Re: [Perc] Drop support for E2E RTP header extensions

Emil Ivov <emcho@jitsi.org> Tue, 25 April 2017 21:28 UTC

Return-Path: <emcho@sip-communicator.org>
X-Original-To: perc@ietfa.amsl.com
Delivered-To: perc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30CF51200F1 for <perc@ietfa.amsl.com>; Tue, 25 Apr 2017 14:28:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=jitsi-org.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WIE-hVp8_tKy for <perc@ietfa.amsl.com>; Tue, 25 Apr 2017 14:28:23 -0700 (PDT)
Received: from mail-oi0-x230.google.com (mail-oi0-x230.google.com [IPv6:2607:f8b0:4003:c06::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB058129436 for <perc@ietf.org>; Tue, 25 Apr 2017 14:28:20 -0700 (PDT)
Received: by mail-oi0-x230.google.com with SMTP id x184so188817636oia.1 for <perc@ietf.org>; Tue, 25 Apr 2017 14:28:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=jitsi-org.20150623.gappssmtp.com; s=20150623; h=subject:to:references:cc:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding; bh=3YbVDosUB9OuR3fgbXT7Ek1q8iS/C96Sw+d/VLv23kY=; b=TGz9brH+1gQfJ6bReASHFPN2HQDjsWPydi4b5LGdb8O/fc6REv1N3xKQQda9ynONUw GJ+Yd/mb3w21XmuLhDIuFi5txgg4JcDpqgrFP0s4gUoR0DsMaon1e2HtE3hPW20qrWXi 64AEBgQlYT9xbuHm/emFm787S8Unoq+LvzE8ExthVDSjYppjGaRmz5ajT+043uQJ8zcL LgjsN9fg5scsz6V4PeXslnGwPHws0GR+DZAOhm0mJhvsDEwiaJ8TnJj3bpoRBtoEAvZ/ yDgPNE3IQshiUdEGdQi3wFjjSan7PXCGKefj8c4vUqCWS7rzCvubER1xyc4SRsuQPOEJ QWfQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:cc:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding; bh=3YbVDosUB9OuR3fgbXT7Ek1q8iS/C96Sw+d/VLv23kY=; b=rgCGeWJONKnP6JIewTduGpSfzfs8vQUEBiKgIWZIGcS4NCMGNHq6hpRBBv6I1suzyv rnn9qxpbrDsfaIBDF8kZ/5jo/ca3FSgVIstrIgRborYJjLhsmSPFTaLha1hqeapzAdT1 giXJKo+sOi25eScQ6F0Wz6Lg8asCzY7r45h9nv3sF4VKJQ7kZiUHrDi397+CWUEFJ4hj v60vPT2QlIl6nxCe88Iq6N3JBxKVy0GXP9YVsXcoa+rZI6FFQtcBAWe9nNcI1qH5g6ln nisfSgZJvTiW6C6STQAeN6hTYgLK2x3Kt+ySpdYgv53J51G5xjKSx9N6G+7X5p4QNfAl +LVA==
X-Gm-Message-State: AN3rC/46b5DMNhHYYffTkdeCr1+bjmzETGbuZ/hxUQjGW9xn9hMr2tq0 vvQwIShicmC8Irw9d9E=
X-Received: by 10.202.212.10 with SMTP id l10mr19829827oig.71.1493155699710; Tue, 25 Apr 2017 14:28:19 -0700 (PDT)
Received: from camionet.office.atlassian.com (72-48-156-244.static.grandenetworks.net. [72.48.156.244]) by smtp.googlemail.com with ESMTPSA id s11sm1785987otd.48.2017.04.25.14.28.18 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 25 Apr 2017 14:28:18 -0700 (PDT)
To: Nils Ohlmeier <nohlmeier@mozilla.com>, Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>
References: <49c7de34-8bc6-bb7d-4524-0af26089eecb@gmail.com> <1CF6F66C-939F-484D-8C53-46ACB8CA69BE@vidyo.com> <27ca2993-5c66-8388-7187-b47ed8ae1340@gmail.com> <CAL02cgRDaz7BT+GzxWJ0cM7rebhd2cu2WbPy+Mwjkk0wJK=6mw@mail.gmail.com> <aef9a32f-f761-c9e8-de99-57c4acfd5088@gmail.com> <8FD07F5D-CD52-445B-AF75-BA1696F3A151@mozilla.com> <aff1a9bf-7dcb-71e6-3d01-afe5cac87ca5@gmail.com> <7CC5C051-9BF9-4AFB-939B-57B4F955C661@mozilla.com>
Cc: Richard Barnes <rlb@ipv.sx>, Jonathan Lennox <jonathan@vidyo.com>, "perc@ietf.org" <perc@ietf.org>
From: Emil Ivov <emcho@jitsi.org>
Message-ID: <29c961e0-0fd5-0709-f6c2-42cfa0bba672@jitsi.org>
Date: Tue, 25 Apr 2017 16:28:17 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <7CC5C051-9BF9-4AFB-939B-57B4F955C661@mozilla.com>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/perc/nplHSSxl1to0rvCW586z19_XwOs>
Subject: Re: [Perc] Drop support for E2E RTP header extensions
X-BeenThere: perc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Privacy Enhanced RTP Conferencing <perc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perc>, <mailto:perc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/perc/>
List-Post: <mailto:perc@ietf.org>
List-Help: <mailto:perc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perc>, <mailto:perc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Apr 2017 21:28:25 -0000


On 4/25/17 4:19 PM, Nils Ohlmeier wrote:
>
>> On Apr 24, 2017, at 14:30, Sergio Garcia Murillo
>> <sergio.garcia.murillo@gmail.com
>> <mailto:sergio.garcia.murillo@gmail.com>> wrote:
>>
>> Let me recap:
>>
>>   * We don't have an use case for E2E rtp header extensions
> There are things like audio level and video orientation, which make more
> sense to be passed along by the MDD, rather then re-write them.

This is not really relevant. MDDs do that today without E2E encryption 
and they can continue doing it in the future. I think the point that 
Sergio is making is more about whether or not we have a case where not 
having hdr extensions could somehow compromise a call in a way that 
isn't possible otherwise.

Personally I don't see that.

> I guess
> in worst case a malicious MDD which re-writes all extension headers
> could always mark my audio packet with a very low level, so that I never
> become the active speaker.

And the only thing this would achieve is to make you think that your 
application is buggy. MDDs has many otherwise to achieve that.

> The one use case I have come up with so far, which hasn’t been propose
> AFAIK, would be an extension to prove the identity of the sender for
> each RTP packet send with asymmetric keys.

Lost you.
>>
>>   * We don't provide a solution for signaling E2E rtp header
>>     extensions vs HBH ones
> So far I always thought the group would “simply” come up with a fixed
> list of header extensions which are E2E, for example orientation and
> audio level. Admitably that might not be a very good solution.

So we are updating 5285 again? Or offer/answer?
I didn't see this in the charter and it seems rather overly ambitious to 
me.

The only solution I can think of is for us to dissociate ourselves from 
SDP here (like we've done for ICE) and say something along the lines of: 
hey we don't currently have an IETF compliant mechanism to let you 
negotiate this, but if you have your own, this is how the transport 
would work.


Emil

>>   * We don't provide a solution on how to successfully signal/handling
>>     different subsets of rtp header extensions and unify the
>>     negotiated ids
> To me this is signaling part I mentioned before. Effectively you have to
> generate new offers from the MDD to align all participants on the IDs.
>>
>>   * We introduce a new concept of rtp header ordering that is not
>>     defined anywhere and is not supported by anyone currently making
>>     implementation much more difficult
> Indeed the fact that suddenly the order of negotiated header extensions
> matters changes probably how most existing implementations add
> extensions to the RTP packets. Obviously it would be ideal if we can
> propose new standard which require no or little changes. This appears to
> be not the case here unfortunately.
>
> Best
>   Nils
>>
>>   * We don't expect anyone implementing it
>>
>> Really, I don't see any reason why we have to keep support for E2E rtp
>> header extensions.
>>
>> Regards
>> Sergio
>
>
>
> _______________________________________________
> Perc mailing list
> Perc@ietf.org
> https://www.ietf.org/mailman/listinfo/perc
>

-- 
https://jitsi.org