Re: [MMUSIC] Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance

"Kyzer Davis (kydavis)" <kydavis@cisco.com> Tue, 10 October 2023 14:53 UTC

Return-Path: <kydavis@cisco.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B7DEFC15152C for <mmusic@ietfa.amsl.com>; Tue, 10 Oct 2023 07:53:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.605
X-Spam-Level:
X-Spam-Status: No, score=-14.605 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="AiUuSmQ6"; dkim=pass (1024-bit key) header.d=cisco.com header.b="gcO0/ZCV"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PKfuEdDhq5aT for <mmusic@ietfa.amsl.com>; Tue, 10 Oct 2023 07:53:10 -0700 (PDT)
Received: from rcdn-iport-2.cisco.com (rcdn-iport-2.cisco.com [173.37.86.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 84719C15198C for <mmusic@ietf.org>; Tue, 10 Oct 2023 07:53:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=15580; q=dns/txt; s=iport; t=1696949590; x=1698159190; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=3LrGFlLY2m1KmM4i8LskFc3RqHYw23VHKJnj2QVsutw=; b=AiUuSmQ6T/yC5RCqH56VnLESxPLls5g6TMUdMNsUG9X2CvFgcoeUhD6H SNfFRZGWRi5f2H0PKkfMlmom5mgxSp/EnM+selVQqXRdUuhvuTb9MVtbS chQVzhQw1nKf+LEHA4m9P4j4z58xMGEIrDYjPXVfae5aJEP4yl5zc7mlg Q=;
X-CSE-ConnectionGUID: u/OmFKECTe+q/zymrbRbLg==
X-CSE-MsgGUID: cDL8otZERAuymLDGo8ZKTw==
X-Files: smime.p7s : 5465
X-IPAS-Result: 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
IronPort-PHdr: A9a23:CKz5lBCurnW8xBCL13iBUyQVoxdPi9zP1kY9454jjfdJaqu8usikN 03E7vIrh1jMDs3X6PNB3vLfqLuoGXcB7pCIrG0YfdRSWgUEh8Qbk01oAMOMBUDhav+/Ryc7B 89FElRi+iLzKlBbTf73fEaauXiu9XgXExT7OxByI7H2C4LbkcWs/+uz4JbUJQ5PgWn1bbZ7N h7jtQzKrYFWmd57N68rwx3Vo31FM+hX3jZuIlSe3l7ws8yx55VktS9Xvpoc
IronPort-Data: A9a23:kmllY6MExvxiUC7vrR0Ol8FynXyQoLVcMsEvi/8bNHDolHp+jmZWi jtAB3bGYazJZX+2Io4oOcnztx82DaSljYs6FVdy7S52J54hgZTIC4XEcRupYCibJZOTEktsv s9OZtWacJxuRSSF9h7xb7S9oCdy3K3YFrOnU7WeY34hG19qEip500wykr832NUAbbRVbe+ok YuaT5r3ZQP7hlaYS14p1p9viC+Dndyj4TlF4w03PPwa51GHxiJKVpkVfa3oJSH0EtUFFePqG c/Oneqzlo/7E7jBKT8EfpLTKBBirmv6ZFDW4pZuc/H/xEAE/mprivpT2MM0MS9/ky+Ok8161 OJDvJmxTRZBFqDXkYzxaTEAe81FFfMAoOSvzUSX65TJlBSeKiO0mZ2CMWlvVWEm0rcvaY1x3 aRwxAAlNnirm++wybSnfehg7uxLwB7DZd53VtlIlFk1PN5+KXzxa/yiCexwgF/csvtz8cP2P KL1X9bAgCPoOHWjMn9PYH43cXzBanPXK1W0o3rNzUY7DvS6IAFZiNDQ3NTpltOiWIJym2i7i 0n68ifgRQMLMcaV8zCh/Sf57gPPtXuTtIM6Hbm88Lthh0eegzVJThYXTlC85/K+jyZSWfoGd BdSoXRo9PN0rRf3JjX+d0XQTHqsvQ8QUsRRCMUx6RqGzezf5APx6m0sF2QaOIx96J9uLdAs/ lSlu4PuGQ5CipSIWHe52piT/QGRBTdAeAfuYgddHVdavLEPurobixfSVddoOK+4ktOzHiv/q w1mtwA3g7EVyMUMzaj+pAqBiDO3rZ+PRQkwjunKYo67xh4+Q4uLRKGD1VWY9LFSPYODRGOLm HdRzqBy89syJZ2KkSWMRsAEE7eo++uJPVXgbbhHQsZJG9OFpi7LQGxA3N1tDBwyap5fI1cFd GeW6F0MuMQPVJe/RfYvO+qM59IWIb8M/DgPfs/FattDCnSaXFDapHA+DaJ8MpyEraTBuag7P ZHeesG2ADNDU+JszSG9QKEW1rpDKsECKYH7G8yTI/ePiOX2iJuppVEtbALmggcRsPrsnekt2 4wDX/ZmMj0GOAEEXgHZ8JQIMXcBJmUhCJb9pqR/L7DSfFo5Rjt9UqeMmtvNnrCJeYwIxo8kG VnjAidlJKbX3hUr1C3TMCk4MeOzNXqBhStnZnRE0amUN4gLONbzs/h3m2ofdrg8/+sr1u9vU /QAYK297gdnFFz6F8AmRcCl9uRKLU3z7SrXZnbNSGZkJfZIGVeWkuIIiyOyrkHi+ALt65tny 1BhvyuGKac+q/NKVpuLMKrylgvq5RDwWotaBiP1HzWaQ221mKBCIC3qhfhxKMYJQSgvDBPBv +pKKX/0fdXwnrI=
IronPort-HdrOrdr: A9a23:FaE4/KxAwkJQs95oHvpUKrPxY+gkLtp133Aq2lEZdPULSL36qy n+ppQmPEHP6Qr5AEtQ6OxoWJPtfZvdnaQFmLX5To3SLDUO2VHYY72KiLGSoQEIdBeOi9K1uZ 0QFJSWTeeAc2SS7vyKrjVQcexQvOVvmZrA7YyxvhIdKT2CKZsQkDuRYTzranGeMTM2f6bRY6 DsnfavyQDQH0g/X4CQPFVAde7FoNHAiZLhZjA7JzNP0mOzpALtwoTXVzyD0Dkjcx4n+9ofGG 7+/DDR1+GGibWW2xXc32jc49B9g9360OZOA8SKl4w8NijsohzAXvUgZ5Sy+BQO5M2/4lcjl9 fB5z06Od5o1n/Xdmap5TPwxgjb1io04XOK8y7avZKjm726eNsJMbsEuWtrSGqf16PmhqA77E t/5RPdi3OQN2KYoM2y3amRa/ggrDvGnZNrq59gs5UYa/peVFeUxrZvpn+81/w7bXnHwZFiH+ 90AM7G4vFKNVuccnDCp2FqhMehR3IpA369MwI/U+GuonBrdUpCvgAl7d1amm1F+IM2SpFC6e iBOqN0lKtWRstTaa5mHu8OTca+F2SIGHv3QS6vCEWiELtCN2PGqpbx7rlw7Oa2eIYQxJ93nJ jaSltXuWM7ZkqrA8yT259A9AzLXQyGLHnQ49Ab44I8tqz3RbLtPyHGQFcyk9G4q/FaGcHfU+ bbAuMePxYiFxqZJW9k5XyIZ3AJEwhqbCQ8gKdOZ26z
X-Talos-CUID: 9a23:uWHTM294onZyWOzyPZGVv1NTPcULUVD28HqTOgiqGGNzQoefbVDFrQ==
X-Talos-MUID: 9a23:CKwh7At6NMGE+Q6xLc2njx1GZMB00YmUIV0clLEqlM7UBw9MJGLI
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-12.cisco.com ([173.36.13.134]) by rcdn-iport-2.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Oct 2023 14:53:09 +0000
Received: from alln-opgw-4.cisco.com (alln-opgw-4.cisco.com [173.37.147.252]) by alln-core-12.cisco.com (8.15.2/8.15.2) with ESMTPS id 39AEr4cM010681 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <mmusic@ietf.org>; Tue, 10 Oct 2023 14:53:08 GMT
X-CSE-ConnectionGUID: j+TkaO2TQxmSyNPn25AvxA==
X-CSE-MsgGUID: 1rjfsxz5TYibg6KIB5Y4jg==
Authentication-Results: alln-opgw-4.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=kydavis@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.03,213,1694736000"; d="p7s'?scan'208";a="4542224"
Received: from mail-co1nam11lp2168.outbound.protection.outlook.com (HELO NAM11-CO1-obe.outbound.protection.outlook.com) ([104.47.56.168]) by alln-opgw-4.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Oct 2023 14:53:03 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NItOHT3IhUb6btjy3PX0mALAJL4cuqAQ5dw6hqQFUf2jrbPvOt98mf8TWNwMk6iIY1XaLAq9Wh2BKxs5McbvYDLD5zlHq7BbgP2fZNd7Fo9sDPRDFF4vlCvtkzJZFi7PCXNxASDkjtn3/QTTTdrf9aXCcOugmXpipBxKUDAlKyO0vftX1GCmpEhgByR94TFa1zATdl+n8j9RuKvHomQJxEUEaAxJjJY8LDKtfedUCeGIpr32RjWE+nxd3LfAb+w5OvfSxkEpVVpDSyqShAaLkh5cOM69S4RyLK52m//PEV3fVXymLN+USCyr60HsvIu85AeG8RyLJ1opWCSg7lhJFw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=p9/9ZOBtGwkRosYfSixY+wpMCH6KrKmI+5u74nIeH3E=; b=MtbXQgM2+rwJhOozrl99gqYpGaanBm3Jht6KLDTOo247rXEHD8/89WG2id+AoB7nnzWcHzvt8Llejha/64Dp/4pEF9+sbKeyBaglWT5n3jHRg4eEnlsRL5ahZIGtGkri7E4M86OQp0I/HbXknEuEuo1h7aCuWan/kWZTcJp74guCzioAOiyvECD7QzGTNJLTZauTjPhJEkr8F87miyku56AzSt/xri9rcV0LUlZ9AXmugi9G4qDFGSmUy4KY9cGhr9fi9VBvvFcSsLEKAQjShkzryv7jC87emlXz+lU4UxywQEhDzjUKm9vppmZYtde5dcogd4m9Yj/LovUr8klDRQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=p9/9ZOBtGwkRosYfSixY+wpMCH6KrKmI+5u74nIeH3E=; b=gcO0/ZCVEggQ5DtPzHuOUOQ5TP2zWJMl3RpJNwvAwRShq+z4HdfEfq5ZB9n7M1y4+G5kcvhrB8zdd993lLJHpVkg3iL+aQnkMy66DgZ/GWm7e4JWB2sFA+22ICRmxQ7kD4Z/cr8vLzeyx1qyh3jHnJCcm+CwspwRC6/D9Uy6tZk=
Received: from PH0PR11MB5029.namprd11.prod.outlook.com (2603:10b6:510:30::15) by SJ0PR11MB8296.namprd11.prod.outlook.com (2603:10b6:a03:47a::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6863.37; Tue, 10 Oct 2023 14:53:01 +0000
Received: from PH0PR11MB5029.namprd11.prod.outlook.com ([fe80::ef5:68e2:bc47:eeee]) by PH0PR11MB5029.namprd11.prod.outlook.com ([fe80::ef5:68e2:bc47:eeee%6]) with mapi id 15.20.6863.040; Tue, 10 Oct 2023 14:53:01 +0000
From: "Kyzer Davis (kydavis)" <kydavis@cisco.com>
To: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org>, "mmusic@ietf.org" <mmusic@ietf.org>
CC: "Esteban Valverde (jovalver)" <jovalver@cisco.com>
Thread-Topic: Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance
Thread-Index: AdnLnxa1oeUTBHs9SrOCZ4d9gnl/4AvUikQQACOy1sAAAkWlgA==
Date: Tue, 10 Oct 2023 14:53:01 +0000
Message-ID: <PH0PR11MB5029236B1114DE35C53A2BB2BBCDA@PH0PR11MB5029.namprd11.prod.outlook.com>
References: <PH0PR11MB5029B53E9DF50EC1B420AF1EBB13A@PH0PR11MB5029.namprd11.prod.outlook.com> <PH0PR11MB5029896E1D6202953341CB27BBCEA@PH0PR11MB5029.namprd11.prod.outlook.com> <HE1PR07MB44410065064B77A55A8493C993CDA@HE1PR07MB4441.eurprd07.prod.outlook.com>
In-Reply-To: <HE1PR07MB44410065064B77A55A8493C993CDA@HE1PR07MB4441.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB5029:EE_|SJ0PR11MB8296:EE_
x-ms-office365-filtering-correlation-id: fd634def-8f8e-44b1-8302-08dbc9a09998
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB5029.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(136003)(39860400002)(346002)(366004)(396003)(376002)(230922051799003)(451199024)(186009)(64100799003)(1800799009)(2906002)(55016003)(76116006)(107886003)(83380400001)(316002)(110136005)(64756008)(66556008)(66476007)(66946007)(66446008)(4326008)(53546011)(52536014)(5660300002)(41300700001)(71200400001)(7696005)(6506007)(9686003)(966005)(478600001)(8936002)(8676002)(33656002)(86362001)(122000001)(38070700005)(38100700002)(99936003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="SHA1"; boundary="----=_NextPart_000_001C_01D9FB67.EE12E800"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB5029.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fd634def-8f8e-44b1-8302-08dbc9a09998
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Oct 2023 14:53:01.1695 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Ivu7/24bYk/bmRfO+tHbb9gPyONFyebtXjCIvNAgxpYRrmXIZ4meVESSpMCLwfnP9svICzGpBFbjB01CZdZKhQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR11MB8296
X-Outbound-SMTP-Client: 173.37.147.252, alln-opgw-4.cisco.com
X-Outbound-Node: alln-core-12.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/IQ3Qtrh_2VShIBUXVbyRukq-LZU>
Subject: Re: [MMUSIC] Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Oct 2023 14:53:14 -0000

Hello Christer,

Thanks for the review and great feedback. See answers below:

Q.1 and Q.2 are correct and make sense. 
I will open a tracker item to revise the ABNF

Note: as I reviewed this I also noticed I did not update the ABNF to include the new "list" of multiplexed SSRC/ROC/SEQ values with parenthesis delimiters. 
I will also add a tracker item to fix this in the ABNF as well.

Q.3 is two questions so I will address both:
A: The answer is value=unknown or no value at all are the same in the grand scheme. 
The main difference is that I wanted to ensure an application had a way to explicitly call out that the value was unknown to them.
I could expand the text for one scenario that comes to mind which is: perhaps there was a scenario where it was known, then later it became unknown and the app would like explicitly to state that as such and force a fallback to the default behavior.

B: Good callout. I will open a tracker item to cite the default behaviors from the underlying RFCs.

Q.4: The assumption is correct, I want a=crypto:1 to map nicely with a=srtpctx:1
I can add some additional text to better call out that those two go together in a given media stream.

Thanks,

--- 
Kyzer Davis

-----Original Message-----
From: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org> 
Sent: Tuesday, October 10, 2023 10:28 AM
To: Kyzer Davis (kydavis) <kydavis@cisco.com>; mmusic@ietf.org
Cc: Esteban Valverde (jovalver) <jovalver@cisco.com>
Subject: RE: Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance

Hi,

A few questions, more related to the SDP usage than then mechanism itself.

---

Q1: Section 3.1 says:

srtp-context   = srtp-attr
                            srtp-tag
                            [srtp-ssrc";"]
                            [srtp-roc";"]
                            [srtp-seq";"]
                            [srtp-ext";"]

I don’t think this is what you want, because you would have to add “;” also after the last field.

Instead, you probably want something like:

srtp-context   = srtp-attr
                            srtp-tag
                            [srtp-param *(“;” srtp-param)]
srtp-param     = srtp-roc / srtp-seq / srtp-ext

---

Q2: Section 3.1 says:

srtp-ext       = 1*VCHAR "=" (1*VCHAR / "unknown")
...
VCHAR          = %x21-7E

I don't think you want to allow ";" (%x3B), because then one may not know whether it is part of the srtp-ext value or a separator between values.

---

Q3: Section 3.1 says:

   “The value of "unknown" MAY be used in place of any of the fields to
   indicate default behavior SHOULD be utilized by the receiving
   application” 

How is that different from when the field is not included to begin with?

Where are the default behaviors for the different fields defined?

---

Q4: Section 3.1 says:

   "The tag for an SRTP Context attribute MUST follow the peer SDP
   Security a=crypto tag for a given media stream (m=)."

It is unclear what "follow the tag" means. I assume you want to say that the SRTP Contect attribute MUST use the same tag value as the crypto attribute it is associated with?

---

Regards,

Christer





From: mmusic <mmusic-bounces@ietf.org> On Behalf Of Kyzer Davis (kydavis)
Sent: Monday, 9 October 2023 23.45
To: mmusic@ietf.org
Cc: Esteban Valverde (jovalver) <jovalver@cisco.com>
Subject: Re: [MMUSIC] Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance

Group,

I have posted draft 01 which covers the items from my previous email.

Name:     draft-davis-mmusic-srtp-assurance
Revision: 01
Title:    Signaling Additional SRTP Context information via SDP
Date:     2023-10-09
Group:    Individual Submission
Pages:    21
URL:      https://www.ietf.org/archive/id/draft-davis-mmusic-srtp-assurance-01.txt
Status:   https://datatracker.ietf.org/doc/draft-davis-mmusic-srtp-assurance/
HTML:     https://www.ietf.org/archive/id/draft-davis-mmusic-srtp-assurance-01.html
HTMLized: https://datatracker.ietf.org/doc/html/draft-davis-mmusic-srtp-assurance
Diff:     https://author-tools.ietf.org/iddiff?url2=draft-davis-mmusic-srtp-assurance-01

Thanks,

From: mmusic <mailto:mmusic-bounces@ietf.org> On Behalf Of Kyzer Davis (kydavis)
Sent: Thursday, August 10, 2023 11:30 AM
To: mailto:mmusic@ietf.org
Cc: Esteban Valverde (jovalver) <mailto:jovalver@cisco.com>
Subject: [MMUSIC] Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance

Hello all,

I presented draft-davis-valverde-srtp-assurance-00 at Dispatch and the outcome was to dispatch to MMUSIC WG.
I have re-submitted draft-davis-valverde-srtp-assurance-00 as draft-davis-mmusic-srtp-assurance-00 with no changes.

To view that session and/slides see below:
- https://youtu.be/KT3mMX9CMdA?t=3113
- https://datatracker.ietf.org/meeting/117/materials/slides-117-dispatch-sdp-security-assurance-for-secure-real-time-transport-protocol-srtp
- A quick slide note, before the dispatch session I was working on a draft-01 which leveraged Solution A in these slides while draft-00 uses Solution B.
  - Jonathan Lennox brought up a good point after the session which favors solution B:
  - Paraphrasing: "We know how implementations will handle unknown SDP attributes; we do not know well how well how implementations will handle unknown SDP Security Session Parameters"
    - I dug into this a bit more and tend to agree. So draft-01 now continues to use solution B (a=srtpctx) new SDP Attribute to convey the required SRTP Context information alongside a=crypto.
      - I have a full write-up on GitHub with far more details: https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues/5

In addition, some other draft-01 actions items that were brought up in chat, at the mic or in person 1:1:
- "Why this can't be a RTP Header Extension" from Richard Barnes. (https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues/11)
- "Discuss sending some update when ROC updates" from Jonathan Rosenberg. (https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues/10)
  - Already text in the draft around this; which covers "99.9% of scenarios".
- "Method to Convey Multiple SSRCs for a given stream" from various (https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues/1)
  - Two solutions proposed in the GitHub issue
- A statement Cullen Jennings made about focusing on the problem statements.
  - I want to re-write the problem sections like RFC7744 where each problem in a scenario is cited as Ux.y and then discussed (Section 2.1.1 and 2.1.2)
  - I took a stab at a rough draft of this in "Discuss why SEQ is signaled in the SDP" via (https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues/9)
  - Overall item is in https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues/13

Lastly, the following items are already merged into draft-01 over on GitHub:
- Change contact name from IESG to IETF in IANA Considerations #2
- Discuss RFC4568 "Late Joiner" in problem statement: #3
- Split Serial forking scenario into its own section #4
- Add MIKEY considerations to Protocol Design section #6
- Change doc title #7 (new title: "Signaling Additional SRTP Context information via SDP")
- Add SEQ abbreviation earlier #8
  
Thanks,

---
Kyzer Davis