Re: [Perc] Drop support for E2E RTP header extensions

Nils Ohlmeier <nohlmeier@mozilla.com> Tue, 25 April 2017 21:19 UTC

Return-Path: <nohlmeier@mozilla.com>
X-Original-To: perc@ietfa.amsl.com
Delivered-To: perc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 49FA2129353 for <perc@ietfa.amsl.com>; Tue, 25 Apr 2017 14:19:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level:
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mozilla.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rqdaBfZjm5lY for <perc@ietfa.amsl.com>; Tue, 25 Apr 2017 14:19:08 -0700 (PDT)
Received: from mail-it0-x233.google.com (mail-it0-x233.google.com [IPv6:2607:f8b0:4001:c0b::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5324A1252BA for <perc@ietf.org>; Tue, 25 Apr 2017 14:19:08 -0700 (PDT)
Received: by mail-it0-x233.google.com with SMTP id x188so84421304itb.0 for <perc@ietf.org>; Tue, 25 Apr 2017 14:19:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mozilla.com; s=google; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=GfwoVMzT8VdnaQgzGcs3MmNRb4hlYjmIGOplBHMKQQo=; b=HBcuxBIUAA8ahwrYiggbn151256b6vTTgGJYv09gW3TgdaKOVL0mnRXLLMnA8N+36a uDhDDLkPlFurbBKNQz/2kp9/0vQuXIdzl0G1ZP3cwn6ud0zKVOJs/UsJzEvh48NatUd0 WnRty+t9KfQlti3+yq0iRLO6kXAh1iEXu3Aj8=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=GfwoVMzT8VdnaQgzGcs3MmNRb4hlYjmIGOplBHMKQQo=; b=gxsGK5q6xpdxqMFWdhhjPDj18XohnqEfgJFmurHifkOTjy8rhP8Nl1gGzbv21Y7OaE h/hoYDJv82CXe7YhvSd7Vi6iCMuHXXh7dDjYeA1LJJDqBoAA482zJUzenwhsg3x3XKXN SqgFYUIquCp+CE1MlxdrhCMnhRLTRl+KFqV24NHKlBWzh1wWNSBO1iCqZt+MBggkmMB1 lzndg40juSXozi86oL+nGHunJt/pxr0WGOW0nfTK3L3EtpHRuLi1Y00KuEWGH39i7hjR 3X4+4IWPRzTOcd5+RmKDT30xK3IFe1nrGjI7nhY8H//GeCZD+bI4kXB2gdL8GC8BtDyd qmYQ==
X-Gm-Message-State: AN3rC/5SZ1oqk2jLth2mwvjLrscR2294ykElKvlj5kusE/5gG/08vHO/ 3NTxGzfcbqnIBlO/
X-Received: by 10.36.65.227 with SMTP id b96mr7502647itd.118.1493155147585; Tue, 25 Apr 2017 14:19:07 -0700 (PDT)
Received: from ?IPv6:2620:101:80fc:224:2cbd:c196:e332:6007? ([2620:101:80fc:224:2cbd:c196:e332:6007]) by smtp.gmail.com with ESMTPSA id 18sm571405iom.51.2017.04.25.14.19.05 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 25 Apr 2017 14:19:06 -0700 (PDT)
From: Nils Ohlmeier <nohlmeier@mozilla.com>
Message-Id: <7CC5C051-9BF9-4AFB-939B-57B4F955C661@mozilla.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_554FDFEE-2069-4309-AECE-DBB44655DD8C"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Tue, 25 Apr 2017 14:19:02 -0700
In-Reply-To: <aff1a9bf-7dcb-71e6-3d01-afe5cac87ca5@gmail.com>
Cc: Richard Barnes <rlb@ipv.sx>, Jonathan Lennox <jonathan@vidyo.com>, "perc@ietf.org" <perc@ietf.org>
To: Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>
References: <49c7de34-8bc6-bb7d-4524-0af26089eecb@gmail.com> <1CF6F66C-939F-484D-8C53-46ACB8CA69BE@vidyo.com> <27ca2993-5c66-8388-7187-b47ed8ae1340@gmail.com> <CAL02cgRDaz7BT+GzxWJ0cM7rebhd2cu2WbPy+Mwjkk0wJK=6mw@mail.gmail.com> <aef9a32f-f761-c9e8-de99-57c4acfd5088@gmail.com> <8FD07F5D-CD52-445B-AF75-BA1696F3A151@mozilla.com> <aff1a9bf-7dcb-71e6-3d01-afe5cac87ca5@gmail.com>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/perc/BAZROBbmt6PagS_l0Q0wD5aLlzo>
Subject: Re: [Perc] Drop support for E2E RTP header extensions
X-BeenThere: perc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Privacy Enhanced RTP Conferencing <perc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perc>, <mailto:perc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/perc/>
List-Post: <mailto:perc@ietf.org>
List-Help: <mailto:perc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perc>, <mailto:perc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Apr 2017 21:19:10 -0000

> On Apr 24, 2017, at 14:30, Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com> wrote:
> 
> Let me recap:
> We don't have an use case for E2E rtp header extensions
There are things like audio level and video orientation, which make more sense to be passed along by the MDD, rather then re-write them. I guess in worst case a malicious MDD which re-writes all extension headers could always mark my audio packet with a very low level, so that I never become the active speaker.
The one use case I have come up with so far, which hasn’t been propose AFAIK, would be an extension to prove the identity of the sender for each RTP packet send with asymmetric keys.
> We don't provide a solution for signaling E2E rtp header extensions vs HBH ones
So far I always thought the group would “simply” come up with a fixed list of header extensions which are E2E, for example orientation and audio level. Admitably that might not be a very good solution.
> We don't provide a solution on how to successfully signal/handling different subsets of rtp header extensions and unify the negotiated ids
To me this is signaling part I mentioned before. Effectively you have to generate new offers from the MDD to align all participants on the IDs.
> We introduce a new concept of rtp header ordering that is not defined anywhere and is not supported by anyone currently making implementation much more difficult
Indeed the fact that suddenly the order of negotiated header extensions matters changes probably how most existing implementations add extensions to the RTP packets. Obviously it would be ideal if we can propose new standard which require no or little changes. This appears to be not the case here unfortunately.

Best
  Nils
> We don't expect anyone implementing it
> Really, I don't see any reason why we have to keep support for E2E rtp header extensions.
> 
> Regards
> Sergio