Re: [Perc] Last Call: <draft-ietf-perc-private-media-framework-08.txt> (A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing) to Proposed Standard

Bernard Aboba <bernard.aboba@gmail.com> Sat, 02 February 2019 16:19 UTC

Return-Path: <bernard.aboba@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0BA26124BE5; Sat, 2 Feb 2019 08:19:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p8pvnCkDtRC2; Sat, 2 Feb 2019 08:19:12 -0800 (PST)
Received: from mail-vk1-xa41.google.com (mail-vk1-xa41.google.com [IPv6:2607:f8b0:4864:20::a41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6EE3A124B0C; Sat, 2 Feb 2019 08:19:12 -0800 (PST)
Received: by mail-vk1-xa41.google.com with SMTP id b18so2300593vke.2; Sat, 02 Feb 2019 08:19:12 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ryrQeSUSyuZCS5e2Ug7U0Ln5bTAQvh5hScfDnjwep2I=; b=WndJiGljLbmsIUO6arlBGFQN1acq0S06GCbHzHO1ZJeB/pGDCVfPmzLLAHu/xeOmFa UFM3JoL2U97o+gNFT+PzzSVrW8Ny7KOaxw6C+cOUvB7+dH1XkwbiSj3wXo7Q2nCe4lwz GpWqldS43c8yV/MlDI/C9RuzQFLLL9DyG3x1PefG9Mo17xpKIgrLs8aGPQr7o1xKfhcL YwL6B+eR3Pt0ABSMVVn5j3QrPtlq71S5GNH6jAXMUbyYL7GJOwui6XDlp87URcBgnJee 6MeIdkn5RgZh4TodrqZUAAwJphhpj8FjFjMU4UrXghoidyIWnsKsN4vchj9ToXY8sZ+1 UN/w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ryrQeSUSyuZCS5e2Ug7U0Ln5bTAQvh5hScfDnjwep2I=; b=JCU/I0hjTnVJZ461D6UqXlbDrHHh3a5NteECNNCE9vBlWJAn+TeWnY7peW6gwW19ke xczVtl+4w9xTq5Vjw+ZXutRZdF39c7sbHnxWXoY8vGX5wKQU1KrhLZfQadLT1CTBW2wv KQv6TeI4yK/xgK3PLsEkQeyYmkvC98W5BO/9a5pTuHhTDaFdjfOObOL6kZc86XinHgDO r4tHT0MkBwUonEaBTJpuYZxTfXaPw+Ujlz3xahYqxjKnTUmyyaIXZrKkFDeZjq61uVpm M4OuOG3cmyKf1Su/ZWcZbSyjzzbV/xoT9KRFvVHliUH/6nMO6R8Q859QvjtszE6URg+X gS6g==
X-Gm-Message-State: AHQUAuY8aTnCAxgcJpGdq0QDzAHypVZGJ1sXMYIE+/hEigjak64nPBec eoh0rz29AjfId75joMsy056b+yCRhC5Uh8giy0o=
X-Google-Smtp-Source: AHgI3Ib8t9nKM7sxrk5B8l+4pxyLnbDRnFQeWJDv2lTMIoGqSj6ALe4gAObxV02Mzi+0Xfe+f9unjqy/lfz0zmZum+Q=
X-Received: by 2002:a1f:6b14:: with SMTP id g20mr4465871vkc.47.1549124346665; Sat, 02 Feb 2019 08:19:06 -0800 (PST)
MIME-Version: 1.0
References: <154889546931.10496.2408974719921724953.idtracker@ietfa.amsl.com> <CAOW+2dui_imxyysOCrtdH7OiDcbooi83qtCDifEY3HQ6MpigWA@mail.gmail.com> <CAL02cgSip2cLr8a1+zfK2cg+n8gqUMc9CKPmb7mWd2iLSiRf-g@mail.gmail.com> <8e40d0db-cacb-db93-f2fe-db5b4a7cf7cf@gmail.com> <CAOW+2dtxnSYOPPWxodN633O=dPOQaUnu7eYvgUYkPYRt6iWbaw@mail.gmail.com> <CAPvvaaK_VUXvy2=1TBGfBWWYxiBdXBzuR=Y-rnAdJyg=M8OfQQ@mail.gmail.com> <5486C91C-48EA-4AA1-85EE-05A0B01C1E70@meetecho.com> <C6FEAEB9-CF8E-48AF-B03F-1406FF9CB303@cosmosoftware.io> <CAOW+2ducgj400pk3xPFAkRYxnYvqwhMsE9rOO0u9PgLpniaaRA@mail.gmail.com> <a7611fc8-017a-d6af-8add-547771d99291@gmail.com>
In-Reply-To: <a7611fc8-017a-d6af-8add-547771d99291@gmail.com>
From: Bernard Aboba <bernard.aboba@gmail.com>
Date: Sat, 02 Feb 2019 11:18:55 -0500
Message-ID: <CAOW+2duznECqjgFaHyYimME6g1_YbsmnOQtL=DP7iPq=pwupwg@mail.gmail.com>
Subject: Re: [Perc] Last Call: <draft-ietf-perc-private-media-framework-08.txt> (A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing) to Proposed Standard
To: Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>
Cc: Alexandre GOUAILLARD <alex.gouaillard@cosmosoftware.io>, IETF discussion list <ietf@ietf.org>, Emad Omara <emadomara@google.com>, Emil Ivov <emcho@jitsi.org>, perc@ietf.org, "hta@google.com" <hta@google.com>, Sergio Garcia Murillo <sergio.garcia.murillo@cosmosoftware.io>, Lorenzo Miniero <lorenzo@meetecho.com>
Content-Type: multipart/alternative; boundary="0000000000006562ed0580eb9e4d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/ETyCGH9LcYvAM27wVs3Qk7NjbQA>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 02 Feb 2019 16:19:15 -0000

Sergio said:

"However the end to end encryption with trusted application use case had
to be removed from the w3c nv scope because it was against what has been
defined within this group. Given that, I would say that the previous
consensus has been broken."

[BA] Here is the consensus determination posted on the W3C WEBRTC WG
mailing list relating to that discussion:
https://lists.w3.org/Archives/Public/public-webrtc/2018Dec/0041.html

As noted in this email, there was considerable confusion relating to the
posted use case, with individuals interpreting the use case (and the
associated requirements) very differently.

To be able to develop one or more alternative use cases, I was hoping to be
able to rely upon the PERC framework document to tease apart the issues.
Unfortunately the current framework document barely even mentions the
points that have proven most contentious.

At this point, it is very difficult for me to even pinpoint whether the
discussion represents a lack of consensus about the whole PERC architecture
(e.g. throw it all away and start over based on frame encryption), or some
portions of the architecture are considered salvageable (e.g. continue with
packet payload encryption but use "PERC-lite" instead of Double, possibly
with a different key management scheme).  Assuming that the problems are
more in the latter category, there are a few questions which it would be
nice to have an answer to:

1. What are the requirements for replacing the PERC key management scheme?
Do other key management standards (e.g. EME) meet those requirements?
2. Are the problems with "Double " addressable via adoption of alternatives
such as PERC-lite? Or is the problem more fundamental (e.g. requiring
adoption of encryption at the frame rather than packet payload level)?
3. Is lack of support for SSRC-rewriting a limitation for implementation of
key scenarios (e.g. MOOCs). Does this imply a set of implementation
requirements (e.g. simulcast reception and associated features) that are
unlikely to be fulfilled in practice?  Is there a viable alternative to
SSRC-rewriting (e.g. involving RIDs)?

Without a clear framework document clearly discussing the relationships
between the aspects of the PERC architecture, describing the design choices
and how things fit together, it is very difficult to figure a way out of
this swamp.

To some extent this debate reminds me of the discussions relating to IPsec
and key management proposals, but at least in that case we had a well
articulated framework document (RFC 4301) that helped make the architecture
understandable and enabled its evolution over time.







On Sat, Feb 2, 2019 at 10:36 AM Sergio Garcia Murillo <
sergio.garcia.murillo@gmail.com> wrote:

> On 02/02/2019 13:30, Bernard Aboba wrote:
> > With respect to consensus, this is IETF last call, one of whose
> > purposes is to determine whether there is IETF consensus to publish
> > this document as a Proposed Standard.  Are you saying that you do not
> > agree that there is an IETF consensus to publish this document as a
> > Proposed Standard?  Or that there is no IETF consensus to publish
> > *any* of the PERC WG output as a Proposed Standard?
>
>
> The consensus we reached in Prague almost two years ago was that despite
> many of us didn't like the solution and while it would huge impact to
> implement it in current deployed based, it was technically feasible and
> we would not oppose getting this go trough as that it could be possible
> to progress alternative solutions (namely PERC lite and js keying) in
> other forums.
>
> However the end to end encryption with trusted application use case had
> to be removed from the w3c nv scope because it was against what has been
> defined within this group. Given that, I would say that the previous
> consensus has been broken.
>
> Best regards
>
> Sergio
>
>
>