Re: [Perc] Drop support for E2E RTP header extensions

Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com> Mon, 24 April 2017 15:57 UTC

Return-Path: <sergio.garcia.murillo@gmail.com>
X-Original-To: perc@ietfa.amsl.com
Delivered-To: perc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74823131777 for <perc@ietfa.amsl.com>; Mon, 24 Apr 2017 08:57:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZapV9rC7uq1B for <perc@ietfa.amsl.com>; Mon, 24 Apr 2017 08:57:46 -0700 (PDT)
Received: from mail-wm0-x22b.google.com (mail-wm0-x22b.google.com [IPv6:2a00:1450:400c:c09::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5679313176B for <perc@ietf.org>; Mon, 24 Apr 2017 08:57:46 -0700 (PDT)
Received: by mail-wm0-x22b.google.com with SMTP id w64so534943wma.0 for <perc@ietf.org>; Mon, 24 Apr 2017 08:57:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:cc:from:message-id:date:user-agent :mime-version:in-reply-to; bh=zlHDw+AQhVdMVKENIvPvuWUxClGlRoYYO4lxayNKl+4=; b=ESZyfpccY+ENZL31oqU0SrzN4PPw2uAs8dhWGXz7LDe760ZZvvJZrVEr2wzgI27Ebl ZHd//A21bSPraE2gD0gMAvy6l0P0j/xmHwfcWzqgOxc4kEIDTOuKuWkTL1EgJ9DCjifM uEjN4fFVUiO5SVErTT0LDlcJhJskjV/ASp+65UIYGc/cJUo6ejaTIWJMIIBbFmEJ42Zg z05BHKoAeae4kD6UWzWWcAT5oK83uzEtAcre0zgvNSSXcUBROAG6wba74sQVnDvqSgY5 9KCMY+CzSPQX8e5TWFUh305V+CtnQUr7WRp70nTIbXhOCkqYio6fs+8C7ON2hQM8666t LXFA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:cc:from:message-id:date :user-agent:mime-version:in-reply-to; bh=zlHDw+AQhVdMVKENIvPvuWUxClGlRoYYO4lxayNKl+4=; b=lNMbq1dDHkC0KLknDUGsfxQ4UHKBOJrLBQIlF4dikrDm1UOtOo/nk6Tvnfy72Cly8y bRQrxzaEiicvme1/qEyU31UIPZ0Qjuh8MtRPBFqykIkOi/Ewbni1MkAgqOPnPUrR7NaQ BUKFYiwzy1ail0cD1CeJ6OvDr7H+Go3iE/PQttAzm0AB+wQalaEbTI5JY9djBj1jUBiU h0W/RPKsaHmbcD/eBpzAAhheGPJ7ejVHQ3y1AT1ImV77qQB34Mg6J1D+Yr3+IgxrHhln c2JGKbG08Bduu5T5h1pGNlyFmpbP9KRpBHXKlruCGPkNrvgR+z1fKQhCR+1HNZekX6K5 JH0A==
X-Gm-Message-State: AN3rC/7x2nff0PiAxGD1iIGDBEs6HYI7mlBMCm5BZfMr8d0Pq2D5q3jl FK30d2hHSVDRTw==
X-Received: by 10.28.74.218 with SMTP id n87mr9257650wmi.71.1493049464853; Mon, 24 Apr 2017 08:57:44 -0700 (PDT)
Received: from [192.168.1.37] (148.red-79-153-126.dynamicip.rima-tde.net. [79.153.126.148]) by smtp.googlemail.com with ESMTPSA id e129sm1055772wma.13.2017.04.24.08.57.43 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 24 Apr 2017 08:57:43 -0700 (PDT)
To: Richard Barnes <rlb@ipv.sx>
References: <49c7de34-8bc6-bb7d-4524-0af26089eecb@gmail.com> <1CF6F66C-939F-484D-8C53-46ACB8CA69BE@vidyo.com> <27ca2993-5c66-8388-7187-b47ed8ae1340@gmail.com> <CAL02cgRDaz7BT+GzxWJ0cM7rebhd2cu2WbPy+Mwjkk0wJK=6mw@mail.gmail.com>
Cc: Jonathan Lennox <jonathan@vidyo.com>, "perc@ietf.org" <perc@ietf.org>
From: Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>
Message-ID: <aef9a32f-f761-c9e8-de99-57c4acfd5088@gmail.com>
Date: Mon, 24 Apr 2017 17:57:48 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0
MIME-Version: 1.0
In-Reply-To: <CAL02cgRDaz7BT+GzxWJ0cM7rebhd2cu2WbPy+Mwjkk0wJK=6mw@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------39ADD87C8121C016C62E440F"
Archived-At: <https://mailarchive.ietf.org/arch/msg/perc/o13Ygy2FzNwdhgQN6aol5KdbTf4>
Subject: Re: [Perc] Drop support for E2E RTP header extensions
X-BeenThere: perc@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Privacy Enhanced RTP Conferencing <perc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perc>, <mailto:perc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/perc/>
List-Post: <mailto:perc@ietf.org>
List-Help: <mailto:perc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perc>, <mailto:perc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 24 Apr 2017 15:57:48 -0000

On 24/04/2017 17:52, Richard Barnes wrote:
>
>
> On Mon, Apr 24, 2017 at 11:46 AM, Sergio Garcia Murillo 
> <sergio.garcia.murillo@gmail.com 
> <mailto:sergio.garcia.murillo@gmail.com>> wrote:
>
>     On 24/04/2017 17:38, Jonathan Lennox wrote:
>
>             On Apr 24, 2017, at 6:36 AM, Sergio Garcia Murillo
>             <sergio.garcia.murillo@gmail.com
>             <mailto:sergio.garcia.murillo@gmail.com>> wrote:
>
>             Hi all,
>
>             I have seen no more activity regarding the E2E RTP header
>             issue.
>
>             Is there a consensus that they can't be supported and that
>             there is no use case for them? Does anyone have a
>             different view? Should this be discussed and agreed on
>             next virtual interim meeting?
>
>         At previous virtual interims, I believe the consensus was that
>         no one had a current use case for E2E RTP header extensions;
>         however, if we didn’t support them, retrofitting them into the
>         protocol later would be extremely difficult.  Thus, we
>         (reluctantly) decided to support them.
>
>         If they turn out to complicate the protocol too much, I
>         suppose this can be revisited.
>
>
>     Hi Jonathan, thanks for the heads up.
>
>     Apart of making protocol complex, the way that rtp header
>     extensions are supported on double encryption won't work on E2E
>     mode except on the most trivial scenarios. 
>
>
> Since we're talking about E2E protection, it seems like the only 
> scenario is "the header travels unmodified from sender to receiver".  
> It seems like this is supported in the simplest way possible; all the 
> E2E headers are grouped together, before the OHB.  Beyond the OHB, you 
> can do whatever you want.
>
> What advanced scenarios are not supported here?

RTP header extensions are negotiated on the SDP O/A, so not all 
endpoints may support same header extension, and even if they support 
same set of extensions, they may be negotiated with different ids. So it 
is impossible to support RTP header extensions E2E except in the 
scenario in which all endpoints support same subset of extensions and 
happens to be negotiated with same id.

Best regards
Sergio