Re: [MMUSIC] Gen-art last call review: draft-ietf-mmusic-rfc2326bis-34

Magnus Westerlund <magnus.westerlund@ericsson.com> Mon, 02 September 2013 12:19 UTC

Return-Path: <magnus.westerlund@ericsson.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B013221F9E1D for <mmusic@ietfa.amsl.com>; Mon, 2 Sep 2013 05:19:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.913
X-Spam-Level:
X-Spam-Status: No, score=-103.913 tagged_above=-999 required=5 tests=[AWL=-1.314, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F6VMJXjZmPM0 for <mmusic@ietfa.amsl.com>; Mon, 2 Sep 2013 05:19:00 -0700 (PDT)
Received: from sesbmg20.ericsson.net (sesbmg20.ericsson.net [193.180.251.56]) by ietfa.amsl.com (Postfix) with ESMTP id 8657221F8EB2 for <mmusic@ietf.org>; Mon, 2 Sep 2013 05:18:59 -0700 (PDT)
X-AuditID: c1b4fb38-b7fcf8e0000062b8-47-5224823224a0
Received: from ESESSHC019.ericsson.se (Unknown_Domain [153.88.253.124]) by sesbmg20.ericsson.net (Symantec Mail Security) with SMTP id DE.1D.25272.23284225; Mon, 2 Sep 2013 14:18:58 +0200 (CEST)
Received: from [127.0.0.1] (153.88.183.148) by smtp.internal.ericsson.com (153.88.183.77) with Microsoft SMTP Server id 14.2.328.9; Mon, 2 Sep 2013 14:18:55 +0200
Message-ID: <5224825F.6070306@ericsson.com>
Date: Mon, 02 Sep 2013 14:19:43 +0200
From: Magnus Westerlund <magnus.westerlund@ericsson.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; rv:17.0) Gecko/20130801 Thunderbird/17.0.8
MIME-Version: 1.0
To: Robert Sparks <rjsparks@nostrum.com>, "mmusic (E-mail)" <mmusic@ietf.org>
References: <51AFB3FF.7000009@nostrum.com> <51C047BC.1050207@ericsson.com> <51C06CDC.9050804@nostrum.com>
In-Reply-To: <51C06CDC.9050804@nostrum.com>
X-Enigmail-Version: 1.5.2
Content-Type: text/plain; charset="windows-1252"
Content-Transfer-Encoding: 8bit
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprLLMWRmVeSWpSXmKPExsUyM+Jvja5Rk0qQwauZ2haTnk5jspi6/DGL xbU5jWwOzB47Z91l91iy5CeTx6ydT1gCmKO4bFJSczLLUov07RK4Mho6frEUHNnJVNFy4TlL A+Pnb4xdjJwcEgImEoe3zmGBsMUkLtxbz9bFyMUhJHCUUeJUcwOUs4xRYmPHbrAOXgFtiR8d c5m6GDk4WARUJGa/9QUJswlYSNz80cgGYosKBEu0b//KBlEuKHFy5hOwBSICvhJr9i8Es5mB xry6fZUZxBYWcJOYcWwjO4gtJJApMX31M7BeTqCahiM/2CCOk5TYtugYO0SvgcSRRXNYIWx5 ieats5kheoHqmzpYJzAKzUKyehaSlllIWhYwMq9i5ChOLU7KTTcy2MQIDOKDW35b7GC8/Nfm EKM0B4uSOO8WvTOBQgLpiSWp2ampBalF8UWlOanFhxiZODilGhiZ5m82rdLSTPJl0dYWNdpy 73n0xwX2vIsqTHvXeNWsnx3r1qDYwbX2Stjyl2/PmPfq3lbmPVj51EXCvUMvLvJPf4zvBd89 Z4Vat+3genfB9GHW8Vf80+wFX0XMYNzg1J9s3K0kqG72xHea/rNHEzY8XrqTt4N98YKtlVcm 8qyqTKv4dPnnBWclluKMREMt5qLiRADuE7t6MAIAAA==
Cc: Martin Stiemerling <mls.ietf@gmail.com>
Subject: Re: [MMUSIC] Gen-art last call review: draft-ietf-mmusic-rfc2326bis-34
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mmusic>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 02 Sep 2013 12:19:05 -0000

Robert and WG,

Please see inline in this messages further comments or response on how
we have dealt with listed issues.

With this email we believe we have answered the outstanding issues and
draft response and new text for all the issues. Therefore we will submit
a new draft version so that you can review the changes in context.


On 2013-06-18 16:21, Robert Sparks wrote:
> Hi Magnus -
> 
> Thanks for your careful treatment of these comments - I think you're on
> a good path with all the suggestions below.
> Responses to questions and a few comments inline:
> 
> On 6/18/13 6:42 AM, Magnus Westerlund wrote:
>> Hi Robert,
>>
>> Thanks for the massive review. A number of really good comments in here.
>> Below you will find my answers, comments, questions and in most cases
>> clarifications what I see us doing with your comment. These covers your
>> major and minor comments. The nits we will simply implement as we see
>> fit, if we have questions we will comeback with those.
>>
>> WG, there are a number of issues in here that would be greatly helped by
>> your input!
>>
>> On 2013-06-05 23:56, Robert Sparks wrote:
>>> Document: draft-ietf-mmusic-rfc2326bis-34
>>> Reviewer: Robert Sparks
>>> Review Date: 05-Jun-2013
>>> IETF LC End Date: 04-Jun-2013
>>> IESG Telechat date: not yet on a telechat
>>>
>>>

>>
>>> Major Issues
>>>
>>> I'm not seeing what instructs an RTSP element on how to find the server
>>> it would try to open a connection to given an rtsp or rtsps URI? Are you
>>> assuming it would be doing A or AAAA DNS lookups?
>> Yes, using A or AAAA DNS records are assumed. No problem making that
>> explicit.
>>
>> Should this protocol
>>> use NAPTR/SRV?
>> Potentially, but as everyone have been using A records for all these
>> years, I think it is not worth defining it at this stage.
>>
>> The document should be explicit. On a related note, (and
>>> maybe I missed this), but where do you talk about what an element should
>>> check in the server's certificate when connecting over TLS? Are you
>>> assuming a common name match? Or are you expecting some SubjectAltName
>>> processing?
>> This draft says in Section 19.2 the following regarding this:
>>
>>     RTSP MUST follow the same guidelines with
>>     regards to TLS [RFC5246] usage as specified for HTTP, see [RFC2818].
>>
>> Where section 3.1 (Server Identity) of RFC 2818 contains the following:
>>
>>     If a subjectAltName extension of type dNSName is present, that MUST
>>     be used as the identity. Otherwise, the (most specific) Common Name
>>     field in the Subject field of the certificate MUST be used.
>>
>> Isn't that clear enough on that matter?
> Yes - I was worried that I might have missed it before.

No issue here.

>>
>>> The document should say more about when connection reuse is appropriate,
>>> particularly when the connections happened because of an rtsps uri. Two
>>> different names might resolve to the same IP address - reusing a
>>> connection formed when looking at the first name (and verifying the
>>> server's cert) is dangerous. A new connection needs to be formed (and
>>> verified) instead.
>> I want to check my understanding of the issue you are seeing here. So a
>> client looks ups foo.example.org, gets an ip address A and establishes
>> an TCP/TLS connection and verifies that there are a SubjectAltName that
>> matches foo.example.org works. Then client is going to open
>> bar.example.com and looks up that address and gets the same IP address A.
>> Client matches A against existing connections and simply sends a
>> request to
>> bar.example.com. Thus bypassing the certificate verification.
>>
>> If we clarify that in the process of opening rtsps://bar.example.com the
>> client MUST verify that the server certificate for the TLS connection it
>> considers re-using has an SubjectAltName of bar.example.com, does that
>> resolve your concerns. If not, please explain the concern further.
> You understood what I intended, and your resolution looks sufficient.

Added now with the following text in 19.2:

There exist a potential security vulnerability when reusing TCP and TLS
state for different resources (URIs). If two different host names points
at the same IP address it can be desirable to re-use the TCP/TLS
connection to that server. In that case the RTSP agent having the
TCP/TLS connection MUST verify that the server certificate associated
with the connection has a SubjectAltName  matching the host name present
in the URI for the resource an RTSP request is to be issued for.


>>
>>
>>> The text talks about the option to queue S->C requests if there isn't a
>>> connection to the client available. Ostensibly, this means the request
>>> can go down some future connection. It's not clear how the server can
>>> tell the right client connected. In particular, when using rtsps, how do
>>> you prevent a malicious client from getting such a queued message that
>>> wasn't meant for him?
>>
>> Okay, this security issue I have totally missed but it is clearly
>> serious. I don't see any easy way of fixing this. Thus I would suggest
>> that we simply make it clear that a server MUST NOT queue the S->C RTSP
>> message, independent if they are requests PLAY_NOTIFY and TEARDOWN or
>> responses to client requests.
> Works for me. Does this mean you are removing cross-connection queueing
> altogether?

Yes, see separate email sent on June 24.

>>
>>
>>> Given that the text talks about queuing S-C requests, it should
>>> explicitly call out whether a server can queue a response if the
>>> connection the associated request arrived on is no longer available. I
>>> think what you want to say is that such a response must not be queued,
>>> and must be dropped.
>> Agreed, lets mandate that they are dropped.

Proposed in email on June 24.

>>
>>
>>> There are several places in the text that talk about using a 503
>>> response with a Retry-After header to push back on traffic from an
>>> element (the first is section 10.7).
>>> * It's not clear what the subject of a 503 is. Is it intended to be
>>> scoped to requests to the resource in the RURI of the associated
>>> request? Is it intended to be scoped to the domain in that resource? Or
>>> is it, like in SIP, intended to be scoped to the server issuing the
>>> response, independent of what the RURI contained?
>> Very good question. It is far from obvious what the best choice is. And
>> I think even talking only about URI related scope may not be the best.
>>
>> The case I have in mind is if a proxy that has several already
>> established RTSP sessions over a persistent connection. When a client
>> connected to the proxy requests to establish a new session the server
>> may have insufficient resource to handle the SETUP request and send a
>> 503 answer. However if another client already having an RTSP session for
>> the same resource want to terminate that session it would be strange to
>> refuse to process the message as it will actually free up resources.
>>
>> This makes me believe that you need to have a RTSP Session scope for any
>> request carrying a Session-ID and a general server, or host name scope
>> for non-associated that doesn't prevent established sessions to try.
>>
>> Thoughts on this?
> That seems like it might work - exploring the idea should get some
> WG cycles.


There are some changes proposed for how to handle multiple connections.
See email with subject: RTSP 2.0: Change of recommendation for multiple
connections to server

Then we have implemented updated text regarding 503 which clarifies its
scope. And also added the 553 response.

10.7.  Overload Control

   Overload in RTSP can occur when servers and proxies have insufficient
   resources to complete the processing of a request.  An improper
   handling of such an overload situation at proxies and servers can
   impact the operation of the RTSP deployment, and probably worsen the
   situation.  RTSP defines the 503 (Service Unavailable) response
   (Section 17.5.4) to let servers and proxies notify requesting proxies
   and RTSP clients about an overload situation.  In conjunction with
   the Retry-After header (Section 18.42) the server or proxy can
   indicate the time after the requesting entity can send another
   request to the proxy or server.

   There are two scopes of such 503 answers, one for established RTSP
   sessions, where the request resulting in the 503 response as well as
   the response carries a Session header identifying the session which
   is suffering overload.  This response only applies to this particular
   session.  The other scope is the general RTSP server as identified by
   the host in the request URL.  Such a 503 answer with any Retyr-After
   header applies to all non-session specific requests to that server,
   including SETUP request intended to create a new RTSP session.

   Another scope for overload situation exists, which is the RTSP proxy.
   To enable an RTSP proxy to signal that it is overloaded, or otherwise
   unavailable and can't handle the request, a 553 response code has
   been defined with the meaing "Proxy Unavailable".  Also for proxies
   there is a separation in response scopes between requests associated
   with existing RTSP sessions, and requests to create new sessions or
   general proxy requests.

   Simply implementing and using the 503 (Service Unavailable) and 553
   (Proxy Unavailable) is not sufficient for properly handling overload
   situations.  For instance, a simplistic approach would be to send the
   503 response with a Retry-After header set to a fixed value.
   However, this can cause the situation where multiple RTSP clients
   again send requests to a proxy or server at roughly the same time
   which may again cause an overload situation, or if the "old" overload
   situation is not yet solved, i.e., the length indicated in the Retry-
   After header was too short.

   An RTSP server or proxy in an overload situation must select the
   value of the Retry-After header carefully and bearing in mind its
   current load situation.  It is REQUIRED to increase the timeout
   period in proportion to the current load on the server, i.e., an
   increasing workload should result in an increased length of the
   indicated unavailability.  It is REQUIRED to not send the same value
   in the Retry-After header to all requesting proxies and clients, but
   to add a variation to the mean value of the Retry-After header.

   A more complex case may arise when a load balancing RTSP proxy is in
   use, i.e., where an RTSP proxy is used to select amongst a set of
   RTSP servers to handle the requests, or when multiple server
   addresses are available for a given server name.  The proxy or client
   may receive a 503 (Service Unavailable) or 553 (Proxy Unavailable)
   from one of its RTSP servers or proxies, or a TCP timeout (if the
   server is even unable to handle the request message).  The proxy or
   client simply retries the other addresses or configured proxies, but
   may also receive a 503 (Service Unavailable) or 553 (Proxy
   Unavailable) response or TCP timeouts from those addresses.  In such
   a situation, where none of the RTSP servers/proxies/addresses can
   handle the request, the RTSP agent has to wait before it can send any
   new requests to the RTSP server.  Any additional request to a
   specific address MUST be delayed according to the Retry-After headers
   received.  For addresses where no response was received or TCP
   timeout occurred, an initial wait timer SHOULD be set to 5 seconds.
   That timer MUST be doubled for each additional failure to connect or
   receive response until the value exceeds 30 minutes when the timers
   mean value may be set to 30 minutes.  It is REQUIRED to not set the
   same value in the timer for each scheduling, but instead to add a
   variation to the mean value, resulting in picking a random value
   within the range of 0.5 to 1.5 of the mean value.



>>
>>
>>> * If the intent is that the 503 talks about the server, then you should
>>> clarify that a proxy doesn't simply forward 503 responses (after
>>> rewriting CSeqs), and should probably have a response of its own.
>>> Otherwise, clients that might be talking to two different servers
>>> through one proxy would lose access to both of them when one of the
>>> servers 503ed.
>> If we us a host and session scope then this issue would not be present.
>> However, if the proxy is actually overloaded that still needs its own
>> 552 Proxy Unavailable response with the same scope rules as for the 503,
>> but where unassociated requests concerns sending to the proxy at all.
> If you build one of these, please be sure to highlight the impact of the
> other sessions already established, and call out the potential for
> problems if you forward one as a Proxy, as opposed to generating your
> own based on the situation.

See above!

>>
>>> Section 4.9.1 lists values the Seek-Style header can take, but 18.45
>>> lists a completely different set (which most of the rest of the document
>>> uses). Should 4.9.1 be changed to use the values in 18.45? Are the right
>>> strings being used in sections 13.4.4 through 13.4.6? Those appear to be
>>> using strings from 4.9.1.
>> Yes, clearly an inconsistency issue that needs to be resolved.

This has been address and are now consistent.


>>
>>> The document will not stand if you delete some of the appendices. They
>>> aren't supplementary material. Please consider restructuring the
>>> normative sections back into the main document, or clearly identifying
>>> which ones define protocol and which are background information.
>> I would like to characterize this differently. I think you will have a
>> working protocol of RTSP, but you can't use it for anything. This as you
>> will have no media transport (C), no media description protocol (D), and
>> no parameters format (F). But, these appendixes are replaceable with
>> other protocol solutions.
>>
>> The Introduction section (1) says:
>>
>>                                   The appendixes describe and define some
>>     functionalities that are not part of the core RTSP specification, but
>>     which are still important to enable some usages.  Among them, the RTP
>>     usage is defined in Appendix C and the SDP usage with RTSP is defined
>>     in Appendix D, which are two mandatory appendixes.
>>
>> I note that we should add F to this list.
>>
>> I think we should be clear in each of this appendices that if one
>> support Foo for the purpose of bar then this appendix defines
>> normatively how one does it.
> Makes my head swim, but maybe it's must me.
> 
> fwiw - I'm still worried that there are information in Appendix B that's
> not captured in the main text, but I can't find easy things to point to.
> Elwyn seems more comfortable that everything is covered.

Some minor changes has been applied to correct some minor errors. But I
guess we may need a note in the write-up.

>>
>>
>>> Section 15 talks about a "transparent' proxy, but there is no
>>> description in this document of what protocol such a thing should
>>> follow. What bad thing happens if you remove all mention of
>>> "transparent" proxies from the document? As far as I can tell, that
>>> won't affect the protocol definition at all.
>> Not really, there is no definition of transparent proxies currently.
>> There is one security concern that make require some word smithing if we
>> remove transparent proxies.
>>
>> >From my perspective a transparent proxy is something that hijacks a TCP
>> connection towards an RTSP server to be a proxy between client and
>> server. Further is not detectable from the client's or the servers
>> perspective, but still may modify RTSP messages within the bounds of the
>> RTSP protocol.
>>
>> But, in reality as we have proxies that are visible we should focus on
>> those and forget this bastard version.

Yes, now we only discuss real proxies, except in one introductory
place where we make clear that we don't define "transparent" proxies.

>>
>>> The list of steps for establishing an SRTP cryptographic context in
>>> C.1.4.1 says "This specification does not specify an explicit method for
>>> indicating this SRTP cryptographic context establishment method, but
>>> future specifications may." in the context of looking at the SDP. SDP
>>> _has_ methods of indicating what keying mechanism is used with SRTP -
>>> are you talking about something different?
>> I think you are considering the methods for keying SRTP that are
>> Offer/Answer dependent. The only RTSP SDP using method that exist is the
>> one defined in RFC 4567, which we are explicit on not using.
>>
>> Why doesn't this section say
>>> something like "the use of SRTP with RTSP is only defined with MIKEY
>>> with keys established as defined in this section. Future documents may
>>> talk about how an RTSP implementation might treat SDP that indicates
>>> some other key mechanism be used"?
>> Yes, that is appears better, but we will have to make it clear that is
>> is regarding RTSP 2.0. Must also think if RFC 4567 needs to be worked
>> into that sentence.

This has been been changed along the lines proposed.


   1.   The client determines that SAVP or SAVPF shall be used from
        media description format, e.g., SDP.  If no other key management
        method is explicitly signalled, then MIKEY SHALL be used as
        defined herein.  The use of SRTP with RTSP is only defined with
        MIKEY with keys established as defined in this Section.  Future
        documents may define how an RTSP implementation treats SDP that
        indicates some other key mechanism to be used.  The need for
        such specification include [RFC4567] that is not defined for use
        in RTSP 2.0 within this document.



>>
>> Could you provide an example in the
>>> document of an RTSP message carrying SDP reflecting the use of SRTP as
>>> defined in this document?
>> The point is that the only difference is that he RTP profile is SAVP/RTP
>> or SAVPF/RTP in the SDP. Thus making such an SDP isn't difficult.
>> Question is if it provides a benefit?
> I think it would be worth the extra space it would take up.

I have added a complete establishment example for secure media. This
include a redirect to a rtsps URI and then establishing using MIKEY.


>>
>>
>>
>>> Minor Issues
>>>
>>> The document uses the notion of a "control connection" (it appears first
>>> in section 2.5) without defining what that is, or what kind of
>>> connections you might have that aren't control connections.
>> The "control connection" is the connection established for sending RTSP
>> messages on it. I agree it is undefined and could likely be replaced by
>> the "RTSP connection" or "connection for RTSP messages"

All instances of control connection has been removed and a bit of extra
introduction in Section 10 Connections clarifies the use of connection
in this document.

>>
>>> The update to the registration of the rtsp and rtsps schema call out
>>> that there are changes that can result in interoperability issues. It
>>> doesn't say what the issues are, or who might encounter them. I can
>>> infer that the point is that there might be problems if a URI following
>>> this updated registration were to be processed by an RTSP 1.0
>>> implementation (or any other application that relied on the previous
>>> definition). It would be better to say that explicitly, and talk about
>>> how a previous implementation is likely to act when presented with a URI
>>> that exercised these new changes.
>> I have gotten these comment elsewhere and have prepared a text update
>> for section 4.2:
>>
>>     The details of the syntax of "rtsp" and "rtsps" URIs has been changed
>>     from RTSP 1.0.  These changes are:
>>
>>     o  Support for IPV6 literal in host part and future IP literals
>>        through RFC 3986 defined mechanism.
>>
>>     o  A new relative format to use in the RTSP protocol elements that is
>>        not required to start with "/".
>>
>>     Neither should have any significant impact on interoperability.  If
>>     one is required to use IPv6 literals to reach an RTSP server, then
>>     that RTSP server must be IPv6 capable, and RTSP 1.0 is not a fully
>>     IPv6 capable protocol.  If an RTSP 1.0 client attempts to process the
>>     URI it will not match the allowed syntax and be considered invalid
>>     and processing will be stopped.  This is clearly a failure to reach
>>     the resource, however it is not a signification issue as RTSP 2.0
>>     support was needed anyway in both server and client.  Thus failure
>>     will only occur in a later step when there is a RTSP version
>>     mismatch between client and server.  The second change will only
>>     occur in RTSP messages, that are explicitly identified as being RTSP
>>     2.0 messages, thus a RTSP 1.0 only agent will not be required to
>>     parse this variant.
>>
>> Clear enough?
> Maybe. In the last sentence, are you saying you would never see a relative
> URL in a request URI? 

Correct. Requests must use absolute URIs.

If you're not already saying that explicitly in
> the document
> (you might be) please consider doing so. Saying it that way in this text
> would
> also help.

Clarified text:
The second change will only occur inside RTSP message headers, as the
request URI must be an absolute URI. Thus such usages are occurring
after agents has accepted processing RTSP 2.0 messages, and an RTSP 1.0
only agent will not be required to parse such types of relative URIs.



>
>>   (It's not clear to me that all of the
>>> thread at www.ietf.org—msg01567.html
>>> <http://www.ietf.org/mail-archive/web/uri-review/current/msg01567.html>
>>> concluded - I see how the fragments question ended, but what about
>>> things like the addition of IPV6 literals? In particular, I'm not
>>> finding a response where Ted Hardie agreed that the potential for
>>> interoperability failure had been adequately addressed).
>> I talked to him in person about this just after the discussion to better
>> understand his comments. If we want a confirmation I think we need to
>> loop him into a discussion regarding this particular issue.
> I suggest the shepherd/AD double-check with him if he doesn't jump into
> this thread before.
>>
>> I provided a clarification to the designated URI reviewer which accepted
>> the request.

No additional information about this.

>>
>>>
>>> I think you've said something different than you mean in 5.4 item 1. I
>>> think you mean to say that an RTSP implementation would ignore any body
>>> that happened to come in message that MUST NOT contain one. What you've
>>> said is that the part of the parser that's doing framing has to stop
>>> framing at the end of the headers, and that such an errant body would be
>>> parsed as a separate message. As written this would keep someone from
>>> using an Internet Message Format parser since it would have to ignore
>>> any Content-Length that might have appeared, even though it wasn't
>>> supposed to.
>> Yes, it is clearly sufficient to ignore the body, and likely much better
>> from an error handling consideration.
>>
>> We will propose a text change.

The result of thinking what this section was supposed to say. Made me
make a major restructuring of 5.4, but also to add text in 5.3 about the
discarding unexpected message bodies.


5.3.  Message Body

   The message body (if any) of an RTSP message is used to carry further
   information for a particular resource associated with the request or
   response.  An example of a message body is a Session Description
   Protocol (SDP) message.

   The presence of a message body in either a request or a response MUST
   be signaled by the inclusion of a Content-Length header (see
   Section 18.16) and Content-Type (see Section 18.18).  A message body
   MUST NOT be included in a request or response if the specification of
   the particular method (see Method Definitions (Section 13)) does not
   allow sending a message body.  In case a message body is received in
   a message when not expected the message body data SHOULD be
   discarded.  This is to allow future extensions to define optional use
   of message body.


5.4.  Message Length

   RTSP Messages that doesn't contain any message body is terminated by
   the first empty line after the header fields (Note: An empty line is
   a line with nothing preceding the CRLF.).  In RTSP messages that
   contains message bodies the empty line is followed by the message
   body.  The length of that body is determined by the value of the
   Content-Length header (Section 18.16).  The headers value represents
   the length of the message-body in octets.  If this header field is
   not present, a value of zero is assumed, i.e. no message body present
   in message.  Unlike an HTTP message, an RTSP message MUST contain a
   Content-Length header whenever it contains a message body.  Note that
   RTSP does not support the HTTP/1.1 "chunked" transfer coding (see
   [H3.6.1]).

      Given the moderate length of presentation descriptions returned,
      the server should always be able to determine its length, even if
      it is generated dynamically, making the chunked transfer encoding
      unnecessary.



>>
>>
>>> In section 10.4, it looks like a server can keep an RTSP transaction
>>> pending forever if it sends 100 responses often enough. I assume the
>>> client's recourse if it doesn't want to remain involved is to close the
>>> connection. If that's right, it's worth calling it out explicitly in
>>> this section.
>> This is likely a good suggestion, and works fine if the client simply
>> wants to abort the request and is anyway abandoning the RTSP session.
>> However, the question is what to do if just the request becomes
>> irrelevant and instead want to do something else with the RTSP session.
>> A single client may abandon the connection, open a new one and issue a
>> request, to a potentially undetermined session state. Yet another
>> complexity is what a proxy does that has multiple RTSP sessions on the
>> same server. Here the rules for processing in order the different
>> requests and their relation to answers in the same order.
>>
>> This makes me want to weaken the recommendation on re-using an
>> connection for multiple RTSP sessions.

So the text now reads:

   A requester SHOULD wait at least 10 seconds for a response before
   concluding that the responder will not be responding to its request.
   After receiving a 100 response, the requester SHOULD continue waiting
   for further responses.  If more than 10 seconds elapses without
   receiving any response, the requester MAY assume that the responder
   is unresponsive and abort the connection by closing the TCP
   connection.

      Note: In cases multiple RTSP sessions share the same transport
      connection, abandoning a request closing the connection may have
      significant impact on those other sessions.  First of all, other
      RTSP requests may have become queued up due to the request taking
      long time.  Secondly also those sessions loose the possibility to
      receive server to client requests.  To mitigate that situation the
      RTSP agent should establish a new connection and send any queued
      up and non-responded requests on this new connection.  Secondly,
      to ensure that the RTSP server knows which connection that is
      valid for a particular RTSP session, the RTSP agent should send a
      keep-alive request, if no other request will be sent immeditely
      for that RTSP session, for each RTSP session on the old
      connection.  The keep-alive request will normally be a
      GET_PARAMETER with a session header to inform the server that this
      agent cares about this RTSP session.

   A requester SHOULD wait longer than 10 seconds for a response if it
   is experiencing significant transport delays on its connection to the
   responder.  The requester is capable of determining the round trip
   time (RTT) of the request/response cycle using the Timestamp header
   (Section 18.51) in any RTSP request.

      10 seconds was chosen for the following reasons.  It gives TCP
      time to perform a couple of retransmissions, even if operating on
      default values.  It is short enough that users may not abandon the
      process themselves.  However, it should be noted that 10 seconds
      can be aggressive on certain type of networks.  The 5 seconds
      value for 1xx messages is half the timeout giving a reasonable
      chance of successful delivery before timeout happens on the
      requester side.

> Are there also considerations here wrt pipelining?

I think the above brings up the main consideration regarding pipelining.

>>
>>
>>> Somewhere, probably in section 15.2, you should be explicit that a proxy
>>> that is multiplexing requests MUST keep the requests in the same order
>>> as they are folded together. You can infer that, or things simply break,
>>> but saying it explicitly would be better.
>> Probably, as a clarification to what is already present in section 18.19
>> (CSeq header)
>>
>>     Proxies that aggregate several sessions on the same transport will
>>     have to ensure that the requests sent towards a particular server
>>     have a joint sequence number space, i.e., they will regularly need to
>>     renumber the CSeq header field in requests (from proxy to server) and
>>     responses (from server to proxy) to fulfill the rules for the header.
>>     The proxy MUST increase the CSeq by one for each request it
>>     transmits, without regard of different sessions.
>>

See separate email on this as this connects to the other issues around
the sequence number.

>>
>>> Both GET_PARAMETER and SET_PARAMETER are listed as keep-alive methods in
>>> 10.5, but the note in section 13 on table 7 only uses that as a reason
>>> for requiring SET_PARAMETER. Why doesn't it also apply to GET_PARAMETER?
>>> And why is this only required at servers? "Required" in this section
>>> means Mandatory to Implement, I think. If that's right, it should be
>>> made explicit. If that's not right, what does it mean?
>> Yes, required is Required to implement in the server. The GET_PARAMETER
>> is not required as only one method for keep-alive is necessary. Thus,
>> the ones that needs to use GET/SET_PARAMETER for keep-alive will have to
>> choose SET_PARAMETER.
>>
>> It is only required at the server, as it is in the client implementation
>> choice of how to ensure keep-alive works. As this is also dependent on
>> the media transport support one has, the client may not need a method
>> based keep-alive.
>>
>> Clarifying "Required" should be straightforward.

Added text both in 13 and 10.5.

>>
>>> Section 13.8 makes a good argument for always putting parameters to be
>>> retrieved in a body. Why are you keeping the complexity of also allowing
>>> them in headers?
>> Some arguments are probably lost in the passage of time. However, the
>> headers specified to be suitable for inclusion in a GET_PARAMETER
>> requests are used for providing these information also in other methods,
>> thus we have not wanted to duplicate the representation of this
>> information in both a body and a header form.

Answered and no action planned for this.

>>
>>> Section 13.10: "That should not provide any benefit." is not clear - can
>>> you expand it a little?
>>     If the REDIRECT request times out following the rules in Section 10.4
>>     the server MAY terminate the session or transport connection that
>>     would be redirected by the request.  This is a safeguard against
>>     misbehaving clients that refuse to respond to a REDIRECT request.
>>     That should not provide any benefit.
>>
>> The intention here is to make clear that there shouldn't be an incentive
>> in the protocol to not acknowledge a REDIRECT request and instead simply
>> go on as it wasn't received or seen. Thus, we want to make clear that
>> the server may simply terminate the session in those cases.
>>
>> I propose we change this sentence to:
>>
>> Thus, removing any incentive to not acknowledge the reception of a
>> REDIRECT request.
>>
>> Edited In

Done

>>
>>> In Section 13.10 you talk about clients _sending_ media (search for
>>> "send or receive media"). Do you mean anything more than possibly RTCP?
>>> Can you make that clear in the section?
>> You mean this sentence:
>>
>>     After a REDIRECT request has been processed, a client that wants to
>>     continue to send or receive media for the resource identified by the
>>     Request-URI will have to establish a new session with the designated
>>     host.
>>
>> The mentioning of send media is likely a RECORD reference. In this case
>> I don't see any issue with removing it.
>>
>> Edited In

Done

>>
>>> Section 15.2's second paragraph appears to be the only place the proxy
>>> rewriting of CSeq in order to multiplex requests is defined, and it is
>>> very loose. It would be easy for a reader to fail to recognize this as
>>> an interoperability requirement. Please consider expanding how this is
>>> specified when addressing the comment about above about keeping requests
>>> in relative order when multiplexing.

>> There are text in Section 18.19 CSeq also. But I do think I agree that
>> this should be clarified.

See above.

>>
>>> You follow the principle of saying a client should treat a response with
>>> an unknown response code, the same as it would treat the x00 of that
>>> class (e.g. 400 for an unknown 4xx). However, you do not define what a
>>> response code of 300 means. How is a client supposed to handle an
>>> unknown 3xx response?
>> Sorry, I don't quite get this comment. Section 17.3 says:
>>
>>     If a 3rr response is received for a request in relation to
>>     an established session, the client SHOULD send a TEARDOWN request for
>>     the session, and MAY reestablish the session using the resource
>>     indicated by the Location.
>>
>>     If the Location header is used in a response it MUST contain an
>>     absolute URI pointing out the media resource the client is redirected
>>     to, the URI MUST NOT only contain the host name.
>>
>> As explained above unknown 3XX codes will be 3rr codes, as 304 isn't
>> unknown.
>>
>> If you don't believe this is sufficient can you please be more explicit
>> about the issue?
> Sure. It might be quickest if you look at the table of contents.
> Note that you define 100 in 17.1.1, 200 in 17.2.1, 400 in 17.4.1, 500 in
> 17.5.1, but you do not define 300 anywhere - you jump straight to 301.
> Please add a section defining it, or declaring that you will never see a
> literal 300 on the wire, but if you did you would do (what you quote
> above) and nothing else.

I think adding an exception to treat the unknown 3xx code as a 302, i.e.
a temporarily move makes sense for the 3rr codes.

First half of the paragraph after reformulating it:

RTSP status codes are extensible. RTSP applications are not required to
understand the meaning of all registered status codes, though such
understanding is obviously desirable. However, applications MUST
understand the class of any status code, as indicated by the first
digit, and treat any unrecognized response as being equivalent to the
x00 status code of that class, with an exception for unknown 3xx codes,
which MUST be treated as a 302 (Found). The reason being that no 300
(Multiple Choices in HTTP) is defined for RTSP. An response with
unrecognized status code MUST NOT be cached


> 
>>
>>> As written, a client and server can use HTTP Basic authentication over
>>> TCP that is not protected with TLS. Consider restricting it's use to TLS
>>> only. Are you sure you don't need to say anything RTSP specific about
>>> DIGEST computations (I don't think you need to go as far as SIP did
>>> talking about DIGEST, but I'm surprised you haven't run into issues
>>> relying only on 2617 literally.
>> Are you referring to Section 19.1 here?
> Yes
>>
>> Yes, I would not have any issue with requiring Basic to be combined with
>> TLS. I think that is appropriate.

Added to 19.1:

Any RTSP message containing an Authorization header containing a basic
authorization MUST be using a TLS connection with confidentiality
protection enabled, i.e. no NULL encryption.

>>
>> When it comes to DIGEST, are you referring to section 22.4 in RFC 3261?
> Yes
>>
>> That section indicates that some clarifications are likely needed.

Okay, this was a big rathole. Actually found that we where missing two
headers in addition to that some recommendations are needed. Posting a
separate review message on this one.


>>
>>>
>>> How does 411 Length Required for this protocol make sense? Given that
>>> you've restricted the protocol to TCP and require the Content-Length
>>> header to be present if there is a body, in what circumstance would a
>>> server need to send a 411?
>> It really should occur for malformed messages, which we could use 400 as
>> response. So yes, 411 could be removed.

Removed.

>>
>>>
>>> Section 18.19 requires senders to increment CSeq by 1. We have a
>>> reliable transport with no request retransmission, so there should never
>>> be gaps at the receiver. Should the receiver check and react some way if
>>> there are gaps? I think you should explicitly tell them not to even
>>> look. If you agree, why is incrementing by one important as long as you
>>> are always strictly increasing?
>> I agree that for TCP or other reliable transports the receiver
>> SHOULD/SHALL ignore gaps. For any future specification of an unreliable
>> transport of RTSP messages this would be needed. As noted in Appendix G,
>> CSeq is retained for future support of unreliable transport.

Please see separate email on this.

>>
>>> You call out several places where RTCP is essential to allow RTSP using
>>> RTP to work correctly, yet section C.1.2 sets up conditions where RTCP
>>> MUST NOT be sent. Why are you allowing those instead of treating the
>>> conditions you describe as errors?
>> Good question. I think it is a case we must ensure that you can
>> negotiate and configure your desired way, without really considering if
>> it should be allowed at all. I think mandating usage of RTCP with RTP
>> for RTSP 2.0 would be good. But, I think that needs to be verified with
>> the WG.
> Ack


This was actually already mandated in C.1.6. We have made this clearer
by including a re-statement and a reference from the AVP/UDP
profile definition.

However, this made me turn my eyes on C.1.6.3 Bit-rate adaption. As we
know have circuit breakers in the process I think it is appropriate to
reference that as the outer envelope an adaptation mechanism must keep
within. See separate email to MMUSIC list.

Magnus Westerlund

----------------------------------------------------------------------
Multimedia Technologies, Ericsson Research EAB/TVM
----------------------------------------------------------------------
Ericsson AB                | Phone  +46 10 7148287
Färögatan 6                | Mobile +46 73 0949079
SE-164 80 Stockholm, Sweden| mailto: magnus.westerlund@ericsson.com
----------------------------------------------------------------------