Re: [Perc] Drop support for E2E RTP header extensions

Emil Ivov <emcho@jitsi.org> Tue, 16 May 2017 19:50 UTC

Return-Path: <emcho@jitsi.org>
X-Original-To: perc@ietfa.amsl.com
Delivered-To: perc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 84F7912EC31 for <perc@ietfa.amsl.com>; Tue, 16 May 2017 12:50:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=jitsi-org.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FzhXtdYuIEE6 for <perc@ietfa.amsl.com>; Tue, 16 May 2017 12:50:46 -0700 (PDT)
Received: from mail-wm0-x235.google.com (mail-wm0-x235.google.com [IPv6:2a00:1450:400c:c09::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E982F12EBE3 for <perc@ietf.org>; Tue, 16 May 2017 12:46:42 -0700 (PDT)
Received: by mail-wm0-x235.google.com with SMTP id v15so103461190wmv.1 for <perc@ietf.org>; Tue, 16 May 2017 12:46:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jitsi-org.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=qQ+N7TdlemdrTx9h1monU/g0sDtIVVXU8ldyITvNEI8=; b=NR4Ek6nAbubv91TQj454szairW4R1t+EsbXy9xwAnAfUW5OfH70/KU8QzeGZbq+4Pk P+t6hhvT4oQ/8vI6LGyPApwqGV+rClH5BUeUTY0RbqPUoMH+2DFDQledC1q47sGSpOKH HSg/9omp2soLlmA92Lvbb3ktHHIOuwMQtoeMRzhWNjR1XJGJkKqjT7mUwykjteX95bbT V4pkPS35Gzlz9kXeLO+Q4ujJIO6YwNshmtJMcbs37WVFbjWZu/ZJqexmTkjvCvnSAWUC 0DZVPS6xSRvjH2JtbBGuF1qCIZIaX9UfPfHh2Oy3AOjhNa4eiaxXkIcPDnr7FLNgLtNr goBA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=qQ+N7TdlemdrTx9h1monU/g0sDtIVVXU8ldyITvNEI8=; b=IbdjHuvh9ARy/qbNdDYs/fgmMA9pEZIdaixVa0uYXWfe7lIJTrOF/4oIf1ofic79PW ONLYAKvGpejoVGo6BMeWXMJ5Oei5WytXJUm7fVTJ+/FGmloVzQdPPvsAtdvzt4am/at9 0Qp2rfmGD5c6jbfHzACzj5uc4drPTetLSqr6OIz9mPm/uIMHQcAJ9Rb413XqUA0F2Jh0 LyXfusYdvmGLCZF9Rzw/NUztpjbY5ggTSh29kjpIwk57THGPHjP2/3Nn+BhluW1dC/8u 5Niv94puJOY3X0AwizQ6riyE7hpsD7pmh6NtOZR6GgVJnvE/6ZYBVmizupbQRcu+u3pe dcRQ==
X-Gm-Message-State: AODbwcAQ2reDAYRSG0ZbZK0VQI/Ox7mtHcw0o3a2OXRu2ebE8msHpJbS HxGB8nj/hAGb9w6l8hJcym4HHuVnv5YB
X-Received: by 10.80.205.93 with SMTP id d29mr246430edj.74.1494964001219; Tue, 16 May 2017 12:46:41 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.80.177.52 with HTTP; Tue, 16 May 2017 12:46:20 -0700 (PDT)
In-Reply-To: <87C7FDA2-3F7B-4037-BD5D-71BF5D71BC27@iii.ca>
References: <49c7de34-8bc6-bb7d-4524-0af26089eecb@gmail.com> <1CF6F66C-939F-484D-8C53-46ACB8CA69BE@vidyo.com> <27ca2993-5c66-8388-7187-b47ed8ae1340@gmail.com> <CAL02cgRDaz7BT+GzxWJ0cM7rebhd2cu2WbPy+Mwjkk0wJK=6mw@mail.gmail.com> <aef9a32f-f761-c9e8-de99-57c4acfd5088@gmail.com> <8FD07F5D-CD52-445B-AF75-BA1696F3A151@mozilla.com> <aff1a9bf-7dcb-71e6-3d01-afe5cac87ca5@gmail.com> <E234DDC1-9AB5-4C64-91C0-A8FCB58DA351@iii.ca> <8ddbf495-ac23-8529-aa0b-a233a0b336c0@gmail.com> <74BE8407-9AC0-45D3-9476-5C109A7B7A3C@iii.ca> <286A6294-EC1E-49D3-88BB-023178DB07BD@packetizer.com> <2810AD6C-0F45-41CC-BC6F-4303B5649CB0@iii.ca> <em9a829f3a-e2ed-4250-8e7e-cad6623a30a2@sydney> <FD826FBD-6D15-4791-8C9F-450E83EA1EC6@iii.ca> <eme27e4a00-19ad-48da-bd9e-1e8bfb69ca8f@sydney> <87C7FDA2-3F7B-4037-BD5D-71BF5D71BC27@iii.ca>
From: Emil Ivov <emcho@jitsi.org>
Date: Tue, 16 May 2017 14:46:20 -0500
Message-ID: <CAPvvaaLDdp0OTMyFmbU2qX4B0N1903Xj190KOny2HdpHqhdzkQ@mail.gmail.com>
To: Cullen Jennings <fluffy@iii.ca>
Cc: Paul Jones <paulej@packetizer.com>, Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>, perc@ietf.org
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/perc/aY0q7JY_ipI4ZJV3P5HpSarjJs8>
Subject: Re: [Perc] Drop support for E2E RTP header extensions
X-BeenThere: perc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Privacy Enhanced RTP Conferencing <perc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perc>, <mailto:perc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/perc/>
List-Post: <mailto:perc@ietf.org>
List-Help: <mailto:perc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perc>, <mailto:perc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 May 2017 19:50:49 -0000

On Tue, May 16, 2017 at 2:17 PM, Cullen Jennings <fluffy@iii.ca> wrote:
>
> Paul,
>
> I think you are wrong but let me know what parts of this you don't think work and we can work through it.
>
> So lets split up a bunch of different ways a conference systems that uses the PERC stuff can do this.
>
> 1) for any extensions that are HbH, the MD can simply remap them if it wants
>
> 2) for any extensions in the offer that are E2E, if they are not needed for this conferences, the MD can simply reject them in the SDP offer/answer and there will be no E2E extensions.
>
> 3) for both HbH and E2E exertions, to repeat my prev email on this thread from May 13,
>> If Alice's UA offers urn:ietf:params:rtp-hdrext:encrypt with and ID of 1 and the conferences wants to use 22 because that is what other endpoints are using, the conference server simply rejects that in the answer then does a reoffers with an ID of 22.
>
> Note that point 2 is very close to what  Sergio is arguing for here ...  one thing he might do in his implementation is simply make sure that if and endpoint attempts to negotiate an extension other than the ones his MD supports, make the MD rejects that extension. At that point his MD will not need to deal with any E2E stuff and there is not ordering.
>
> Some systems that support extension might want to do 1 while others might want to do 3. Some systems might want to reject every extension other than client-to-mixer audio levels.
>
> I think the specs as they are support 1, 2, and 3 - am I missing something ?

What happens when Alice also insists on using a specific ID?


Emil


>
>
>
>> On May 15, 2017, at 9:45 AM, Paul E. Jones <paulej@packetizer.com> wrote:
>>
>> Cullen,
>>
>> I understand that was a goal at the outset.  However, I'm not sure the specs as they current exist will allow us to do that, but feel free to correct me if I'm wrong.
>>
>> The issue, as I understand, is the requirement in RFC 5285 that says:
>>   A session update MAY add or remove extension(s). Identifiers values in the valid range MUST NOT be altered (remapped).
>>
>> The offerer will suggest an ID mapping to extensions and the MD cannot change that mapping.   A dozen endpoints can offer different ID mappings for the same or overlapping extensions.  The extensions (including encrypted extensions) can be preserved before the OHB, but it's unclear to me how the endpoint would process those.  If the receiving endpoint sent an offer indicating it wanted to use extension "foo" with ID=6 and the sender of the particular RTP packet sent an offer for "foo" with an ID=5, then the receiver is not going be in agreement with the ID mapping of the sender.
>>
>> A solution could be to introduce an "extension remapping extension".  For example, the receiver would skip over all extensions until it gets to the OHB.  It would then look for the "extension remapping extension" that would tell the receiver (in my example above) that "ID=6 is remapped to ID=5 before the OHB".  So, while the receiver had assumed ID=6 would be "foo", it would look before the OHB for ID=5.  In effect, this is creating a way to get around that statement in RFC 5285 that disallows remapping.
>>
>> AFAIK, we don't have language like that in any document and I don't think the MD is otherwise able to force all endpoints to use a common mapping.
>>
>> Paul
>>
>> ------ Original Message ------
>> From: "Cullen Jennings" <fluffy@iii.ca>
>> To: "Paul Jones" <paulej@packetizer.com>; "Sergio Garcia Murillo" <sergio.garcia.murillo@gmail.com>
>> Cc: perc@ietf.org
>> Sent: 5/15/2017 1:34:42 PM
>> Subject: Re: [Perc] Drop support for E2E RTP header extensions
>>
>>>
>>> So let me just confirm one thing with both of you (Paul & Sergio) ... you understand that the current design supports both E2E and HbH header extensions and which way a given extension is handed is currently determined by specification of the system not negotiated over SDP?
>>>
>>> Yes we could change any of that but I just want to make sure we are all on the same page of where we are now
>>>
>>>
>>>
>>>> On May 13, 2017, at 2:08 PM, Paul E. Jones <paulej@packetizer.com> wrote:
>>>>
>>>> Cullen,
>>>>
>>>> I say we should NOT support E2E extensions.  Make them HBH and the MDD can re-write header extensions values or remove them as it sees fit.
>>>>
>>>> Sergio, you want E2E extensions?  Seems like it's going to be rather complicated to support with the current design.
>>>>
>>>> Paul
>>>>
>>>> ------ Original Message ------
>>>> From: "Cullen Jennings" <fluffy@iii.ca>
>>>> To: "Paul Jones" <paulej@packetizer.com>
>>>> Cc: perc@ietf.org
>>>> Sent: 5/13/2017 10:33:35 AM
>>>> Subject: Re: [Perc] Drop support for E2E RTP header extensions
>>>>
>>>>>
>>>>>
>>>>>> On May 12, 2017, at 12:10 AM, Paul E. Jones <paulej@packetizer.com> wrote:
>>>>>>
>>>>>> I don't see how we can support any E2E extension given the offerer specifies the ID mapping. Multiple endpoints in a conference might indicate any number of didn't ID values for the same extension.
>>>>>>
>>>>>
>>>>>
>>>>> Just so we are all clear on how this would work ... sorry for the repetition ....
>>>>>
>>>>>
>>>>> If Alice's UA offers urn:ietf:params:rtp-hdrext:encrypt with and ID of 1 and the conferences wants to use 22 because that is what other endpoints are using, the conference server simply rejects that in the answer then does and reoffers that with an ID of 22.
>>>>>
>>>>> This of course does not take care of Sergio request that the conference bridge would like to tell ALice's UA if this should be protected E2E or not. I'll send a separate email on that.
>>>>>
>>>>>
>>>>> _______________________________________________
>>>>> Perc mailing list
>>>>> Perc@ietf.org
>>>>> https://www.ietf.org/mailman/listinfo/perc
>>>>
>>>> _______________________________________________
>>>> Perc mailing list
>>>> Perc@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/perc
>>>
>>> _______________________________________________
>>> Perc mailing list
>>> Perc@ietf.org
>>> https://www.ietf.org/mailman/listinfo/perc
>>
>> _______________________________________________
>> Perc mailing list
>> Perc@ietf.org
>> https://www.ietf.org/mailman/listinfo/perc
>
> _______________________________________________
> Perc mailing list
> Perc@ietf.org
> https://www.ietf.org/mailman/listinfo/perc



-- 
https://jitsi.org