Re: [MMUSIC] Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance

"Kyzer Davis (kydavis)" <kydavis@cisco.com> Tue, 10 October 2023 19:20 UTC

Return-Path: <kydavis@cisco.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 76BE4C1519A7 for <mmusic@ietfa.amsl.com>; Tue, 10 Oct 2023 12:20:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.906
X-Spam-Level:
X-Spam-Status: No, score=-11.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H5=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="aMB8szr4"; dkim=pass (1024-bit key) header.d=cisco.com header.b="TR9T0Y/Z"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZCQAl7tCfQ1D for <mmusic@ietfa.amsl.com>; Tue, 10 Oct 2023 12:20:40 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 78F35C15198B for <mmusic@ietf.org>; Tue, 10 Oct 2023 12:20:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=16461; q=dns/txt; s=iport; t=1696965631; x=1698175231; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=HSKiZvQe2MnKRYI1fcyaa+f75A1VKUUDnd3A2SzxaD4=; b=aMB8szr46Sx35rAAjMTqGU+06cGTs0XkSvPhI1on75jZsmBp0AsJ1+V7 8lQKd8spFTiG70huzrgnWmJrpu2I7DbKhGiSbCROztU83XJgB75im6FoP +NnsmRqOzZvxlALCjV1wQ56vwRJcDqnfu9IMx+iaWsjAq0domW4ayedoB g=;
X-CSE-ConnectionGUID: Qj+/kID2RnickjMse51PJQ==
X-CSE-MsgGUID: v1zytQ6YS8yDLwC9lFrmKA==
X-Files: smime.p7s : 5465
X-IPAS-Result: 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
IronPort-PHdr: A9a23:gFITkBcDbiZotNhPUMScA93MlGM/foqcDmcuAtIPgrZKdOGk55v9e RWZ7vR2h1iPVoLeuLpIiOvT5rjpQndIoY2Av3YLbIFWWlcbhN8XkQ0tDI/NCUDyIPPwKS1vN M9DT1RiuXq8NBsdA97wMmXbuWb69jsOAlP6PAtxKP7yH9vRnsi+yeGp05bSeA5PwjG6ZOA6I BC/tw6ErsANmsMiMvMo1xLTq31UeuJbjW9pPgeVmBDxp4+8qZVi6C9X/fkm8qZ9
IronPort-Data: A9a23:FRzHRKgDVUIj6WnhNouVEGycX161zhAKZh0ujC45NGQN5FlGYwR3n yJfBTDVa7vTPTzqO4IlK4qrthNR58eRi5Q2eLZe3WpoTndH79KaHrx1RW+sZ3mff5KcERg4v shDNtTOIso/ECbW/R2mPuK983B3ia2GGOSsWbPPMysoT1I/QXlwhEozyrBk3tNmjYa1WQmH0 T+eT6MzHXf9s9IjGj9Itf/rRGpTgcnPVBMkUn0WOPkU4AbXzSdPXMsSff7hdiKpTNAFRbLhH 7vJxbzkpDzw8kZ2ALtJsFpUnm7m41L2FVLT4paDc/H62nCungRrj+BjcqJaMB8L49mwt4gZ4 M1XspCtQhseMKTJmeAMOzFVCCgW0ZduoNcrGlDh95TIp6H6WyG0ma43VBhuZddwFttfWAmiy 9RJcFjhUTjb7w6G6OrTYvVhgM0lMP7qMOs30p235WiEZRqOacmrr5Tivbe07h9p7ix9Naq2i /4iVNZaRE+ojyujlbsgIMlWcO+A3hETetDDwb6fjfJfD2P7lGSd3FVxWTbYUoTieClboqqXj lvEvCP6Iz1ADtqewjmH12mh27b3vxquDer+FJXgnhJrqFSXwmpWAxoMWB7n5/K4kUW5HdlYL iT4+AJ38vN0rxLtF4K7BkbnyJKHlkZ0t954EPw24R+M0YLf4h2SAS4PSTsphNkO7ZBuGWB7j wHX9z/vLSI2oqyJcCyszeeFgRetEnkRA3UHRgZRGGPp5PG68N1s0XojVO1LFauoldz+MTD93 z7MqzIx74j/luYC06G9uFvAmT/p+t7CTxU+4UPcWWfNAh5FiJCNXo7rrlv6wax6KoeSTVukp 3VZwvC81bVbZX2SrxClTOIIFbCvwv+KNjzAnFJid6XNERzwpBZPmqgNsFlDyFdV3tUsImSxO BSJ0e9FzNoCYib2NvMfj5eZUpxypZUMA+gJQRw9gjBmXYl1dQLvEMpGOhPIjjCFfKTBbcgC1 XqzeMKoCzMRDr5qiWbwTOYG2rhtzSc7rY8yeXwZ50r+uVZ9TCfKIVvgDLdoRrtphE9jiF6Fm +uzz+PQl31ivBTWO0E7C7I7I1EQNmQcDpvrscFRfePrClM4ST9xVKGLnep5JtcNc0FpegHgo yHVtqhwlgKXuJE7AV7iho1LMem2Bs8v8RrXwwR1YQ3ws5TcXWpfxP5PK8RoFVXW3Odi1vVzB +IUYNmNB+8nd9g002p1UHUJl6Q7LE7DrVvXZ0KNOWFjF7Y+HFah0oG/IWPSGNwmU3DfWT0W+ ePwj2s2gPMrGmxfMSohQKjwlgrt4iBGxL0asomhCoA7RXgAObNCckTZpvQ2OMoLbx7Ew1OnO 8y+Wn/0ecGlT1cJzeT0
IronPort-HdrOrdr: A9a23:kwgB4avVHr2kOKsElwZAilWt7skCOYAji2hC6mlwRA09TyXGrb HMoB1L73/JYWgqOU3IwerwSZVoIUmxyXZ0ibNhRItKLzOWyFdATbsSorcKpgeQeREWmdQtqJ uIH5IOb+EYSGIK8/oSgzPIXerIouP3jJxA7N22pxwCPGQaD52IrT0JdTpzeXcGPDWucKBJbq Z0kfA33AZIF05nCPiTNz0uZcSGjdvNk57tfB4BADAayCTmt1mVwY+/OSK1mjMFXR1y4ZpKyw X4egrCiZmLgrWe8FvxxmXT55NZlJ/K0d1YHvGBjcATN3HFlhuoTJ4JYczDgBkF5MWUrHo6mt jFpBkte+5p7WnKQ22zqRzxnyH9zTcV7WP4w1PwuwqhnSW5fkN5NyNyv/McTvLr0TtmgDi66t MM44utjesTMfoHplWl2zGHbWAzqqP+mwtQrQdatQ0sbWJZUs4RkWTal3klSqvp20nBmdsaOf grA8fG6PlMd1SGK3jfo2l02dSpGm8+BxGcXyE5y4aoOhVt7ThEJnEjtYcit2ZF8Ih4R4hP5u zCPKgtnLZSTtUOZaY4AOsaW8O4BmHEXBqJaQupUBjaPbBCP2iIp4/84b0z6u3vcJsUzIEqkJ CEVF9Dr2Y9d0/nFMXL1pxW9RLGRnm7QF3Wu4xjzok8vqe5SKvgMCWFRlxrm8y8o+8HCsmeQP q3MII+OY6rEYIvI/c+4+TTYegkFZBFarxhhj8SYSP7nv72
X-Talos-CUID: 9a23:loHIjmlS00ZEmnL5rCfMjFVX27LXOUTfjzDTAmPiM2BoQ76XbESdpfpcsfM7zg==
X-Talos-MUID: 9a23:C+LPIQhxoSZ8BFr/cVIZDMMpKp568riXVnE2wYQqn9avZCheITK+pWHi
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-4.cisco.com ([173.36.13.137]) by alln-iport-7.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Oct 2023 19:20:30 +0000
Received: from alln-opgw-1.cisco.com (alln-opgw-1.cisco.com [173.37.147.229]) by alln-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id 39AJKTKH019066 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <mmusic@ietf.org>; Tue, 10 Oct 2023 19:20:30 GMT
X-CSE-ConnectionGUID: 3ZbCWG7XT1q0xtelYam1Hg==
X-CSE-MsgGUID: KFa6oTFeQ4SSsVxmEdUFyg==
Authentication-Results: alln-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=kydavis@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.03,213,1694736000"; d="p7s'?scan'208";a="4434538"
Received: from mail-bn1nam02lp2040.outbound.protection.outlook.com (HELO NAM02-BN1-obe.outbound.protection.outlook.com) ([104.47.51.40]) by alln-opgw-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Oct 2023 19:20:29 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RIWApODbjXZsxYM4YJA1q8AI3/4noQnVrDrBKLZ6KXMYlxjXpDa+n5y2u2hZSt2NbU9Zt3WmClZfNKvXM1SOvh5snGM/utdZZPKcKJFIFDMSBn7rQB651M8e8qFvGBL18tws8nqJUeXRTOpgWsnNSkScYrnhZXUSZZ72kaeDcAKdWSOT97aSiswBToF7s9JRiVmXLZY5XUk6y4ZLw5rKApZ9qdjMo8m7hioWqqoAdh52dURZbcm0Qkp8QTi/y2K1M323bkXtMA2OJll9dYN5hq5EJAOgIdmagzYybcMM+Q827Z7tDG6lXi9r0yyvqfmd28UsKheuykZcD5hVdPJ5kA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=4XaPSh5q9lTg/vpC+2FFfX4ek78C7GoCLqVhqFfjRlI=; b=Gm9fGpRToUHVwL2YQaAWoTZ1N95k7e/BayhkTatNldl7dw7khLfD0/iDtLvS27Vq++4LVju7QuUQ6V/xU+htVw/KOJ0hP3CDI52e6Zh5a9YZdZX9b7ribcqImn4jp/ekKFwPzj9tGOjuekfe1WbbFmLiR2NEUIBwtFoeSLq8LfXQLdC6VU7uQdhOOJrKTpSYk4KVKzojvrgiaSZMcjkEVZb064HaRYw9ygsBcH2J914lrIK73d2k2VvGmXn+TyIoekTDOGjecgt7aVXiyyDVUMz2Mu7qKQLrOXM5ZCUMJhW9LyF9kIcSrh5M2hNs2x1zIOptlGMiGUV6iE9P6hVMTA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=4XaPSh5q9lTg/vpC+2FFfX4ek78C7GoCLqVhqFfjRlI=; b=TR9T0Y/Zik/Nlg87qXopTt9ttMjlhQlNVt1Afg9nMPcTaAljHKkD+QXmcft5rjuQe4cLBOS70Oe9vwa5dMo/K72BuBpJXNR4TD1RS5Psdecbj55KUlrhMxnOu1RV7rj0ZPwsXKocjZHM4GA4k1iRbOf/X5+HgndQIfliBL41pGI=
Received: from PH0PR11MB5029.namprd11.prod.outlook.com (2603:10b6:510:30::15) by PH7PR11MB8059.namprd11.prod.outlook.com (2603:10b6:510:24e::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6863.37; Tue, 10 Oct 2023 19:20:27 +0000
Received: from PH0PR11MB5029.namprd11.prod.outlook.com ([fe80::ef5:68e2:bc47:eeee]) by PH0PR11MB5029.namprd11.prod.outlook.com ([fe80::ef5:68e2:bc47:eeee%6]) with mapi id 15.20.6863.040; Tue, 10 Oct 2023 19:20:26 +0000
From: "Kyzer Davis (kydavis)" <kydavis@cisco.com>
To: "Kyzer Davis (kydavis)" <kydavis=40cisco.com@dmarc.ietf.org>, Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org>, "mmusic@ietf.org" <mmusic@ietf.org>
CC: "Esteban Valverde (jovalver)" <jovalver@cisco.com>
Thread-Topic: Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance
Thread-Index: AdnLnxa1oeUTBHs9SrOCZ4d9gnl/4AvUikQQACOy1sAAAkWlgAAJUF4w
Date: Tue, 10 Oct 2023 19:20:26 +0000
Message-ID: <PH0PR11MB50290A5443FFF44E0CD746FBBBCDA@PH0PR11MB5029.namprd11.prod.outlook.com>
References: <PH0PR11MB5029B53E9DF50EC1B420AF1EBB13A@PH0PR11MB5029.namprd11.prod.outlook.com> <PH0PR11MB5029896E1D6202953341CB27BBCEA@PH0PR11MB5029.namprd11.prod.outlook.com> <HE1PR07MB44410065064B77A55A8493C993CDA@HE1PR07MB4441.eurprd07.prod.outlook.com> <PH0PR11MB5029236B1114DE35C53A2BB2BBCDA@PH0PR11MB5029.namprd11.prod.outlook.com>
In-Reply-To: <PH0PR11MB5029236B1114DE35C53A2BB2BBCDA@PH0PR11MB5029.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR11MB5029:EE_|PH7PR11MB8059:EE_
x-ms-office365-filtering-correlation-id: 113b606a-2d06-4367-78f4-08dbc9c5f58f
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB5029.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(346002)(366004)(396003)(136003)(39860400002)(376002)(230922051799003)(451199024)(64100799003)(1800799009)(186009)(7696005)(6506007)(2940100002)(9686003)(107886003)(53546011)(55016003)(38100700002)(38070700005)(33656002)(99936003)(86362001)(316002)(122000001)(83380400001)(2906002)(966005)(71200400001)(41300700001)(478600001)(8676002)(4326008)(66946007)(66556008)(26005)(8936002)(5660300002)(110136005)(66476007)(64756008)(52536014)(66446008)(76116006); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg="SHA1"; boundary="----=_NextPart_000_0012_01D9FB8D.49AA7A50"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB5029.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 113b606a-2d06-4367-78f4-08dbc9c5f58f
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Oct 2023 19:20:26.8341 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /MdZ1Psc4BMxxu5XsZZ3qMFalPxF+PcPiBaMk3aY8jhevGTX9AloxWcbLdcnkBReKXqi5a+rhBKPgSxhql1dOQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR11MB8059
X-Outbound-SMTP-Client: 173.37.147.229, alln-opgw-1.cisco.com
X-Outbound-Node: alln-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/PPUAQvjbOhZYtpd1gUgR76nct8M>
Subject: Re: [MMUSIC] Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Oct 2023 19:20:44 -0000

Christer,

I filed tracker items and expanded upon Q.3 over on GitHub:
- Revise ANBF #15
- Better define that the tags must match #16
- Cite default behavior of underlying RFCs if value is unknown/omitted #17
- Handling and Signaling Unknown Values #18

I can likely get 15, 16, 17 quickly in draft-02. 18 will take some thought. Thank you for bringing this up.

GitHub: https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues

---
Kyzer Davis

-----Original Message-----
From: mmusic <mmusic-bounces@ietf.org> On Behalf Of Kyzer Davis (kydavis)
Sent: Tuesday, October 10, 2023 10:53 AM
To: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org>; mmusic@ietf.org
Cc: Esteban Valverde (jovalver) <jovalver@cisco.com>
Subject: Re: [MMUSIC] Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance

Hello Christer,

Thanks for the review and great feedback. See answers below:

Q.1 and Q.2 are correct and make sense. 
I will open a tracker item to revise the ABNF

Note: as I reviewed this I also noticed I did not update the ABNF to include the new "list" of multiplexed SSRC/ROC/SEQ values with parenthesis delimiters. 
I will also add a tracker item to fix this in the ABNF as well.

Q.3 is two questions so I will address both:
A: The answer is value=unknown or no value at all are the same in the grand scheme. 
The main difference is that I wanted to ensure an application had a way to explicitly call out that the value was unknown to them.
I could expand the text for one scenario that comes to mind which is: perhaps there was a scenario where it was known, then later it became unknown and the app would like explicitly to state that as such and force a fallback to the default behavior.

B: Good callout. I will open a tracker item to cite the default behaviors from the underlying RFCs.

Q.4: The assumption is correct, I want a=crypto:1 to map nicely with a=srtpctx:1 I can add some additional text to better call out that those two go together in a given media stream.

Thanks,

---
Kyzer Davis

-----Original Message-----
From: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org>
Sent: Tuesday, October 10, 2023 10:28 AM
To: Kyzer Davis (kydavis) <kydavis@cisco.com>; mmusic@ietf.org
Cc: Esteban Valverde (jovalver) <jovalver@cisco.com>
Subject: RE: Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance

Hi,

A few questions, more related to the SDP usage than then mechanism itself.

---

Q1: Section 3.1 says:

srtp-context   = srtp-attr
                            srtp-tag
                            [srtp-ssrc";"]
                            [srtp-roc";"]
                            [srtp-seq";"]
                            [srtp-ext";"]

I don’t think this is what you want, because you would have to add “;” also after the last field.

Instead, you probably want something like:

srtp-context   = srtp-attr
                            srtp-tag
                            [srtp-param *(“;” srtp-param)]
srtp-param     = srtp-roc / srtp-seq / srtp-ext

---

Q2: Section 3.1 says:

srtp-ext       = 1*VCHAR "=" (1*VCHAR / "unknown")
...
VCHAR          = %x21-7E

I don't think you want to allow ";" (%x3B), because then one may not know whether it is part of the srtp-ext value or a separator between values.

---

Q3: Section 3.1 says:

   “The value of "unknown" MAY be used in place of any of the fields to
   indicate default behavior SHOULD be utilized by the receiving
   application” 

How is that different from when the field is not included to begin with?

Where are the default behaviors for the different fields defined?

---

Q4: Section 3.1 says:

   "The tag for an SRTP Context attribute MUST follow the peer SDP
   Security a=crypto tag for a given media stream (m=)."

It is unclear what "follow the tag" means. I assume you want to say that the SRTP Contect attribute MUST use the same tag value as the crypto attribute it is associated with?

---

Regards,

Christer





From: mmusic <mmusic-bounces@ietf.org> On Behalf Of Kyzer Davis (kydavis)
Sent: Monday, 9 October 2023 23.45
To: mmusic@ietf.org
Cc: Esteban Valverde (jovalver) <jovalver@cisco.com>
Subject: Re: [MMUSIC] Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance

Group,

I have posted draft 01 which covers the items from my previous email.

Name:     draft-davis-mmusic-srtp-assurance
Revision: 01
Title:    Signaling Additional SRTP Context information via SDP
Date:     2023-10-09
Group:    Individual Submission
Pages:    21
URL:      https://www.ietf.org/archive/id/draft-davis-mmusic-srtp-assurance-01.txt
Status:   https://datatracker.ietf.org/doc/draft-davis-mmusic-srtp-assurance/
HTML:     https://www.ietf.org/archive/id/draft-davis-mmusic-srtp-assurance-01.html
HTMLized: https://datatracker.ietf.org/doc/html/draft-davis-mmusic-srtp-assurance
Diff:     https://author-tools.ietf.org/iddiff?url2=draft-davis-mmusic-srtp-assurance-01

Thanks,

From: mmusic <mailto:mmusic-bounces@ietf.org> On Behalf Of Kyzer Davis (kydavis)
Sent: Thursday, August 10, 2023 11:30 AM
To: mailto:mmusic@ietf.org
Cc: Esteban Valverde (jovalver) <mailto:jovalver@cisco.com>
Subject: [MMUSIC] Signaling Additional SRTP Context information via SDP - draft-davis-mmusic-srtp-assurance

Hello all,

I presented draft-davis-valverde-srtp-assurance-00 at Dispatch and the outcome was to dispatch to MMUSIC WG.
I have re-submitted draft-davis-valverde-srtp-assurance-00 as draft-davis-mmusic-srtp-assurance-00 with no changes.

To view that session and/slides see below:
- https://youtu.be/KT3mMX9CMdA?t=3113
- https://datatracker.ietf.org/meeting/117/materials/slides-117-dispatch-sdp-security-assurance-for-secure-real-time-transport-protocol-srtp
- A quick slide note, before the dispatch session I was working on a draft-01 which leveraged Solution A in these slides while draft-00 uses Solution B.
  - Jonathan Lennox brought up a good point after the session which favors solution B:
  - Paraphrasing: "We know how implementations will handle unknown SDP attributes; we do not know well how well how implementations will handle unknown SDP Security Session Parameters"
    - I dug into this a bit more and tend to agree. So draft-01 now continues to use solution B (a=srtpctx) new SDP Attribute to convey the required SRTP Context information alongside a=crypto.
      - I have a full write-up on GitHub with far more details: https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues/5

In addition, some other draft-01 actions items that were brought up in chat, at the mic or in person 1:1:
- "Why this can't be a RTP Header Extension" from Richard Barnes. (https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues/11)
- "Discuss sending some update when ROC updates" from Jonathan Rosenberg. (https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues/10)
  - Already text in the draft around this; which covers "99.9% of scenarios".
- "Method to Convey Multiple SSRCs for a given stream" from various (https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues/1)
  - Two solutions proposed in the GitHub issue
- A statement Cullen Jennings made about focusing on the problem statements.
  - I want to re-write the problem sections like RFC7744 where each problem in a scenario is cited as Ux.y and then discussed (Section 2.1.1 and 2.1.2)
  - I took a stab at a rough draft of this in "Discuss why SEQ is signaled in the SDP" via (https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues/9)
  - Overall item is in https://github.com/kyzer-davis/srtp-assurance-rfc-draft/issues/13

Lastly, the following items are already merged into draft-01 over on GitHub:
- Change contact name from IESG to IETF in IANA Considerations #2
- Discuss RFC4568 "Late Joiner" in problem statement: #3
- Split Serial forking scenario into its own section #4
- Add MIKEY considerations to Protocol Design section #6
- Change doc title #7 (new title: "Signaling Additional SRTP Context information via SDP")
- Add SEQ abbreviation earlier #8
  
Thanks,

---
Kyzer Davis