Re: [Perc] Drop support for E2E RTP header extensions

Cullen Jennings <fluffy@iii.ca> Fri, 12 May 2017 00:10 UTC

Return-Path: <fluffy@iii.ca>
X-Original-To: perc@ietfa.amsl.com
Delivered-To: perc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0D9612EAC1 for <perc@ietfa.amsl.com>; Thu, 11 May 2017 17:10:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.78
X-Spam-Level:
X-Spam-Status: No, score=0.78 tagged_above=-999 required=5 tests=[BAYES_50=0.8, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4B3ZJnB__cCO for <perc@ietfa.amsl.com>; Thu, 11 May 2017 17:10:12 -0700 (PDT)
Received: from smtp77.ord1c.emailsrvr.com (smtp77.ord1c.emailsrvr.com [108.166.43.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 878081293DA for <perc@ietf.org>; Thu, 11 May 2017 17:06:02 -0700 (PDT)
Received: from smtp18.relay.ord1c.emailsrvr.com (localhost [127.0.0.1]) by smtp18.relay.ord1c.emailsrvr.com (SMTP Server) with ESMTP id DF8C7E0161; Thu, 11 May 2017 20:05:59 -0400 (EDT)
X-Auth-ID: fluffy@iii.ca
Received: by smtp18.relay.ord1c.emailsrvr.com (Authenticated sender: fluffy-AT-iii.ca) with ESMTPSA id 35586E0164; Thu, 11 May 2017 20:05:59 -0400 (EDT)
X-Sender-Id: fluffy@iii.ca
Received: from [10.92.108.188] (184-23-135-130.dedicated.static.sonic.net [184.23.135.130]) (using TLSv1 with cipher DHE-RSA-AES256-SHA) by 0.0.0.0:587 (trex/5.7.12); Thu, 11 May 2017 20:05:59 -0400
Content-Type: multipart/alternative; boundary="Apple-Mail=_7E6AA610-9354-40E4-9DFC-1A0799A96B6E"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Cullen Jennings <fluffy@iii.ca>
In-Reply-To: <8ddbf495-ac23-8529-aa0b-a233a0b336c0@gmail.com>
Date: Thu, 11 May 2017 17:05:58 -0700
Cc: Nils Ohlmeier <nohlmeier@mozilla.com>, Richard Barnes <rlb@ipv.sx>, Jonathan Lennox <jonathan@vidyo.com>, "perc@ietf.org" <perc@ietf.org>
Message-Id: <74BE8407-9AC0-45D3-9476-5C109A7B7A3C@iii.ca>
References: <49c7de34-8bc6-bb7d-4524-0af26089eecb@gmail.com> <1CF6F66C-939F-484D-8C53-46ACB8CA69BE@vidyo.com> <27ca2993-5c66-8388-7187-b47ed8ae1340@gmail.com> <CAL02cgRDaz7BT+GzxWJ0cM7rebhd2cu2WbPy+Mwjkk0wJK=6mw@mail.gmail.com> <aef9a32f-f761-c9e8-de99-57c4acfd5088@gmail.com> <8FD07F5D-CD52-445B-AF75-BA1696F3A151@mozilla.com> <aff1a9bf-7dcb-71e6-3d01-afe5cac87ca5@gmail.com> <E234DDC1-9AB5-4C64-91C0-A8FCB58DA351@iii.ca> <8ddbf495-ac23-8529-aa0b-a233a0b336c0@gmail.com>
To: Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/perc/YAzetPYu9Mml-YSstQeqh2YhrCM>
Subject: Re: [Perc] Drop support for E2E RTP header extensions
X-BeenThere: perc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Privacy Enhanced RTP Conferencing <perc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perc>, <mailto:perc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/perc/>
List-Post: <mailto:perc@ietf.org>
List-Help: <mailto:perc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perc>, <mailto:perc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 May 2017 00:10:14 -0000

OK, I think I see what is causing the confusion...

For a given header extension like say "urn:3gpp:video-orientation:6" you are thinking that there needs to be a way for the conference system to tell the endpoint if that given header is E2E encrypted or only HBH. That is not how PERC is working, PERC has the specification on header extensions when used in a PERC context tell the thing sending the RTP what it needs to do or leaving it as an implementation choice. The endpoint or browser is compiling that decisions in to the code. 

Of course the SDP can be used to decide if "urn:3gpp:video-orientation:6" is in use or not but not how it is encrypted. 



> On May 9, 2017, at 9:15 AM, Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com> wrote:
> 
> On 09/05/2017 18:07, Cullen Jennings wrote:
>>> 
>>> Let me recap:
>>> We don't have an use case for E2E rtp header extensions
>> I don't think that is the case. There have been uses discussed that need integrity today and people want to make sure the framework does not limit what can be done in the future. Keep in mind their are lots of header extensions for RTP that are not defined by the IETF. 
> One thing is integrity and another is E2E. Could you name some of those use cases?

Uh, not getting what you mean by E2E here ? An example of something that in some case might want end to end integrity is urn:3gpp:roi-sent

> 
>>> We don't provide a solution for signaling E2E rtp header extensions vs HBH ones
>> Sure we do - it's SDP. In some case, the MD might have to do a re-offer to bring things into line with what it needs. 
> No, the SDP only negotiates HBH extensions. You can't negotiate that some will be HBH and some E2E, it is up to the endpoints to decide when they create the RTP packet, and it won't be known by the MD before hand just by the SDP.
> 
>>> 
>>> We don't provide a solution on how to successfully signal/handling different subsets of rtp header extensions and unify the negotiated ids
>> I think we do 
> Where?
> 
> 
>>> 
>>> We introduce a new concept of rtp header ordering that is not defined anywhere and is not supported by anyone currently making implementation much more difficult
>> When we introduced a way to have HBH and E2E, we provided a provided a way to say which way a header was handled by putting it before or after the OBH. I don't find that very hard to implement. For people that have only HBH headers, it is really easy. 
> Well, I have modified libwertc and jitsi code, and I can tell you it is not the case. Neither on my own MCU/SFU.
> 
> Best regards
> Sergio