Re: [rtcweb] Fwd: New Version Notification for draft-kaufman-rtp-compatible-data-00.txt

Randell Jesup <randell1@jesup.org> Wed, 06 July 2011 03:20 UTC

Return-Path: <randell1@jesup.org>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A565621F8717 for <rtcweb@ietfa.amsl.com>; Tue, 5 Jul 2011 20:20:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level:
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[AWL=0.300, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7DOOsMt36Yz4 for <rtcweb@ietfa.amsl.com>; Tue, 5 Jul 2011 20:20:49 -0700 (PDT)
Received: from arthur.webserversystems.com (arthur.webserversystems.com [174.132.191.98]) by ietfa.amsl.com (Postfix) with ESMTP id 5D94321F884F for <rtcweb@ietf.org>; Tue, 5 Jul 2011 20:20:49 -0700 (PDT)
Received: from pool-98-111-140-38.phlapa.fios.verizon.net ([98.111.140.38] helo=[192.168.1.12]) by arthur.webserversystems.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from <randell1@jesup.org>) id 1QeIfR-0005Y7-0o for rtcweb@ietf.org; Tue, 05 Jul 2011 22:20:49 -0500
Message-ID: <4E13D3CE.8070406@jesup.org>
Date: Tue, 05 Jul 2011 23:17:34 -0400
From: Randell Jesup <randell1@jesup.org>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.18) Gecko/20110616 Thunderbird/3.1.11
MIME-Version: 1.0
To: rtcweb@ietf.org
References: <20110630004852.10947.88695.idtracker@ietfa.amsl.com> <910D1894-3B1D-49CA-BAEF-9F50FF2B4ADB@skype.net>
In-Reply-To: <910D1894-3B1D-49CA-BAEF-9F50FF2B4ADB@skype.net>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - arthur.webserversystems.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - jesup.org
X-Source:
X-Source-Args:
X-Source-Dir:
Subject: Re: [rtcweb] Fwd: New Version Notification for draft-kaufman-rtp-compatible-data-00.txt
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Jul 2011 03:20:51 -0000

On 6/29/2011 8:50 PM, Matthew Kaufman wrote:
> I wrote up a method for sending unreliable datagrams to the same port 
> as is being used for RTP, RTCP and STUN that does not conflict with 
> this usage. It also addresses the security issues involved in allowing 
> arbitrary datagrams to be sent.
http://www.ietf.org/id/draft-kaufman-rtp-compatible-data-00.txt

|    One alternative considered was to encapsulate the arbitrary datagrams
|    within RTP as an RTP payload type.  However the semantics associated
|    with RTP are not always appropriate, depending on the type of
|    arbitrary data being transmitted.

This needs to be expanded on.  Why are they not appropriate?  (Not 
disagreeing, but state it please.)

If this data traverses various SBC/midboxes/NATs-with-ALGs/etc, will the 
apparent "invalid" nature cause possible breakage?

| 5.  Security Considerations
|
|    The contents of these messages SHOULD be encrypted.  Reuse of the
|    keying used for an associated RTP session that is using the same IP
|    address and port MAY be an acceptable method of key specification and
|    cryptosystem choice.

I'd say "The User Message Data of these messages"... to avoid confusion 
about encryption of the
all-zeros 4-byte header.

Also: should it say anything about authentication?

Congestion control needs to be discussed, even if it's to say that it's 
the job of a higher or application layer to define.  I do want to as 
part of rtcweb design make congestion handling be unified, whether or 
not we use a single port (though we probably should use 1 port).

-- 
Randell Jesup
randell-ietf@jesup.org