Re: [Perc] Last Call: <draft-ietf-perc-private-media-framework-08.txt> (A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing) to Proposed Standard

Bernard Aboba <bernard.aboba@gmail.com> Fri, 15 February 2019 01:17 UTC

Return-Path: <bernard.aboba@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55CE9130E77; Thu, 14 Feb 2019 17:17:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QwHH8sLevqZZ; Thu, 14 Feb 2019 17:17:30 -0800 (PST)
Received: from mail-ua1-x931.google.com (mail-ua1-x931.google.com [IPv6:2607:f8b0:4864:20::931]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B1558130E6B; Thu, 14 Feb 2019 17:17:29 -0800 (PST)
Received: by mail-ua1-x931.google.com with SMTP id e16so2689794uam.12; Thu, 14 Feb 2019 17:17:29 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=5jx0Eplb2bp7XGR0+tgbW9JpHfpfyH2EB/K4NRe9txA=; b=iKc37Dml3it5f/G1OGeK5818fAal5OplOnvGIzMpZFmFO9Gpvddn6pRBHUl55dBdPv BbWAmSVh2EynHKJGwE6JMFJzeXSbaTvL/bKpI29OX/AO2DuTjO4TZVRp88d/1RrHNpak Anlxe9PS+r7KVgfGt3LZv0M8QgGsYAFeN/cCo1Hshu88S72txVqVHed06GlbEkbZNR+h a5enVZVHHS/dhO2pAighev+UNMrZmbWic34X7VGwX9unHZ71SaPypFlwAAiGvdibKG8C afFirh0r8IGxMElUC2Q0dSd4XFlXx2JnNNu5p1Gkfq6aLCQrRthM6YW3dFG47fiyg6Jv IE8w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=5jx0Eplb2bp7XGR0+tgbW9JpHfpfyH2EB/K4NRe9txA=; b=bOhtZJsI4qgTYkDS7Q5clLLvYbt5+E6hS8KOsGyyfEbbLM/L3UU8AW/4f0VaDX/tIa WglsDFEPzatnhH13fwnT0zSioi/S15+UX3G55cy4X+W2XSkEyQxIkQ/X+TMaMgqfAG/H WJeRmT4G45UqLEDG+vss/QPYv8janRodYNcU5faqtDwMmh/rJIEO4NR5+dT2i5n2Adzq yhfg0SeUlIdL78lUAOQDeJDn+LPyN7DKv3TNNfi46ZpMvGKa4+IvveMu+CLoIlKfQ5Q+ bIMjBL4Pl6BCtuJHrg3h4ayriRzPzE/vAZl5DL9ftnvp17YjOqclvGNOCSacsMd8aVt1 7DKg==
X-Gm-Message-State: AHQUAubO+1ZRWJ389WJv6PEN7oIFydrwATL9i7HthGmqd7ruIiHbuDse ObDZCfsFH2wfDmKLYrsq7LHYCBCdPmCBusl+ZnU=
X-Google-Smtp-Source: AHgI3IYPSui98amy+N9bl+8P5/MfXK/cPI7mqebU9qYVgphr3tAAqZ8SN2pCMlUPfUyfycBIU0jEyeopIGtHRdTGB1g=
X-Received: by 2002:ab0:498d:: with SMTP id e13mr3441968uad.134.1550193447956; Thu, 14 Feb 2019 17:17:27 -0800 (PST)
MIME-Version: 1.0
References: <154889546931.10496.2408974719921724953.idtracker@ietfa.amsl.com> <CAOW+2dtxnSYOPPWxodN633O=dPOQaUnu7eYvgUYkPYRt6iWbaw@mail.gmail.com> <CAPvvaaK_VUXvy2=1TBGfBWWYxiBdXBzuR=Y-rnAdJyg=M8OfQQ@mail.gmail.com> <5486C91C-48EA-4AA1-85EE-05A0B01C1E70@meetecho.com> <C6FEAEB9-CF8E-48AF-B03F-1406FF9CB303@cosmosoftware.io> <CAOW+2ducgj400pk3xPFAkRYxnYvqwhMsE9rOO0u9PgLpniaaRA@mail.gmail.com> <CAPvvaaLYFeNkZ4Pfdh4pa2btNW6EGZBnAOvXzVZ9egU8V-gBNQ@mail.gmail.com> <CAOW+2dvom822NgjF7OAa2A8YDeqZ+mbCqA=fUcq-Y49oFyGpsA@mail.gmail.com> <CAPvvaa+EzwgMXB_t7ZVTBgZH2y4=neUm1RymUNKnMV-6zyGPaQ@mail.gmail.com> <a74a8239-27dc-5704-096b-05cc5e02bd18@gmail.com> <543375ED-9A4F-452C-AE51-9499DAD5CEE0@gmail.com> <80a1f634-0888-c5e2-f6be-729d4cca3b28@cosmosoftware.io> <06d91175-b071-49fe-01cc-4a1323ad85f7@gmail.com> <91A16283-A392-4217-97E1-B04A5C8AD245@mozilla.com> <9c4149c0-184b-5ee9-e0a4-2b41420d3279@gmail.com> <37143A53-81C3-4391-998E-D7F2AD1F409C@nostrum.com> <417923aa-8771-863e-ee12-4107f674d918@gmail.com> <4CBF52C0-1D9F-4576-85B6-4F24F59CB3E6@nostrum.com> <88F12D70-CE7F-48FB-9F32-7827091E3768@iii.ca>
In-Reply-To: <88F12D70-CE7F-48FB-9F32-7827091E3768@iii.ca>
From: Bernard Aboba <bernard.aboba@gmail.com>
Date: Thu, 14 Feb 2019 17:17:17 -0800
Message-ID: <CAOW+2dsso0g4EMQQegdpaFnCL5YfuQLwOdKXW9U-KHdeGTpzxA@mail.gmail.com>
Subject: Re: [Perc] Last Call: <draft-ietf-perc-private-media-framework-08.txt> (A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing) to Proposed Standard
To: Cullen Jennings <fluffy@iii.ca>
Cc: Ben Campbell <ben@nostrum.com>, Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>, Nils Ohlmeier <nohlmeier@mozilla.com>, IETF Crazy <ietf@ietf.org>, Emad Omara <emadomara@google.com>, Emil Ivov <emcho@jitsi.org>, perc@ietf.org, Harald Alvestrand <hta@google.com>, Alexandre GOUAILLARD <alex.gouaillard@cosmosoftware.io>, Lorenzo Miniero <lorenzo@meetecho.com>
Content-Type: multipart/alternative; boundary="000000000000cc75c40581e48972"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/5MIcJXbwQm--DY-iq5wtLXahWmA>
X-Mailman-Approved-At: Sun, 17 Feb 2019 19:46:41 -0800
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2019 01:17:34 -0000

Cullen said:

"Any group at IETF or other organization can always do some other form of
perc-lite and nothing the PERC WG had done limits that in any way and
simular nothing done in PERC WG can for some other WG or organization to do
anything in particular. That was clear then and clear now."

[BA]  There are multiple levels of concern here.

At the WG level, we have concerns about specific design decisions made by
the PERC WG in addressing the secure transport of RTP payload information.
Issues in this category include the issues with "Triple encryption" and
SSRC immutability.  These problems are potentially solvable by
acknowledging the current lack of consensus and the documenting the
alternatives.  Switching out "Double" for "PERC lite" might address the
FEC/RTX properties, but it doesn't change the fundamental security
properties.  The SSRC-immutability issue is a bit more fundamental in that
it does affect the security properties as well as applicability, but a
"PERC-lite" document could document the approach taken there and its
applicability and security implications well enough to allow potential
implementers to understand the implications and decide for themselves.

But there are also a set of concerns that have impact beyond the PERC WG,
affecting the ART area and the IETF as a whole.

I'd put issues of key management and frame level versus payload level
security in this category, because they potentially affect the future
architecture of media sent over transports other than RTP:  HTTP/3, SCTP
data channel, QUIC, etc.   The traditional distinction between streaming
media and realtime communications is breaking down as streaming products
now seek to reduce latency, and realtime communications technology is
increasingly used for large scale streaming in scenarios such as games.

One might argue that when discussing media not transported over RTP, we
have wandered well outside the realm of PERC applicability.  However,
proponents of alternative key management and frame level security might
argue the opposite - that the PERC architecture exhibits layer violations
(of which the FEC/RTX issue is just one symptom) and that the problem
should have been solved in a transport independent manner so as to be more
applicable to the converged world we are heading into.










On Thu, Feb 14, 2019 at 3:05 PM Cullen Jennings <fluffy@iii.ca> wrote:

>
> Mostly I view this thread as the same set of people that failed to get
> consensus in the WG trying to reopen issues that was clearly not consensus
> for so I have mostly ignored this thread … but let me comment on the “JS
> access to media keys” issue.
>
> "JS access to media keys" is exactly the heart of the issue of the SDES
> keying of SRTP vs. DTLS keying of SRTP - the WebRTC group had a huge
> discussion on that topic.  This discussion finalized in a large meeting at
> IETF-87 that including many of the SIP, WebRTC, and Security folks at IETF.
> The consensus was extremely strong for not doing the SDES solution that put
> the keys in JS. ( See
> https://www.ietf.org/proceedings/87/minutes/minutes-87-rtcweb )
>
> In some cases Google and other are fans of of what I think of as End to
> Middle security. That is things need to be secure from User A to Google and
> from Google to user B but no need to be secure from A to B. In some cases
> that is fine but in other cases we want security from A to B. PERC is all
> about making things strong from A to B. Since IETF 87, I do not think the
> IETF consensus on things like SDES has gotten weaker - in fact we have
> moved to a stronger desire for the best security we can design and making
> end to end possible where we can.
>
> Bit more inline …
>
>
>
>
> On Feb 13, 2019, at 8:51 PM, Ben Campbell <ben@nostrum.com> wrote:
>
> (+Cullen)
> (as individual)
>
> Hi Sergio,
>
> I don’t recall, and I don’t see anything in the notes or email consensus
> call, that would suggest the consensus included anything along the lines
> “it’s okay to let the js application have the media keys.” That is, even if
> the idea was to let PERC do it’s thing and let other groups spin their own
> key management systems, I don’t think there’s a consensus that everyone
> would be okay with that particular approach.
>
> Cullen: As the other join presenter, do you have thoughts?
>
>
> Mostly the agreement was we would the way EKT and double was done breaking
> all the existing implementation if Sergio and Emil agreed they would
> support that approach.  Before the meeting, Emil decided he did not support
> it which made the many of us regret making the breaking changes. We were
> hoping to find a way to move forward without the constant problem of people
> saying the did not like the solution in the WG while not being able to
> present an alternative that addressed the security requirements and issues
> that had been raised (such as the splicing attack).
>
> Any group at IETF or other organization can always do some other form of
> perc-lite and nothing the PERC WG had done limits that in any way and
> simular nothing done in PERC WG can for some other WG or organization to do
> anything in particular. That was clear then and clear now.
>
>
>
> Thanks!
>
> Ben.
>
> On Feb 13, 2019, at 2:49 PM, Sergio Garcia Murillo <
> sergio.garcia.murillo@gmail.com> wrote:
>
> Hi Ben,
>
> The consensus we reached in Prague was that while many of us didn't like
> the proposed solution, we managed to put together a solution that was
> technically feasible, so we were not going to prevent the ones in favor of
> it for getting it done as it could be possible to advance with perc lite
> and alternative key management in different forums (namely w3c).
>
> When the use case was presented in the w3c webrtc for nv, the liaison
> statement was sent to prevent the discussion to even get started. So I
> personally consider the consensus is invalidated (and so seems others),
> others even question that the consensus was even reached on the first place.
>
> Best regards
> Sergio
>
>
>
> On 13/02/2019 21:21, Ben Campbell wrote:
>
> (as individual)
>
> Hi Sergio,
>
> Can you elaborate on that comment? The statement you reference was
> explicitly about preserving the PERC trust model. How does it overturn any
> consensus in PERC?
>
> Thanks!
>
> Ben.
>
> On Feb 13, 2019, at 4:53 AM, Sergio Garcia Murillo <
> sergio.garcia.murillo@gmail.com> wrote:
>
> You are missing an important piece on the timeline:
>
> Statement from the IETF ART and SEC Area Directors regarding the "Trusted
> application, untrusted intermediary" use case
> https://datatracker.ietf.org/liaison/1614/
>
> This liaison statement basically blows away any rough consensus from IETF
> 99 as the basis of my joint proposal was that it could be possible to
> proceed with the PERC lite proposal and that alternative keying mechanism
> could be studied without involving the PERC group.
>
> Best regards
> Sergio
>
> On 13/02/2019 2:34, Nils Ohlmeier wrote:
>
> Thank you for the input on the framework and the double documents from
> everyone.
>
> The points raised by the individuals here are not new and have been
> discussed before by the WG at several occasions. And for these issues there
> has be no WG consensus.
>
>
> Specifically on the points regarding double encryption:
> At IETF 95 double had consensus and got adopted (after 4 design team
> meetings and 3 IETF meetings).
>  https://www.ietf.org/proceedings/95/minutes/minutes-95-perc
>
> At IETF 96 the WG chairs re-opened the discussions around SSRC mutability
> and Emil got asked to submit a draft on the security impact of SSRC
> mutability
>  https://www.ietf.org/proceedings/96/minutes/minutes-96-perc
>
> At IETF 98 SSRC immutability and RTX considerations were discussed but no
> proposal made on security implications
>  https://www.ietf.org/proceedings/98/minutes/minutes-98-perc-00
>
> At IETF 99 the double authors and Sergio presented a joint proposal. The
> WG chairs called for consensus in the room and on the list and concluded
> that with rough consensus, the proposal got adopted.
>  https://datatracker.ietf.org/meeting/99/materials/minutes-99-perc-01
>  https://mailarchive.ietf.org/arch/msg/perc/3fPqYTE2qhT351nvp1b7wkf4-bc
>
> Best regards
>  Nils & Suhas
>  PERC WG chairs
>
> On 2Feb, 2019, at 13:37, Sergio Garcia Murillo <
> sergio.garcia.murillo@gmail.com> wrote:
>
> PERC may be a valid solution for some scenarios, maybe SIP.
>
> But in regards of WebRTC, my personal opinion is that it is not well
> suited and that we should do a fresh start, with an analysis of the
> requirements and specifics of webrtc, define trust models, role of the js
> apps, UI/UX, IdP and isolated media streams, key management within browser,
> compatibility with webrtc 1.0, if we need to support it in SDP or not,
> QUIC, WASM, etc.. and then check if PERC is able to fulfill them or what
> parts can be reused, if any.
>
> Best regards
>
> Sergio
>
>
> On 02/02/2019 21:42, Bernard Aboba wrote:
>
> Sergio -
>
> In your opinion, what portions of PERC are salvageable, if any? Is this a
> situation where we need to start over or could some aspect of PERC (e.g.
> Double if the triple encryption problem were fixed) be suitably modified
> and then implemented?
>
> On Feb 2, 2019, at 3:31 PM, Sergio Garcia Murillo <
> sergio.garcia.murillo@gmail.com> wrote:
>
> I think Emil and Bernard have described quite precisely where we are and
> how we managed to get here.
>
> In my opinion it would be a big mistake to consider PERC as *THE* solution
> for end to end encryption for multiconferencing, as if there was a one size
> fits all solution for the problem.
>
> Speaking from a WebRTC perspective, PERC, apart of have taken some
> controversial technical decisions (OHB as header, the ssrc rewriting issue
> and reverse the the order of FEC/RTX and SRTP), does not take into
> consideration the specifics of WebRTC (it could be argued that that was not
> in the scope of this group), like the role of the js app, the possibility
> of allowing key management in js, or the interaction with Idp and isolated
> media streams. Not to speak about the recent discussions about full frame
> vs per packet encryption or QUIC.
>
> Best regards
> Sergio
>
>
> On 02/02/2019 18:42, Emil Ivov wrote:
>
>
>
> On Sat 2 Feb 2019 at 16:50, Bernard Aboba <bernard.aboba@gmail.com> wrote:
>
>> Emil said:
>>
>> "The need to do a triple encryption for example is a particularly
>> egregious consequence of the order problem. That’s a problem specific to
>> the “double” documents."
>>
>> [BA] Can you describe how the need for "triple encryption" arises?  The
>> framework document doesn't even mention the issues with ordering of
>> FEC/RTX/RED and encryption, let alone the need for "triple encryption".
>>
>
> One of the goals that some members of the group seemed to have was to
> allow specific applications to become PERC-compliant without changing the
> app code itself and by simply replacing the libsrtp library with a
> PERC-enabled one.
>
> I don’t know that this goal is a direct consequence of the framework’s
> conceptual approach (contrary to the imposition of key distribution and
> negotiation). I think it simply carries a promise for some minimal
> pragmatic value to some implementers.
>
> The issue with this approach is that it leaves hop-by-hop protection
> mechanisms such FEC and RTC unavailable to the SFU as they are usually
> performed before SRTP, which would make them e2e encrypted.
>
> The solution to that is simple. One merely needs to perform e2e encryption
> first, then apply FEC and/or RTX and only then apply the second
> (hop-by-hop) layer of SRTP.
>
> This approach was referred to as “wedging RTX and FEC” as it places them
> in between the two encryption operations.
>
> While wedging appeared to have overall support in hallway discussions by
> all SFU implementors except potentially one, it was mysteriously rejected
> by a subset of the WG and replaced with the following:
>
> Applications will apply SRTP-double first and, those that need to use FEC
> and RTX would have to apply them only after.
>
> It was quickly pointed out that this not only destroys the stated
> “don’t-change-the-app” goal, but also leaves RTX and mostly FEC unprotected
> and FEC receivers vulnerable to DoS. To this the proponents of this
> approach simply replied with: “well, those of you who use FEC/RTX will
> simply do a third round of SRTP”, thus arriving at a total of three
> encryptions for every packet..
>
> The discussions around this topic were highly contentious.
>
> Hope this makes things clear,
> Emil
>
>
>
>> On Sat, Feb 2, 2019 at 11:46 AM Emil Ivov <emcho@jitsi.org> wrote:
>>
>>> Yes pretty much those.
>>>
>>> The need to do a triple encryption for example is a particularly
>>> egregious consequence of the order problem. That’s a problem specific to
>>> the “double” documents.
>>>
>>> I would however also say that the decision to bake one specific way of
>>> performing key negotiation into the framework rather than leaving it open
>>> was both unnecessary and quite problematic.
>>>
>>> Emil
>>>
>>> On Sat 2 Feb 2019 at 12:23, Bernard Aboba <bernard.aboba@gmail.com>
>>> wrote:
>>>
>>>> "on the consensus not reached on this and other topics."
>>>>
>>>> [BA] Out of curiosity, what other topics do you consider to be
>>>> problematic within the framework?  I am aware of at least two others where
>>>> implementers have chosen different paths than in the PERC framework:
>>>>
>>>> * Order of application of encryption versus FEC/RTX/RED
>>>> * Whole frame encryption versus payload encryption
>>>>
>>>> With respect to consensus, this is IETF last call, one of whose
>>>> purposes is to determine whether there is IETF consensus to publish this
>>>> document as a Proposed Standard.  Are you saying that you do not agree that
>>>> there is an IETF consensus to publish this document as a Proposed
>>>> Standard?  Or that there is no IETF consensus to publish *any* of the PERC
>>>> WG output as a Proposed Standard?
>>>>
>>>> On Sat, Feb 2, 2019 at 5:40 AM Alexandre GOUAILLARD <
>>>> alex.gouaillard@cosmosoftware.io <alex..gouaillard@cosmosoftware.io>>
>>>> wrote:
>>>>
>>>>> +1 on ssrc rewriting, and on the consensus not reached on this and
>>>>> other topics.
>>>>>
>>>>> Sent from my iPhone
>>>>>
>>>>> On 2 Feb 2019, at 17:18, Lorenzo Miniero <lorenzo@meetecho.com> wrote:
>>>>>
>>>>> +1, SSRC rewriting is pretty much fundamental to all SFUs out there.
>>>>>
>>>>> Lorenzo
>>>>>
>>>>> Il 2 febbraio 2019 10:19:06 CET, Emil Ivov <emcho@jitsi.org> ha
>>>>> scritto:
>>>>>>
>>>>>> I want to second that as it is a particularly major problem: not
>>>>>> allowing SSRC rewriting makes the entire framework unusable with SFU
>>>>>> implementation I represent as well as every other SFU I am familiar with.
>>>>>>
>>>>>> I am also not sure that I agree with “SSRC rewriting could not be
>>>>>> allowed” is a conclusion that ever had any consensus in PERC, regardless of
>>>>>> what WG leadership is trying to make everyone believe.
>>>>>>
>>>>>> On Sat 2 Feb 2019 at 06:21, Bernard Aboba <bernard.aboba@gmail.com>
>>>>>> wrote:
>>>>>>
>>>>>>> Richard said:
>>>>>>>
>>>>>>> "Again, the answer is clear here, but the document should be
>>>>>>> clearer.  The working group discussed SSRC rewriting several times, and
>>>>>>> concluded that SSRC rewriting could not be allowed in this system.  This
>>>>>>> decision is reflected, e.g., in the fact that the Double transform does not
>>>>>>> allow modification of SSRCs."
>>>>>>>
>>>>>>> [BA]  Not being able to rewrite SSRCs has some major implications
>>>>>>> with respect to requirements on PERC endpoints.  Typically today's MDD will
>>>>>>> switch between the simulcast streams provided by an endpoint, forwarding
>>>>>>> only a single stream to other participants, based on the bandwidth,
>>>>>>> resolution and framerates.  If rewriting of SSRCs is not possible, do PERC
>>>>>>> endpoints need to be able to receive simulcast? If PERC endpoints do need
>>>>>>> to be able to receive simulcast, what are the requirements for endpoints?
>>>>>>> For example, should endpoints expect the MDD to use RID header extensions
>>>>>>> to identify the incoming simulcast streams?
>>>>>>>
>>>>>>> Receiving of simulcast is tricky because the endpoint is receiving
>>>>>>> multiple streams with different sequence number spaces which may contain
>>>>>>> holes because of reordering or loss. This not only complicates the
>>>>>>> application of RTX, RED and FEC, but also the operation of the endpoint.
>>>>>>> As a result, as noted in the WEBRTC specification Section 5.4.1, support
>>>>>>> for reception of simulcast is optional. I am aware of two ORTC
>>>>>>> implementations that have attempted to support simulcast reception, neither
>>>>>>> of which is robust in scenarios with considerable loss and/or reordering.
>>>>>>> And neither implementation supports the RID header extension on received
>>>>>>> simulcast streams.
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> On Fri, Feb 1, 2019 at 12:23 PM Sergio Garcia Murillo <
>>>>>>> sergio.garcia.murillo@gmail.com> wrote:
>>>>>>>
>>>>>>>> On 01/02/2019 17:18, Richard Barnes wrote:
>>>>>>>>
>>>>>>>> So I would propose we add something like the following to this
>>>>>>>> definition:
>>>>>>>>
>>>>>>>> "In the context of WebRTC, where control of a session is divided
>>>>>>>> between a JavaScript application and a browser, the browser acts as the
>>>>>>>> Trusted Endpoint for purposes of this framework (just as it acts as the
>>>>>>>> endpoint for DTLS-SRTP in one-to-one calls).
>>>>>>>>
>>>>>>>>
>>>>>>>> If we decide to adopt perc (big if) in webrtc, shouldn't this be
>>>>>>>> defined within the
>>>>>>>> https://tools.ietf.org/html/draft-ietf-rtcweb-security-arch-17 doc
>>>>>>>> ?
>>>>>>>>
>>>>>>>>
>>>>>>>>    Optimally, we would not rely on trust in any entities other than the
>>>>>>>>    browser.  However, this is unfortunately not possible if we wish to
>>>>>>>>    have a functional system.  Other network elements fall into two
>>>>>>>>    categories: those which can be authenticated by the browser and thus
>>>>>>>>    can be granted permissions to access sensitive resources, and those
>>>>>>>>    which cannot be authenticated and thus are untrusted.
>>>>>>>>
>>>>>>>>
>>>>>>>> WebRTC already IdP as trusted for identity purposes, so it should
>>>>>>>> be up to the RTCWEB group to decide what is a trusted endpoint and what is
>>>>>>>> not in webrtc. As Bernard is stating, we could decide that there are other
>>>>>>>> key management solutions trusted (even in JS or WASM), as for for example
>>>>>>>> is being done in EME:
>>>>>>>>
>>>>>>>>
>>>>>>>> https://github.com/WICG/media-capabilities/blob/master/explainer.md#encryption
>>>>>>>>
>>>>>>>> Best regards
>>>>>>>>
>>>>>>>> Sergio
>>>>>>>> _______________________________________________
>>>>>>>> Perc mailing list
>>>>>>>> Perc@ietf.org
>>>>>>>> https://www.ietf.org/mailman/listinfo/perc
>>>>>>>>
>>>>>>> --
>>>>>> sent from my mobile
>>>>>>
>>>>>
>>>>> --
>>>>> Inviato dal mio dispositivo Android con K-9 Mail. Perdonate la brevità.
>>>>>
>>>>> --
>>> sent from my mobile
>>>
>> --
> sent from my mobile
>
> _______________________________________________
> Perc mailing listPerc@ietf.orghttps://www.ietf.org/mailman/listinfo/perc
>
>
> _______________________________________________
> Perc mailing list
> Perc@ietf.org
> https://www.ietf.org/mailman/listinfo/perc
>
>
>
> _______________________________________________
> Perc mailing list
> Perc@ietf.org
> https://www.ietf.org/mailman/listinfo/perc
>
>
>
>
>
>