Re: [rtcweb] [Suspected Junk Mail] Endpoints that don't support RTCP

Colin Perkins <csp@csperkins.org> Wed, 22 April 2015 22:44 UTC

Return-Path: <csp@csperkins.org>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C76A31B2C65 for <rtcweb@ietfa.amsl.com>; Wed, 22 Apr 2015 15:44:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BNi_9qKvHYgn for <rtcweb@ietfa.amsl.com>; Wed, 22 Apr 2015 15:44:20 -0700 (PDT)
Received: from balrog.mythic-beasts.com (balrog.mythic-beasts.com [IPv6:2a00:1098:0:82:1000:0:2:1]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E5D61B3AE5 for <rtcweb@ietf.org>; Wed, 22 Apr 2015 15:44:20 -0700 (PDT)
Received: from [81.187.2.149] (port=39500 helo=[192.168.0.18]) by balrog.mythic-beasts.com with esmtpsa (TLS1.0:RSA_AES_128_CBC_SHA1:128) (Exim 4.80) (envelope-from <csp@csperkins.org>) id 1Yl3NR-0004AZ-IZ; Wed, 22 Apr 2015 23:44:18 +0100
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Colin Perkins <csp@csperkins.org>
In-Reply-To: <553621A8.5000400@alvestrand.no>
Date: Wed, 22 Apr 2015 23:44:13 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <7B9A5F8B-5269-4CB3-8741-976AB7BAA9C6@csperkins.org>
References: <CAOJ7v-01DhCKewmC-Cvh4Z-jeOmi=CunisjFWceoPfk2ZM9Wgg@mail.gmail.com> <CABkgnnWvU+aYT9zgwEXCUhaO98y9kPyKwHnT=KXSr8O=knfW8w@mail.gmail.com> <CAPvvaa+SNPY+Ait2c8w9GPT-QfP7LEiuU6ejrokba93k60DdVg@mail.gmail.com> <CABkgnnW6KFuJhswLK97LE6J=9vqkf-cmeRMZOuz516ZryeSRQw@mail.gmail.com> <CAPvvaa+wid8y2h0g2040V8bSr50+rQRzpg-tCTK9EUFmtJrZYw@mail.gmail.com> <CABkgnnUt2fwdOWqTjHUjkUZN_aqAfrBW90Q4Q-EPrid4sCSWQg@mail.gmail.com> <BB960D2D-3176-4D54-8133-7F12B79DCAFA@cisco.com> <CABkgnnWuRYW8w6xCLt2dJVZ1ePxAxZWbyYqrV68cZaA2uHgmGg@mail.gmail.com> <CAOJ7v-3W7+Lfd8DCs_91K_DGaqjdyZ_qtkoQBiSO2pi-j1fuOA@mail.gmail.com> <CABkgnnXOXc+Jq4mSq02_As9ii5g_EpeRnO_sVF+OnZrLoGC9Xg@mail.gmail.com> <CAOJ7v-0niXySrvkPnSGXA5YVe_O5YVvae_8zGsEYtPqpw43UZw@mail.gmail.com> <CABkgnnWzdn9FVO27G7ioz5soLhckseAEEHV+QZJsyiTOD_sYnA@mail.gmail.com> <551A902A.9080402@alvestrand.no> <CABkgnnU+r-8UXXMVKt_eiK_hd3eutWpUXiGQ=KsGrwCxB11cMg@mail.gmail.com> <55361DCA.7000101@ericsson.com> <553621A8.5000400@alvestrand.no>
To: Harald Alvestrand <harald@alvestrand.no>
X-Mailer: Apple Mail (2.1878.6)
X-BlackCat-Spam-Score: -28
X-Mythic-Debug: Threshold = On =
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtcweb/FnVBzy23vVBamK7SESNg1dTPivk>
Cc: "rtcweb@ietf.org" <rtcweb@ietf.org>
Subject: Re: [rtcweb] [Suspected Junk Mail] Endpoints that don't support RTCP
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 Apr 2015 22:44:21 -0000

On 21 Apr 2015, at 11:08, Harald Alvestrand <harald@alvestrand.no> wrote:
> Den 21. april 2015 11:52, skrev Magnus Westerlund:
>> Hi,
>> 
>> I think I have a more specific proposal of how to deal with this case
>> regarding the circuit breakers and legacy peer end-point that don't send
>> RTCP. I think it is important that we consider these legacy gatewaying
>> cases. Unfortunately there appear to be a lot of audio RTP senders that
>> don't send RTCP.
>> 
>> Proposal:
>> 
>> In case circuit breaker #2 RTCP Timeout is triggered and;
>> - No RTCP at all has been received;
>> - This endpoint neither sends nor receive more than 72 kbps of RTP
>>   payload data on average over a 5 second window per direction;
>> 
>> then this triggering of the circuit breaker MAY be ignored. This would
>> be done if it is desired to support legacy RTP sender that lacks RTCP
>> implementations.
>> 
>> 
>> 
>> The motivation for the above formulation is really to make it clear that
>> this is only for legacy, and not create a situation where ignoring the
>> circuit breaker is okay, even if RTCP is being received, just because
>> one are in a really low-rate situation.
>> 
>> I wonder if the above should go into the RTP usage or into the circuit
>> breaker document itself?
> 
> 
> I think it belongs to advice on gatewaying, actually - and that gateways
> should be prepared to do RTCP synthesis in this situation.
> 
> Perpetuating tolerance for the broken behavior of ignoring "MUST send
> RTCP" seems like a path that doesn't lead to getting rid of the behavior
> in the end.

I tend to agree: this seems like something where the gateway ought to handle the interoperability, and synthesise appropriate RTCP. 

Or, if that's really too onerous, tie into some other consent check that can indicate that the flow is still wanted and not causing problems.

-- 
Colin Perkins
https://csperkins.org/