Re: [Perc] Last Call: <draft-ietf-perc-private-media-framework-08.txt> (A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing) to Proposed Standard
Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com> Thu, 14 February 2019 09:51 UTC
Return-Path: <sergio.garcia.murillo@gmail.com>
X-Original-To: perc@ietfa.amsl.com
Delivered-To: perc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C1083131056 for <perc@ietfa.amsl.com>; Thu, 14 Feb 2019 01:51:53 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9ZsUkDyWT86g for <perc@ietfa.amsl.com>; Thu, 14 Feb 2019 01:51:48 -0800 (PST)
Received: from mail-wm1-x32c.google.com (mail-wm1-x32c.google.com [IPv6:2a00:1450:4864:20::32c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A932413104E for <perc@ietf.org>; Thu, 14 Feb 2019 01:51:47 -0800 (PST)
Received: by mail-wm1-x32c.google.com with SMTP id v26so5394200wmh.3 for <perc@ietf.org>; Thu, 14 Feb 2019 01:51:47 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language; bh=4DAScoKeiZiuk6QTI7VU040pZEXDZoe8/0fDRVZ2374=; b=egOxSijZiqsZSUlHwNdM3WpPKXPZyS9Juwx4ZYBsItlwye2F8uXB8L4H7u7p7LMLdW erhQ3neS5ey7+2uPmN6AB9C17cscHDmdrCoCCo/JIR/CtyTSWmSmfo7vbC4F0cNeM+mh ONl/vWonPd0dsi4OdKjwOX82RAo7GQKmi2IXvv8viHaPR3O8jS4K3uh+aPzrJ3xsi6wB eDgV7aSPm4klGlA3Rz6EwT0dKtDYufVENlU1hofS+BfqU5Z3nL9xMzp83UwJ/VCJBuXB XTzUAWX5hqNoJavjuEwzg9Phcoe/OkuJoq6nlhRIH85XAymVMYmo5pDux/IlVZRm8RqA Ye+Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language; bh=4DAScoKeiZiuk6QTI7VU040pZEXDZoe8/0fDRVZ2374=; b=A9y7TG76KXVu5NTBngUyb0vbrWiIitxfxZr2YhvFVWAGy+i4IOCoYDuzdcmYh+lxCt 8z4p+xbQLinJPCB9s7MiSUNZ3ULxjamcLsBfau2Yja57bckAB/b/O3Le7tchyF99aFLk ychjKGNs5gj3FEAFf6gq4n+PPa1GCR9p0bzcC/BLp3WxVLVYBzRGC22A+11jtTvbUw/4 57En0Xr+04rm5uspm6ml2tpr4i+kDQ7qU6ArbOmr6CloYHV4Qqov4M36OJzyem1OuaJO tMvYOla1AeqgKKTZ2Bjyzf4GZf33kvHOFqKPOfriOjg0tPN51bDruvvLDKZxnS3fVYnj pRVA==
X-Gm-Message-State: AHQUAuYRF2llUpNq00p7SgH1Lh7tMLCELSMBK23FQhZ4OnXVdpPY4/J0 gWGi97BFF8Hb5XI9Eeuf55ORzDIV
X-Google-Smtp-Source: AHgI3IZFW+639O8QaCwmbg2waRdSC72Iq535TaBzz98XJK69hToyiisLW67yM830aS5J3Q9LKEyXxQ==
X-Received: by 2002:a1c:2097:: with SMTP id g145mr1870014wmg.81.1550137905526; Thu, 14 Feb 2019 01:51:45 -0800 (PST)
Received: from [192.168.0.111] (37.red-80-28-109.staticip.rima-tde.net. [80.28.109.37]) by smtp.googlemail.com with ESMTPSA id c9sm1216707wrs.84.2019.02.14.01.51.44 for <perc@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 14 Feb 2019 01:51:44 -0800 (PST)
To: "perc@ietf.org" <perc@ietf.org>
References: <154889546931.10496.2408974719921724953.idtracker@ietfa.amsl.com> <CAPvvaaK_VUXvy2=1TBGfBWWYxiBdXBzuR=Y-rnAdJyg=M8OfQQ@mail.gmail.com> <5486C91C-48EA-4AA1-85EE-05A0B01C1E70@meetecho.com> <C6FEAEB9-CF8E-48AF-B03F-1406FF9CB303@cosmosoftware.io> <CAOW+2ducgj400pk3xPFAkRYxnYvqwhMsE9rOO0u9PgLpniaaRA@mail.gmail.com> <CAPvvaaLYFeNkZ4Pfdh4pa2btNW6EGZBnAOvXzVZ9egU8V-gBNQ@mail.gmail.com> <CAOW+2dvom822NgjF7OAa2A8YDeqZ+mbCqA=fUcq-Y49oFyGpsA@mail.gmail.com> <CAPvvaa+EzwgMXB_t7ZVTBgZH2y4=neUm1RymUNKnMV-6zyGPaQ@mail.gmail.com> <a74a8239-27dc-5704-096b-05cc5e02bd18@gmail.com> <543375ED-9A4F-452C-AE51-9499DAD5CEE0@gmail.com> <80a1f634-0888-c5e2-f6be-729d4cca3b28@cosmosoftware.io> <06d91175-b071-49fe-01cc-4a1323ad85f7@gmail.com> <91A16283-A392-4217-97E1-B04A5C8AD245@mozilla.com> <9c4149c0-184b-5ee9-e0a4-2b41420d3279@gmail.com> <37143A53-81C3-4391-998E-D7F2AD1F409C@nostrum.com> <417923aa-8771-863e-ee12-4107f674d918@gmail.com> <4CBF52C0-1D9F-4576-85B6-4F24F59CB3E6@nostrum.com>
From: Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>
Message-ID: <b402642c-f7c3-4949-9011-50cab6463464@gmail.com>
Date: Thu, 14 Feb 2019 10:56:30 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.5.0
MIME-Version: 1.0
In-Reply-To: <4CBF52C0-1D9F-4576-85B6-4F24F59CB3E6@nostrum.com>
Content-Type: multipart/alternative; boundary="------------8F5C067705F5CE55818ADDEE"
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/perc/RRsyWWxhhhbSf55cGJYeyXuXMzg>
Subject: Re: [Perc] Last Call: <draft-ietf-perc-private-media-framework-08.txt> (A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing) to Proposed Standard
X-BeenThere: perc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhanced RTP Conferencing <perc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perc>, <mailto:perc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/perc/>
List-Post: <mailto:perc@ietf.org>
List-Help: <mailto:perc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perc>, <mailto:perc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2019 09:51:54 -0000
On 14/02/2019 4:51, Ben Campbell wrote: > (+Cullen) > (as individual) > > Hi Sergio, > > I don’t recall, and I don’t see anything in the notes or email > consensus call, that would suggest the consensus included anything > along the lines “it’s okay to let the js application have the media > keys.” I have never said that there was a consensus around that. > That is, even if the idea was to let PERC do it’s thing and let other > groups spin their own key management systems, I don’t think there’s a > consensus that everyone would be okay with that particular approach. We don't know because the discussion has been prevented from even starting. > > Cullen: As the other join presenter, do you have thoughts? > > Thanks! > > Ben. > >> On Feb 13, 2019, at 2:49 PM, Sergio Garcia Murillo >> <sergio.garcia.murillo@gmail.com >> <mailto:sergio.garcia.murillo@gmail.com>> wrote: >> >> Hi Ben, >> >> The consensus we reached in Prague was that while many of us didn't >> like the proposed solution, we managed to put together a solution >> that was technically feasible, so we were not going to prevent the >> ones in favor of it for getting it done as it could be possible to >> advance with perc lite and alternative key management in different >> forums (namely w3c). >> >> When the use case was presented in the w3c webrtc for nv, the liaison >> statement was sent to prevent the discussion to even get started. So >> I personally consider the consensus is invalidated (and so seems >> others), others even question that the consensus was even reached on >> the first place. >> >> Best regards >> Sergio >> >> >> >> On 13/02/2019 21:21, Ben Campbell wrote: >>> (as individual) >>> >>> Hi Sergio, >>> >>> Can you elaborate on that comment? The statement you reference was >>> explicitly about preserving the PERC trust model. How does it >>> overturn any consensus in PERC? >>> >>> Thanks! >>> >>> Ben. >>> >>>> On Feb 13, 2019, at 4:53 AM, Sergio Garcia Murillo >>>> <sergio.garcia.murillo@gmail.com >>>> <mailto:sergio.garcia.murillo@gmail.com>> wrote: >>>> >>>> You are missing an important piece on the timeline: >>>> >>>> Statement from the IETF ART and SEC Area Directors regarding the >>>> "Trusted application, untrusted intermediary" use case >>>> https://datatracker.ietf.org/liaison/1614/ >>>> >>>> This liaison statement basically blows away any rough consensus >>>> from IETF 99 as the basis of my joint proposal was that it could be >>>> possible to proceed with the PERC lite proposal and that >>>> alternative keying mechanism could be studied without involving the >>>> PERC group. >>>> >>>> Best regards >>>> Sergio >>>> >>>> On 13/02/2019 2:34, Nils Ohlmeier wrote: >>>>> Thank you for the input on the framework and the double documents >>>>> from everyone. >>>>> >>>>> The points raised by the individuals here are not new and have >>>>> been discussed before by the WG at several occasions. And for >>>>> these issues there has be no WG consensus. >>>>> >>>>> >>>>> Specifically on the points regarding double encryption: >>>>> At IETF 95 double had consensus and got adopted (after 4 design >>>>> team meetings and 3 IETF meetings). >>>>> https://www.ietf.org/proceedings/95/minutes/minutes-95-perc >>>>> >>>>> At IETF 96 the WG chairs re-opened the discussions around SSRC >>>>> mutability and Emil got asked to submit a draft on the security >>>>> impact of SSRC mutability >>>>> https://www.ietf.org/proceedings/96/minutes/minutes-96-perc >>>>> >>>>> At IETF 98 SSRC immutability and RTX considerations were discussed >>>>> but no proposal made on security implications >>>>> https://www.ietf.org/proceedings/98/minutes/minutes-98-perc-00 >>>>> >>>>> At IETF 99 the double authors and Sergio presented a joint >>>>> proposal. The WG chairs called for consensus in the room and on >>>>> the list and concluded that with rough consensus, the proposal got >>>>> adopted. >>>>> https://datatracker.ietf.org/meeting/99/materials/minutes-99-perc-01 >>>>> https://mailarchive.ietf.org/arch/msg/perc/3fPqYTE2qhT351nvp1b7wkf4-bc >>>>> >>>>> Best regards >>>>> Nils & Suhas >>>>> PERC WG chairs >>>>> >>>>>> On 2Feb, 2019, at 13:37, Sergio Garcia Murillo >>>>>> <sergio.garcia.murillo@gmail.com >>>>>> <mailto:sergio.garcia.murillo@gmail.com>> wrote: >>>>>> >>>>>> PERC may be a valid solution for some scenarios, maybe SIP. >>>>>> >>>>>> But in regards of WebRTC, my personal opinion is that it is not >>>>>> well suited and that we should do a fresh start, with an analysis >>>>>> of the requirements and specifics of webrtc, define trust models, >>>>>> role of the js apps, UI/UX, IdP and isolated media streams, key >>>>>> management within browser, compatibility with webrtc 1.0, if we >>>>>> need to support it in SDP or not, QUIC, WASM, etc.. and then >>>>>> check if PERC is able to fulfill them or what parts can be >>>>>> reused, if any. >>>>>> >>>>>> Best regards >>>>>> >>>>>> Sergio >>>>>> >>>>>>> >>>>>>> On 02/02/2019 21:42, Bernard Aboba wrote: >>>>>>>> Sergio - >>>>>>>> >>>>>>>> In your opinion, what portions of PERC are salvageable, if any? >>>>>>>> Is this a situation where we need to start over or could some >>>>>>>> aspect of PERC (e.g. Double if the triple encryption problem >>>>>>>> were fixed) be suitably modified and then implemented? >>>>>>>> >>>>>>>> On Feb 2, 2019, at 3:31 PM, Sergio Garcia Murillo >>>>>>>> <sergio.garcia.murillo@gmail.com >>>>>>>> <mailto:sergio.garcia.murillo@gmail.com>> wrote: >>>>>>>> >>>>>>>>> I think Emil and Bernard have described quite precisely where >>>>>>>>> we are and how we managed to get here. >>>>>>>>> >>>>>>>>> In my opinion it would be a big mistake to consider PERC as >>>>>>>>> *THE* solution for end to end encryption for >>>>>>>>> multiconferencing, as if there was a one size fits all >>>>>>>>> solution for the problem. >>>>>>>>> >>>>>>>>> Speaking from a WebRTC perspective, PERC, apart of have taken >>>>>>>>> some controversial technical decisions (OHB as header, the >>>>>>>>> ssrc rewriting issue and reverse the the order of FEC/RTX and >>>>>>>>> SRTP), does not take into consideration the specifics of >>>>>>>>> WebRTC (it could be argued that that was not in the scope of >>>>>>>>> this group), like the role of the js app, the possibility of >>>>>>>>> allowing key management in js, or the interaction with Idp and >>>>>>>>> isolated media streams. Not to speak about the recent >>>>>>>>> discussions about full frame vs per packet encryption or QUIC. >>>>>>>>> >>>>>>>>> Best regards >>>>>>>>> Sergio >>>>>>>>> >>>>>>>>> >>>>>>>>> On 02/02/2019 18:42, Emil Ivov wrote: >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> On Sat 2 Feb 2019 at 16:50, Bernard Aboba >>>>>>>>>> <bernard.aboba@gmail.com <mailto:bernard.aboba@gmail.com>> wrote: >>>>>>>>>> >>>>>>>>>> Emil said: >>>>>>>>>> >>>>>>>>>> "The need to do a triple encryption for example is a >>>>>>>>>> particularly egregious consequence of the order problem. >>>>>>>>>> That’s a problem specific to the “double” documents." >>>>>>>>>> >>>>>>>>>> [BA] Can you describe how the need for "triple >>>>>>>>>> encryption" arises? The framework document doesn't even >>>>>>>>>> mention the issues with ordering of FEC/RTX/RED and >>>>>>>>>> encryption, let alone the need for "triple encryption". >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> One of the goals that some members of the group seemed to >>>>>>>>>> have was to allow specific applications to become >>>>>>>>>> PERC-compliant without changing the app code itself and by >>>>>>>>>> simply replacing the libsrtp library with a PERC-enabled one. >>>>>>>>>> >>>>>>>>>> I don’t know that this goal is a direct consequence of the >>>>>>>>>> framework’s conceptual approach (contrary to the imposition >>>>>>>>>> of key distribution and negotiation). I think it simply >>>>>>>>>> carries a promise for some minimal pragmatic value to some >>>>>>>>>> implementers. >>>>>>>>>> >>>>>>>>>> The issue with this approach is that it leaves hop-by-hop >>>>>>>>>> protection mechanisms such FEC and RTC unavailable to the SFU >>>>>>>>>> as they are usually performed before SRTP, which would make >>>>>>>>>> them e2e encrypted. >>>>>>>>>> >>>>>>>>>> The solution to that is simple. One merely needs to perform >>>>>>>>>> e2e encryption first, then apply FEC and/or RTX and only then >>>>>>>>>> apply the second (hop-by-hop) layer of SRTP. >>>>>>>>>> >>>>>>>>>> This approach was referred to as “wedging RTX and FEC” as it >>>>>>>>>> places them in between the two encryption operations. >>>>>>>>>> >>>>>>>>>> While wedging appeared to have overall support in hallway >>>>>>>>>> discussions by all SFU implementors except potentially one, >>>>>>>>>> it was mysteriously rejected by a subset of the WG and >>>>>>>>>> replaced with the following: >>>>>>>>>> >>>>>>>>>> Applications will apply SRTP-double first and, those that >>>>>>>>>> need to use FEC and RTX would have to apply them only after. >>>>>>>>>> >>>>>>>>>> It was quickly pointed out that this not only destroys the >>>>>>>>>> stated “don’t-change-the-app” goal, but also leaves RTX and >>>>>>>>>> mostly FEC unprotected and FEC receivers vulnerable to DoS. >>>>>>>>>> To this the proponents of this approach simply replied with: >>>>>>>>>> “well, those of you who use FEC/RTX will simply do a third >>>>>>>>>> round of SRTP”, thus arriving at a total of three encryptions >>>>>>>>>> for every packet.. >>>>>>>>>> >>>>>>>>>> The discussions around this topic were highly contentious. >>>>>>>>>> >>>>>>>>>> Hope this makes things clear, >>>>>>>>>> Emil >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> On Sat, Feb 2, 2019 at 11:46 AM Emil Ivov >>>>>>>>>> <emcho@jitsi.org <mailto:emcho@jitsi.org>> wrote: >>>>>>>>>> >>>>>>>>>> Yes pretty much those. >>>>>>>>>> >>>>>>>>>> The need to do a triple encryption for example is a >>>>>>>>>> particularly egregious consequence of the order >>>>>>>>>> problem. That’s a problem specific to the “double” >>>>>>>>>> documents. >>>>>>>>>> >>>>>>>>>> I would however also say that the decision to bake >>>>>>>>>> one specific way of performing key negotiation into >>>>>>>>>> the framework rather than leaving it open was both >>>>>>>>>> unnecessary and quite problematic. >>>>>>>>>> >>>>>>>>>> Emil >>>>>>>>>> >>>>>>>>>> On Sat 2 Feb 2019 at 12:23, Bernard Aboba >>>>>>>>>> <bernard.aboba@gmail.com >>>>>>>>>> <mailto:bernard.aboba@gmail.com>> wrote: >>>>>>>>>> >>>>>>>>>> "on the consensus not reached on this and other >>>>>>>>>> topics." >>>>>>>>>> >>>>>>>>>> [BA] Out of curiosity, what other topics do you >>>>>>>>>> consider to be problematic within the framework? >>>>>>>>>> I am aware of at least two others where >>>>>>>>>> implementers have chosen different paths than in >>>>>>>>>> the PERC framework: >>>>>>>>>> >>>>>>>>>> * Order of application of encryption versus >>>>>>>>>> FEC/RTX/RED >>>>>>>>>> * Whole frame encryption versus payload encryption >>>>>>>>>> >>>>>>>>>> With respect to consensus, this is IETF last >>>>>>>>>> call, one of whose purposes is to determine >>>>>>>>>> whether there is IETF consensus to publish this >>>>>>>>>> document as a Proposed Standard. Are you saying >>>>>>>>>> that you do not agree that there is an IETF >>>>>>>>>> consensus to publish this document as a Proposed >>>>>>>>>> Standard? Or that there is no IETF consensus to >>>>>>>>>> publish *any* of the PERC WG output as a Proposed >>>>>>>>>> Standard? >>>>>>>>>> >>>>>>>>>> On Sat, Feb 2, 2019 at 5:40 AM Alexandre >>>>>>>>>> GOUAILLARD <alex.gouaillard@cosmosoftware.io >>>>>>>>>> <mailto:alex..gouaillard@cosmosoftware.io>> wrote: >>>>>>>>>> >>>>>>>>>> +1 on ssrc rewriting, and on the consensus >>>>>>>>>> not reached on this and other topics. >>>>>>>>>> >>>>>>>>>> Sent from my iPhone >>>>>>>>>> >>>>>>>>>> On 2 Feb 2019, at 17:18, Lorenzo Miniero >>>>>>>>>> <lorenzo@meetecho.com >>>>>>>>>> <mailto:lorenzo@meetecho.com>> wrote: >>>>>>>>>> >>>>>>>>>>> +1, SSRC rewriting is pretty much >>>>>>>>>>> fundamental to all SFUs out there. >>>>>>>>>>> >>>>>>>>>>> Lorenzo >>>>>>>>>>> >>>>>>>>>>> Il 2 febbraio 2019 10:19:06 CET, Emil Ivov >>>>>>>>>>> <emcho@jitsi.org <mailto:emcho@jitsi.org>> >>>>>>>>>>> ha scritto: >>>>>>>>>>> >>>>>>>>>>> I want to second that as it is a >>>>>>>>>>> particularly major problem: not allowing >>>>>>>>>>> SSRC rewriting makes the entire >>>>>>>>>>> framework unusable with SFU >>>>>>>>>>> implementation I represent as well as >>>>>>>>>>> every other SFU I am familiar with. >>>>>>>>>>> >>>>>>>>>>> I am also not sure that I agree with >>>>>>>>>>> “SSRC rewriting could not be allowed” is >>>>>>>>>>> a conclusion that ever had any consensus >>>>>>>>>>> in PERC, regardless of what WG >>>>>>>>>>> leadership is trying to make everyone >>>>>>>>>>> believe. >>>>>>>>>>> >>>>>>>>>>> On Sat 2 Feb 2019 at 06:21, Bernard >>>>>>>>>>> Aboba <bernard.aboba@gmail.com >>>>>>>>>>> <mailto:bernard.aboba@gmail.com>> wrote: >>>>>>>>>>> >>>>>>>>>>> Richard said: >>>>>>>>>>> >>>>>>>>>>> "Again, the answer is clear here, >>>>>>>>>>> but the document should be clearer. >>>>>>>>>>> The working group discussed SSRC >>>>>>>>>>> rewriting several times, and >>>>>>>>>>> concluded that SSRC rewriting could >>>>>>>>>>> not be allowed in this system. This >>>>>>>>>>> decision is reflected, e.g., in the >>>>>>>>>>> fact that the Double transform does >>>>>>>>>>> not allow modification of SSRCs." >>>>>>>>>>> >>>>>>>>>>> [BA] Not being able to rewrite SSRCs >>>>>>>>>>> has some major implications with >>>>>>>>>>> respect to requirements on PERC >>>>>>>>>>> endpoints. Typically today's MDD >>>>>>>>>>> will switch between the simulcast >>>>>>>>>>> streams provided by an endpoint, >>>>>>>>>>> forwarding only a single stream to >>>>>>>>>>> other participants, based on the >>>>>>>>>>> bandwidth, resolution and >>>>>>>>>>> framerates. If rewriting of SSRCs is >>>>>>>>>>> not possible, do PERC endpoints need >>>>>>>>>>> to be able to receive simulcast? If >>>>>>>>>>> PERC endpoints do need to be able to >>>>>>>>>>> receive simulcast, what are the >>>>>>>>>>> requirements for endpoints? For >>>>>>>>>>> example, should endpoints expect the >>>>>>>>>>> MDD to use RID header extensions to >>>>>>>>>>> identify the incoming simulcast >>>>>>>>>>> streams? >>>>>>>>>>> >>>>>>>>>>> Receiving of simulcast is tricky >>>>>>>>>>> because the endpoint is receiving >>>>>>>>>>> multiple streams with different >>>>>>>>>>> sequence number spaces which may >>>>>>>>>>> contain holes because of reordering >>>>>>>>>>> or loss. This not only complicates >>>>>>>>>>> the application of RTX, RED and FEC, >>>>>>>>>>> but also the operation of the >>>>>>>>>>> endpoint. As a result, as noted in >>>>>>>>>>> the WEBRTC specification Section >>>>>>>>>>> 5.4.1, support for reception of >>>>>>>>>>> simulcast is optional. I am aware of >>>>>>>>>>> two ORTC implementations that have >>>>>>>>>>> attempted to support simulcast >>>>>>>>>>> reception, neither of which is >>>>>>>>>>> robust in scenarios with >>>>>>>>>>> considerable loss and/or reordering. >>>>>>>>>>> And neither implementation supports >>>>>>>>>>> the RID header extension on received >>>>>>>>>>> simulcast streams. >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> On Fri, Feb 1, 2019 at 12:23 PM >>>>>>>>>>> Sergio Garcia Murillo >>>>>>>>>>> <sergio.garcia.murillo@gmail.com >>>>>>>>>>> <mailto:sergio.garcia.murillo@gmail.com>> >>>>>>>>>>> wrote: >>>>>>>>>>> >>>>>>>>>>> On 01/02/2019 17:18, Richard >>>>>>>>>>> Barnes wrote: >>>>>>>>>>>> So I would propose we add >>>>>>>>>>>> something like the following to >>>>>>>>>>>> this definition: >>>>>>>>>>>> >>>>>>>>>>>> "In the context of WebRTC, >>>>>>>>>>>> where control of a session is >>>>>>>>>>>> divided between a JavaScript >>>>>>>>>>>> application and a browser, the >>>>>>>>>>>> browser acts as the Trusted >>>>>>>>>>>> Endpoint for purposes of this >>>>>>>>>>>> framework (just as it acts as >>>>>>>>>>>> the endpoint for DTLS-SRTP in >>>>>>>>>>>> one-to-one calls). >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> If we decide to adopt perc (big >>>>>>>>>>> if) in webrtc, shouldn't this be >>>>>>>>>>> defined within the >>>>>>>>>>> https://tools.ietf.org/html/draft-ietf-rtcweb-security-arch-17 >>>>>>>>>>> doc ? >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> Optimally, we would not rely on trust in any entities other than the >>>>>>>>>>> browser. However, this is unfortunately not possible if we wish to >>>>>>>>>>> have a functional system. Other network elements fall into two >>>>>>>>>>> categories: those which can be authenticated by the browser and thus >>>>>>>>>>> can be granted permissions to access sensitive resources, and those >>>>>>>>>>> which cannot be authenticated and thus are untrusted. >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> WebRTC already IdP as trusted >>>>>>>>>>> for identity purposes, so it >>>>>>>>>>> should be up to the RTCWEB group >>>>>>>>>>> to decide what is a trusted >>>>>>>>>>> endpoint and what is not in >>>>>>>>>>> webrtc. As Bernard is stating, >>>>>>>>>>> we could decide that there are >>>>>>>>>>> other key management solutions >>>>>>>>>>> trusted (even in JS or WASM), as >>>>>>>>>>> for for example is being done in >>>>>>>>>>> EME: >>>>>>>>>>> >>>>>>>>>>> https://github.com/WICG/media-capabilities/blob/master/explainer.md#encryption >>>>>>>>>>> >>>>>>>>>>> Best regards >>>>>>>>>>> >>>>>>>>>>> Sergio >>>>>>>>>>> >>>>>>>>>>> _______________________________________________ >>>>>>>>>>> Perc mailing list >>>>>>>>>>> Perc@ietf.org <mailto:Perc@ietf.org> >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/perc >>>>>>>>>>> >>>>>>>>>>> -- >>>>>>>>>>> sent from my mobile >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> -- >>>>>>>>>>> Inviato dal mio dispositivo Android con K-9 >>>>>>>>>>> Mail. Perdonate la brevità. >>>>>>>>>> >>>>>>>>>> -- >>>>>>>>>> sent from my mobile >>>>>>>>>> >>>>>>>>>> -- >>>>>>>>>> sent from my mobile >>>>>>>>>> >>>>>>>>>> _______________________________________________ >>>>>>>>>> Perc mailing list >>>>>>>>>> Perc@ietf.org >>>>>>>>>> https://www.ietf.org/mailman/listinfo/perc >>>>>>>>> >>>>>>>>> >>>>>> _______________________________________________ >>>>>> Perc mailing list >>>>>> Perc@ietf.org <mailto:Perc@ietf.org> >>>>>> https://www.ietf.org/mailman/listinfo/perc >>>>> >>>> >>>> _______________________________________________ >>>> Perc mailing list >>>> Perc@ietf.org <mailto:Perc@ietf.org> >>>> https://www.ietf.org/mailman/listinfo/perc >>> >> >
- [Perc] Last Call: <draft-ietf-perc-private-media-… The IESG
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Richard Barnes
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Emil Ivov
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Lorenzo Miniero
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Alexandre GOUAILLARD
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Emil Ivov
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Emil Ivov
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Emil Ivov
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Emil Ivov
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Nils Ohlmeier
- [Perc] Fwd: Last Call: <draft-ietf-perc-private-m… Justin Uberti
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Emil Ivov
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Ben Campbell
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Ben Campbell
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Nils Ohlmeier
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Ben Campbell
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Bernard Aboba
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Sergio Garcia Murillo
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Cullen Jennings
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Cullen Jennings
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Emil Ivov
- Re: [Perc] Last Call: <draft-ietf-perc-private-me… Alexandre GOUAILLARD