that did not become successful where, in retrospect, it seems clear that the availability of an easily accessible Open Source implementation would have helped?

And, of course, counterexamples are also interesting: recent protocols that failed despite having a robust Open Source implementation, or recent protocols that succeeded despite having no Open Source implementation.

I am not the first person to think about the growing influence of Open Source on protocol development. Indeed, the existence of the IETF Hackathon itself is, in part, an acknowledgment of this new direction in protocol development. And others have written about it in the past:

2015: <https://www.ietfjournal.org/open-standards-open-source-open-loop/>
2016: <https://datatracker.ietf.org/doc/html/draft-arkko-ietf-trends-and-observations-00>
2018: <https://www.ietfjournal.org/three-years-on-open-standards-open-source-open-loop/>

Looking back now, in 2022, how have those earlier predictions played out? Do we have clear winners we can point to? Clear losers? This will help inform companies how they might want to engage with Open Source. Should companies embrace Open Source for protocol development? Or should companies go back to the old way, with open specifications and private implementations?

Please reply on the list or to me privately, and I will compile a list of responses.

Stuart Cheshire

_______________________________________________
hackathon mailing list
hackathon@ietf.org
https://www.ietf.org/mailman/listinfo/hackathon
Unsubscribe: mailto:hackathon-request@ietf.org?subject=unsubscribe



***[EXTERNAL] This message comes from an external organization. Exercise caution when opening attachments or clicking links, especially from unknown senders.***