Re: [Moq] [EXTERNAL] Re: Encrypted Media Metadata

Ted Hardie <ted.ietf@gmail.com> Fri, 22 July 2022 14:08 UTC

Return-Path: <ted.ietf@gmail.com>
X-Original-To: moq@ietfa.amsl.com
Delivered-To: moq@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6696FC16ED18 for <moq@ietfa.amsl.com>; Fri, 22 Jul 2022 07:08:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.003
X-Spam-Level:
X-Spam-Status: No, score=-2.003 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id smBQRzNwS6Cm for <moq@ietfa.amsl.com>; Fri, 22 Jul 2022 07:08:13 -0700 (PDT)
Received: from mail-io1-xd35.google.com (mail-io1-xd35.google.com [IPv6:2607:f8b0:4864:20::d35]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DC5EC14F73D for <moq@ietf.org>; Fri, 22 Jul 2022 07:08:13 -0700 (PDT)
Received: by mail-io1-xd35.google.com with SMTP id l24so3694717ion.13 for <moq@ietf.org>; Fri, 22 Jul 2022 07:08:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=7xs9C96u/jST5kJ8UGbkSWZ20N0g9cwoLFIh1MT9cYc=; b=P07Ucgx3CUnk2NmUveC52R1c+vC8/nu5JHZUfhSsciUC1fjNRx4c8kUT/LldQ0cI2P xF4MJbi/JHkvNhXS5d7M+Z3fwzNs0kdCsouJ6qOhuq0JomnmfQwnmGNopWoMyYL9TetA /OIjvS3GiYL3p2lj+GPvTAZtCL66Ixckh7ADyy0PxYIWJZw+l/8H214zWU0gxY8yCClp gkE+adaIDNv7QuypOgsJwKDZAXzP5ZqDpKlQSpDUF5YOMc5jPJYEC23Q2+4SZrkxjVep wZxQTKP4c8BiLc9ayEzipoj6SXrZP/VGF2i6Pk+102JFtOj08LgrLNjadG0+KTdLh2nt Mcug==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=7xs9C96u/jST5kJ8UGbkSWZ20N0g9cwoLFIh1MT9cYc=; b=lrS60cDSjXjZAbc36FzgSjs89xTTLofkocKur+pdbRIBKFaJuO6pEM0aHPEB3LWQVV 1z+6MIhhIeZHIXg1AJbjIyjArgq/6P4wi1jy+P+7j6+2eCL3gVKJ3nVfKgFYv3pb6iKa ueroet3GJHEf+RqKESR1bVp1/2BvQVn5cGqZhyvBg2QLBcVc7jlCrQGJ34pH7rwfZ7a9 T1drJ2gcEorINovLOIsTFNmdFFut0rxxkiTBxTu6Hm14tLrffS1GJrF+eV7bVilJ0T9I Kn904swNO//BILB/B0WOSSM5GQx+nxLDipx3zFFMGDRXy0/d0c/yFA+92Hm+j5mSfYZP Zztw==
X-Gm-Message-State: AJIora/lS+6DN/VBKILM1wkqpUGd+gyDzj0cwAaPqJ6Ikf7dPWexBSNA 7HplGu1teSLPrB5nMUhUqBweGSnsOxoNsSbFaVQ=
X-Google-Smtp-Source: AGRyM1tpIWadakX2vdthHxj4jcAyTQLm1qxLYzH0P1h/a2q3sMcxjFa0j8RofrduqAGTS64Lpzzg095U/NQ4S1EZVjE=
X-Received: by 2002:a05:6602:2c0c:b0:669:c1a9:245c with SMTP id w12-20020a0566022c0c00b00669c1a9245cmr326782iov.218.1658498892474; Fri, 22 Jul 2022 07:08:12 -0700 (PDT)
MIME-Version: 1.0
References: <LV2PR11MB604522717FFF34A5D066A9EEEA8D9@LV2PR11MB6045.namprd11.prod.outlook.com> <CA+9kkMC+Zx-a=WLo+zQuw3f1=JnEGUKTR3pF2ONt94L_eZYVoA@mail.gmail.com> <LV2PR11MB6045416F5B2A573D5A740E34EA919@LV2PR11MB6045.namprd11.prod.outlook.com> <CA+9kkMAsRi8jRWavBC798N8KFG5BqT4_hPF89mpQUzTQcsqWog@mail.gmail.com> <LV2PR11MB6045F688C8B5B8C22374BEBDEA919@LV2PR11MB6045.namprd11.prod.outlook.com> <CAMRcRGQfyY385ys5bRdh5_exNbB6-MVMZx3VjBTrk3Jq-u=W7A@mail.gmail.com> <LV2PR11MB6045FE235BC7B032D1C89A0CEA919@LV2PR11MB6045.namprd11.prod.outlook.com>
In-Reply-To: <LV2PR11MB6045FE235BC7B032D1C89A0CEA919@LV2PR11MB6045.namprd11.prod.outlook.com>
From: Ted Hardie <ted.ietf@gmail.com>
Date: Fri, 22 Jul 2022 15:07:45 +0100
Message-ID: <CA+9kkMDZrLLGVBLnMVPQK9eOZjWoB+Oh0Ex2OObjkMYRzbyZ1A@mail.gmail.com>
To: "Deen, Glenn" <Glenn_Deen@comcast.com>
Cc: Suhas Nandakumar <suhasietf@gmail.com>, "Deen, Glenn" <Glenn_Deen=40comcast.com@dmarc.ietf.org>, "MoQ@ietf.org" <moq@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000058b0e505e4655d7c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/moq/dgkK442h21pjrl6JLtZ8mYRY7iQ>
Subject: Re: [Moq] [EXTERNAL] Re: Encrypted Media Metadata
X-BeenThere: moq@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Media over QUIC <moq.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/moq>, <mailto:moq-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/moq/>
List-Post: <mailto:moq@ietf.org>
List-Help: <mailto:moq-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/moq>, <mailto:moq-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Jul 2022 14:08:17 -0000

Howdy,

Snipping a bunch to focus on thing:

On Thu, Jul 21, 2022 at 9:41 PM Deen, Glenn <Glenn_Deen@comcast.com> wrote:

>
> Metadata is any data that is not the core media data stream. For instance
> EIDR IDs for the content would be content data as could be things like age
> ratings date first released and even artwork for display in guides.
>
> Encoding data could be info about the encoded media. Remember the encoded
> media may be encrypted and so metadata is used to tell info about the media
> without requiring decrypting the media.
>
> The charter currently says:

The working group will define MoQ so that the media publication protocol
can leverage on-path relays, caches or replication points wherever
applicable to improve the delivery performance. Media will be encrypted,
possibly end-to-end encrypted for certain use cases. The keying mechanisms
for media confidentiality is however outside the scope of this working
group. Even when media is end-to-end encrypted, the relays can access
metadata needed for caching (such as timestamp), making media forwarding
decisions (such as drop or delay under congestion) and so on.

My understanding, though, is that the unencrypted metadata mentioned are
focused on those required for effective delivery; that's why the examples
in that section are timestamps and media forwarding based on congestion.
Unencrypted metadata about the content seems to me a different class of
data.  EIDR is, for example, basically a mapping to the content identity.
That data I would expect to be part of the encrypted part of MoQ for
privacy reasons; I'd expect the same for closed captions, for the same
reason.    To speak frankly, given the privacy concerns in relation to QUIC
(hello, spin-bit enthusiasts), I really don't see those being unencrypted
as likely to fly.

I propose we update this as follows:
OLD:

Media will be encrypted, possibly end-to-end encrypted for certain
usecases. The keying mechanisms for media confidentiality is however
outside the scope of this working group. Even when media is end-to-end
encrypted, the relays can access metadata needed for caching (such as
timestamp), making media forwarding decisions (such as drop or delay under
congestion) and so on.

 NEW

Media and content-specific metadata such as EIDR and age rating will be
encrypted, possibly end-to-end encrypted for certain usecases. The keying
mechanisms for their confidentiality is however outside the scope of this
working group. Even when media is end-to-end encrypted, the relays can
access metadata needed for caching (such as timestamp), making media
forwarding decisions (such as drop or delay under congestion) and so on.

That gets us a specific mention of the content-specific metadata, avoids
getting into a fight over privacy sensitive information, and re-confirms
that the metadata needed for forwarding decisions is available.

What do folks think?

Ted
>
>
>
> -glenn
>
>
>
> regards,
>
>
>
> Ted
>
>
>
>
>
> And add “metadata transport” as a bullet, so as to suggest that metadata
> is a first class data element being included.
>
>
>
> -glenn
>
>
>
> On 7/21/22, 2:16 AM, "Ted Hardie" <ted.ietf@gmail.com> wrote:
>
>
>
> Hi Glenn,
>
>
>
> I think I follow your core concern, but I'm a little confused about how to
> reflect it in the charter in ways that don't start to assume the solution
> space.  From your perspective are you looking for an elaboration to one of
> these bullets:
>
>
>
> The media publication protocol will be a push protocol for sending media
> including audio, video, and timed metadata, such as closed captions and cue
> points. The common protocol for publishing media over ingest and
> distribution will support:
>
> ·         one or more media formats,
>
> ·         an interoperable way to request media and encodings,
>
> ·         rate adaption strategies based on changing codec rates,
> changing chosen media encoding/qualities,
>
> ·         cache friendly media mechanisms
>
> So that they specifically mention the metadata in, for example, the bullet
> about requesting media and encodings?  Or are you looking to add a bullet
> here?
>
>
>
> If you have charter text in mind, or can develop some, that would be most
> helpful.
>
>
>
> thanks,
>
>
>
> Ted
>
>
>
> On Sun, Jul 17, 2022 at 2:10 PM Deen, Glenn <Glenn_Deen=
> 40comcast.com@dmarc.ietf.org> wrote:
>
> I get the sense from the proposed charter Media Metadata is currently
> treated sort of monolithically in terms of access to it, its
> encryptability, and its use in different workflows.  Metadata is quite rich
> as a part of the media delivery workflow and is getting increasingly
> important and extensive as media transport and media types evolve.  I
> propose that it needs more specific focus in the group.
>
>
>
> Metadata data and access to it is something that maybe should be
> considered a distinct type of media content on its own along with having
> distinct from the transported media authenticated access and encryption
> considerations that are independent of the media being transported.
>
>
>
> This could possibly be part of the “coordinated or cooperative” middle
> boxes that Lucas has mentioned in his not on the thread “Re: [Moq] "MoQ
> Architecture" question from Spencer's mail”
>
>
>
> Metadata should be more distinctly mentioned in the charter along with
> perhaps a couple of documents that specifically cover Metadata
> authentication and encryption and Metadata Use Cases by both end points and
> middle boxes.
>
>
>
> -glenn
>
> --
> Moq mailing list
> Moq@ietf.org
> https://www.ietf.org/mailman/listinfo/moq
> <https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/moq__;!!CQl3mcHX2A!EqjB0ptNCUvf7xVMkakLbxPdk_Gx4kKd1I17Jbo4Lq6nWX6RncjNeI9A4VKBUT10uMHrJ2ZWirqKdVczWg$>
>
> --
> Moq mailing list
> Moq@ietf.org
> https://www.ietf.org/mailman/listinfo/moq
> <https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/moq__;!!CQl3mcHX2A!CzxU8cpr_zzDMsnFPYMZkWSooAvTMCCaJJY_zf9GCnu8vkR2Ag2zSRflIyNP6T0VD3XODEt8Xov5WofwFXs$>
>