Re: [MMUSIC] Spencer Dawkins' Yes on draft-ietf-mmusic-sdp-mux-attributes-14: (with COMMENT)

Suhas Nandakumar <suhasietf@gmail.com> Wed, 26 October 2016 04:11 UTC

Return-Path: <suhasietf@gmail.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DD221293F0; Tue, 25 Oct 2016 21:11:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YqisE3Xg3_ae; Tue, 25 Oct 2016 21:11:15 -0700 (PDT)
Received: from mail-yw0-x229.google.com (mail-yw0-x229.google.com [IPv6:2607:f8b0:4002:c05::229]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1406B12945C; Tue, 25 Oct 2016 21:11:15 -0700 (PDT)
Received: by mail-yw0-x229.google.com with SMTP id h14so127267ywa.2; Tue, 25 Oct 2016 21:11:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=iw92BNUy5Qx++bY3CRNFkBz1mR2sUAfzELZV5RrraLs=; b=KXj7Y5zxt5Ato3xr57ttSqRRtfh2G0X4tcF3atzrIhoS5Ixmgw0w+kOktW4OncVU0F Yu9kI/rLJvmY/rgz2oODUR9+JYDEazQAG4A886gkIob69+KSyoUz1CJsChQVinHwZJC3 yYvEa1Pt981uV9R6t7XYAyElD4Wlma9Lhc9PkH2xoaR2il1NdnS4LXnWNhmFfGHPMIq+ PtwLqq0apfcB0JPge+CyxBQzOtuY9mQsYofnC1qxbCi9ejK28tg1KjjUBxAite1OCpsx L55yjgUnNbU0Q4XZKeREq5A4nQwXjgi39IaJQbTO8LRZFxyXV0hFCV8sjtzNBkrSo89y ySwg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=iw92BNUy5Qx++bY3CRNFkBz1mR2sUAfzELZV5RrraLs=; b=m4ZUqHWULvRd6iLOqCkblqb3PW7RUsNdNuwjsGi4zYc0kpIcd1z5PqAkwMxtRXCrga bAImqiB+pe9KasVRs0cbbjSWjly2ghrvQSCQmExJpRQLSJbPpKWf+hnmYCFNWJVqku/F we4BuJa4i+ZZr/QYd45gy6+rRlK15vU20EgKr3aZqAYCr76ZdLIFUOFykKXsf24pwBbC oj+Lu2TOiLG9kzGWMYENDZQLK3y3ZaVvTXABhn26tmAh7yKxTRiRSbQ563RtdkIQ2XnC ObR/8MWZaIJWVe7rQMj2XHIeV6USr/WAbIVXIlfkok5zxNHoD5dy/MQKXC8dyAcQ6PjP cRpA==
X-Gm-Message-State: ABUngvcvjYhLseyBUU95KWEhBBOei7iCKjz/4xpnDbFGZq4PDwE4jRZnXBH2OohNHohn82pA/yXQESyJo5as/g==
X-Received: by 10.13.218.65 with SMTP id c62mr89256ywe.270.1477455074289; Tue, 25 Oct 2016 21:11:14 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.129.158.73 with HTTP; Tue, 25 Oct 2016 21:11:13 -0700 (PDT)
In-Reply-To: <CAKKJt-cTAAiFa-TTwB70oxo2ia25QGrBwFacJkarnOD=NEtqBQ@mail.gmail.com>
References: <147742756171.8565.11705230224719531567.idtracker@ietfa.amsl.com> <5A934910-073D-46A9-866C-EFA63956F3F3@iii.ca> <CAKKJt-cTAAiFa-TTwB70oxo2ia25QGrBwFacJkarnOD=NEtqBQ@mail.gmail.com>
From: Suhas Nandakumar <suhasietf@gmail.com>
Date: Tue, 25 Oct 2016 21:11:13 -0700
Message-ID: <CAMRcRGTaexMuirQS=O=YWOUb379iyrPxKvWdvdzSTseX=WOGsQ@mail.gmail.com>
To: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Content-Type: multipart/alternative; boundary="94eb2c080508e0179e053fbcd078"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/cwenYGWi_vTSXFJQWlOwb8OIkqU>
Cc: mmusic-chairs@ietf.org, draft-ietf-mmusic-sdp-mux-attributes@ietf.org, The IESG <iesg@ietf.org>, Cullen Jennings <fluffy@iii.ca>, mmusic WG <mmusic@ietf.org>
Subject: Re: [MMUSIC] Spencer Dawkins' Yes on draft-ietf-mmusic-sdp-mux-attributes-14: (with COMMENT)
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Oct 2016 04:11:17 -0000

Thanks Spencer for the review and Thanks Cullen for the inputs.

Given the discussion above, I can update the security considerations
section as suggested by Spencer and generate a new version whenever it is
appropriate and just to double check on the outcome - the category TBD stay
as it is.

Spencer, please advise if i misunderstood anything

Ben, please let me know procedures on generating the next version.

Cheers
Suhas

On Tue, Oct 25, 2016 at 8:15 PM, Spencer Dawkins at IETF <
spencerdawkins.ietf@gmail.com> wrote:

> Hi, Cullen,
>
> On Tue, Oct 25, 2016 at 8:32 PM, Cullen Jennings <fluffy@iii.ca> wrote:
>
>>
>> > On Oct 25, 2016, at 1:32 PM, Spencer Dawkins <
>> spencerdawkins.ietf@gmail.com> wrote:
>> >
>> > Spencer Dawkins has entered the following ballot position for
>> > draft-ietf-mmusic-sdp-mux-attributes-14: Yes
>> >
>> > When responding, please keep the subject line intact and reply to all
>> > email addresses included in the To and CC lines. (Feel free to cut this
>> > introductory paragraph, however.)
>> >
>> >
>> > Please refer to https://www.ietf.org/iesg/stat
>> ement/discuss-criteria.html
>> > for more information about IESG DISCUSS and COMMENT positions.
>> >
>> >
>> > The document, along with other ballot positions, can be found here:
>> > https://datatracker.ietf.org/doc/draft-ietf-mmusic-sdp-mux-attributes/
>> >
>> >
>> >
>> > ----------------------------------------------------------------------
>> > COMMENT:
>> > ----------------------------------------------------------------------
>> >
>> > This document is a work of art. Thank you folks for accepting the
>> > challenge, because it's important.
>> >
>> > I have a couple of observations, to go along with my Yes ballot. Please
>> > do the right thing.
>> >
>> > I know Mirja also pushed on the TBD category, but I find RFC 2119
>> "SHOULD
>> > NOT" to be problematic.
>> >
>> >   The attributes in the TBD category have not been analyzed under the
>> >   proposed multiplexing framework and SHOULD NOT be multiplexed.
>> >
>> > The point of SHOULD (NOT) is that you don't do this unless you
>> understand
>> > the risks, and in this case, it seems to me that you don't know the
>> > risks. If you're determined to multiplex the TBD attribute "frommet=",
>> > won't you have to do your own analysis? Wouldn't that mean you might
>> make
>> > assumptions ("it's IDENTICAL") that conflict with the analysis other
>> > implementers are doing ("it's TRANSPORT")?
>> >
>> > I could imagine a couple of approaches that might be helpful here.
>> >
>> > Saying "MUST NOT be multiplexed" would avoid implementers doing their
>> own
>> > analysis and coming up with conflicting answers. Is it obvious why this
>> > is "SHOULD NOT" instead of "MUST NOT"? In other words, who needs to
>> > multiplex TBD attributes, and why?
>> >
>> > Saying "cannot be assumed to be safe when multiplexed" probably captures
>> > what I think you are saying. ''
>>
>> Yes, I think your summary is about right here. For better or worse the
>> logic of SHOULD was that a later spec that correctly classified them could
>> put them in the right category. I don't know what would be the best (if
>> any) change to make to the spec but I wanted to agree with your
>> understanding.
>
>
> "Do the right thing" :-)
>
>
>> >
>> > Would it be clearer if the category was called UNKNOWN?
>>
>> We were trying to capture that it was not that future specs would not be
>> able to figure out what to do with these, but more that this RFC had not
>> classified them.
>
>
> I'm pretty sure I'm stumbling over something that is less clear now than
> it will be when the working group is using this framework (so, this makes
> sense to me).
>
>
>> >
>> > In this text,
>> >
>> > 16.  Security Considerations
>> >
>> >   This document does not add any new security considerations beyond the
>> >   existing considerations in the RTP RFCs ([RFC3550] and [RFC3711])
>> >   that are referenced by this specification.
>> >
>> > I don't understand how the first paragraph ^^ and the third paragraph of
>> > the section are compatible, because you're referring to issues described
>> > in this specification. But if you delete the first paragraph, leaving
>> > only
>> >
>> >   The primary security for RTP including the way it is used here is
>> >   described in [RFC3550] and [RFC3711].
>> >
>> >   When multiplexing SDP attributes with the category "CAUTION", the
>> >   implementations should be aware of possible issues as described in
>> >   this specification.
>> >
>> > the security considerations would be consistent.
>>
>> Works For Me ... i think the text that is there goes back to early boiler
>> plate text we took from somewhere...
>>
>
> Cool - and thanks for considering my comments.
>
> Spencer
>
> _______________________________________________
> mmusic mailing list
> mmusic@ietf.org
> https://www.ietf.org/mailman/listinfo/mmusic
>
>