Re: [Rum] draft-ietf-rum-rue-02.txt: Configuration

Paul Kyzivat <pkyzivat@alum.mit.edu> Thu, 30 January 2020 03:03 UTC

Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: rum@ietfa.amsl.com
Delivered-To: rum@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5207F12006E for <rum@ietfa.amsl.com>; Wed, 29 Jan 2020 19:03:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=alum.mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4_SISkOUkNPG for <rum@ietfa.amsl.com>; Wed, 29 Jan 2020 19:03:08 -0800 (PST)
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-eopbgr750080.outbound.protection.outlook.com [40.107.75.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2945C12006D for <rum@ietf.org>; Wed, 29 Jan 2020 19:03:08 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=WBkv+9a030HAt+YJXRePXaSQAVTKlR+PuBXDFp1UGRYrAjug00kkSKC1HcBLeYs6WcaHLsv+hTgR1a6zbu++2BTyu0TQPjwIzUrvI9i4ofv0uG5uWjft5sNd/O7vr704F4E6YTl5BRVQI9YSzJceudSc4a3eTund0AUProSaMWUCsLheHwAuk+bMauFM1wD1wdwhrdTGYx4uqTbM66hYjECq4dG29aL+sKFY8EUr/ou/EhzhteOJiYrAH9KbwYaeXekHsN6C3r96qoxuRSSvxutp7rWzJrNfNBoy6738rocs3gSmfa6S429ImzoeQLYIwVqJuiFLoWJTKuznBF+Z9w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9wjWauOgTy28Xzbedcbny1MnL+qXJq/bEOBE5Rmxryo=; b=XB8mo0UCPGcDoIg8qeCDAeKITSNmjqw4S83zDA+42MuF0PPO9YW5B/AhCp2Uzg/B3CGQVr3pWKqGBP8KqfB5eIzzBp5S+5XOOuAa9lAOsIxxEDf5FPcoseWrkMYG9REJ0lrbDe/EOYT25rQEaen10Sj7AoMPVzfceDZ7ZDusMHx5EzYFLn2zijUNtfU7XZf61H/jb/PgsP9ttBHngzDpqJ7OdSI4fls1uNbOL4RzsLdH1OqH9OdrbKNRFiRIeeURTCQrLYiXxTRfyd/3sZNmWa1qKTJFi+TGJ6CYtfipRFW5tEtHKubzEcw+dSP3GHdK3rEMEfXskhR2oEMGZlyBKw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 18.7.68.33) smtp.rcpttodomain=brianrosen.net smtp.mailfrom=alum.mit.edu; dmarc=bestguesspass action=none header.from=alum.mit.edu; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alum.mit.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9wjWauOgTy28Xzbedcbny1MnL+qXJq/bEOBE5Rmxryo=; b=QmXZVhGrr5Nwe32aWALax6hUSqP6FY/FdQsVKsSfIAWEZdHOIvAJO1SFAJ3qA+IJbcx5b5LRVY2bnsrq78dSK81PgfqCXfq9+VpUHtXm35KHSTGCV81oX70AZa60z7x0hmIOYT8l/li6dSn1RylpjOOUuTDGF04nRC4bJ0Vymco=
Received: from MN2PR12CA0024.namprd12.prod.outlook.com (2603:10b6:208:a8::37) by DM5PR12MB1706.namprd12.prod.outlook.com (2603:10b6:3:10f::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2665.23; Thu, 30 Jan 2020 03:03:05 +0000
Received: from CY1NAM02FT028.eop-nam02.prod.protection.outlook.com (2a01:111:f400:7e45::202) by MN2PR12CA0024.outlook.office365.com (2603:10b6:208:a8::37) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2665.22 via Frontend Transport; Thu, 30 Jan 2020 03:03:05 +0000
Authentication-Results: spf=pass (sender IP is 18.7.68.33) smtp.mailfrom=alum.mit.edu; brianrosen.net; dkim=none (message not signed) header.d=none;brianrosen.net; dmarc=bestguesspass action=none header.from=alum.mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of alum.mit.edu designates 18.7.68.33 as permitted sender) receiver=protection.outlook.com; client-ip=18.7.68.33; helo=outgoing-alum.mit.edu;
Received: from outgoing-alum.mit.edu (18.7.68.33) by CY1NAM02FT028.mail.protection.outlook.com (10.152.75.132) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2686.25 via Frontend Transport; Thu, 30 Jan 2020 03:03:04 +0000
Received: from Kokiri.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id 00U332QI026714 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT); Wed, 29 Jan 2020 22:03:02 -0500
To: Brian Rosen <br@brianrosen.net>
Cc: rum@ietf.org
References: <158033443345.2803.14350232562292068648@ietfa.amsl.com> <d1156d7d-59fb-6af3-7968-822f579b9a46@alum.mit.edu> <A8D04E67-DC30-42D6-A2DA-CFEBD8E45DF9@brianrosen.net>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <d8dd3620-a086-b786-5e01-bcd5894b059f@alum.mit.edu>
Date: Wed, 29 Jan 2020 22:03:01 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:68.0) Gecko/20100101 Thunderbird/68.4.1
MIME-Version: 1.0
In-Reply-To: <A8D04E67-DC30-42D6-A2DA-CFEBD8E45DF9@brianrosen.net>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.7.68.33; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(396003)(346002)(376002)(39860400002)(136003)(199004)(189003)(246002)(31686004)(786003)(356004)(53546011)(478600001)(316002)(6916009)(70586007)(26005)(75432002)(86362001)(70206006)(8936002)(66574012)(36906005)(4326008)(186003)(5660300002)(31696002)(966005)(336012)(8676002)(2906002)(26826003)(7596002)(956004)(2616005); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR12MB1706; H:outgoing-alum.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-alum.mit.edu; A:1; MX:1;
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 5f462773-949f-49d2-913b-08d7a530ecdc
X-MS-TrafficTypeDiagnostic: DM5PR12MB1706:
X-Microsoft-Antispam-PRVS: <DM5PR12MB170609F41212D028B949CCDDF9040@DM5PR12MB1706.namprd12.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-Forefront-PRVS: 02981BE340
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-OriginatorOrg: alum.mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jan 2020 03:03:04.4313 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 5f462773-949f-49d2-913b-08d7a530ecdc
X-MS-Exchange-CrossTenant-Id: 3326b102-c043-408b-a990-b89e477d582f
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3326b102-c043-408b-a990-b89e477d582f; Ip=[18.7.68.33]; Helo=[outgoing-alum.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR12MB1706
Archived-At: <https://mailarchive.ietf.org/arch/msg/rum/0Xi3JkgFW4834ERY0GAdXKojA4Y>
Subject: Re: [Rum] draft-ietf-rum-rue-02.txt: Configuration
X-BeenThere: rum@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Relay User Machine <rum.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rum>, <mailto:rum-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rum/>
List-Post: <mailto:rum@ietf.org>
List-Help: <mailto:rum-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rum>, <mailto:rum-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jan 2020 03:03:11 -0000

On 1/29/20 6:04 PM, Brian Rosen wrote:
> The configuration file mechanism needs work.
> The current mechanism supports multiple providers in that it allows multiple username/passwords.
> That’s probably insufficient.  For example, each provider may have their own TURN server.  Probably, we want to allow any of the parameters to be either in the “top level” part of the object, in which case they apply globally, or in a per-provider part of the object in which case it only applies to that provider.

IMO that isn't good enough. It just isn't workable for a single config 
file to contain one RUE's config information for multiple providers. 
Where would it live, and who would manage it? Each provider needs to be 
able to manage its own config data.

Perhaps there should be *some* config data that is per-RUE rather than 
per-provider account, and is managed by the end user rather than the 
providers. For instance, the user might want to make his own choice of 
where to sync his address book instead of or in addition to a 
provider-managed server. But I think that could be a local config issue 
between the RUE and the user.

	Thanks,
	Paul

> There is also the issue of cleartext passwords.
> 
> I was thinking about that, but didn’t really work out a solution.  What I’m thinking about is that maybe there is a single username/password that unlocks the file, and in the file are per-provider records.  The device itself manages the encrypt and decrypt of the file.
> 
> I wondered if we could use .well-known, plus that username, to find the file at the default provider’s website, as listed in the provider file, but the user may have more than one TN at more than one default provider, so I got back to a pre-provisioned URI.
> 
> This update does address all the issues I knew about.
> 
> I got a private email that told me the example config file didn’t lint, and I found two errors that I’ll get into the next revision.  Since we’re likely to change that part of the document anyway, that’s no big deal.
> 
> Someone also asked about why we specified STUN/TURN in the config, but didn’t mention it anywhere else.  It gets into the requirements via the WebRTC transport spec, which requires ICE, which requires STUN/TURN.  So technically, it’s okay, but do we want to point that out?
> 
> Brian
> 
> 
>> On Jan 29, 2020, at 5:51 PM, Paul Kyzivat <pkyzivat@alum.mit.edu> wrote:
>>
>> Brian,
>>
>> Thanks for the update. I think I will have a number of questions once have more time for study, but I have one right off:
>>
>> Section 9 says that there is one file for device configuration. That won't make it practical for a single RUE to support a user with accounts with multiple providers. Rather, to be workable it will be necessary for there to be a configuration file for each provider that the user of the RUE uses.
>>
>> The exact mechanism for setting that up needs to be worked out. Perhaps it would be sufficient for there to be another entry, for each provider, in the provider list file that is used by the RUE to retrieve the configuration for that provider.
>>
>> 	Thanks,
>> 	Paul
>>
>> On 1/29/20 4:47 PM, internet-drafts@ietf.org wrote:
>>> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>>> This draft is a work item of the Relay User Machine WG of the IETF.
>>>          Title           : Interoperability Profile for Relay User Equipment
>>>          Author          : Brian Rosen
>>> 	Filename        : draft-ietf-rum-rue-02.txt
>>> 	Pages           : 28
>>> 	Date            : 2020-01-29
>>> Abstract:
>>>     Video Relay Service (VRS) is a term used to describe a method by
>>>     which a hearing persons can communicate with deaf/Hard of Hearing
>>>     user using an interpreter ("Communications Assistant") connected via
>>>     a videophone to the deaf/HoH user and an audio telephone call to the
>>>     hearing user.  The CA interprets using sign language on the
>>>     videophone link and voice on the telephone link.  Often the
>>>     interpreters may be supplied by a company or agency termed a
>>>     "provider" in this document.  The provider also provides a video
>>>     service that allows users to connect video devices to their service,
>>>     and subsequently to CAs and other dead/HoH users.  It is desirable
>>>     that the videophones used by the deaf/HoH/H-I user conform to a
>>>     standard so that any device may be used with any provider and that
>>>     video calls direct between deaf/HoH users work.  This document
>>>     describes the interface between a videophone and a provider.
>>> The IETF datatracker status page for this draft is:
>>> https://datatracker.ietf.org/doc/draft-ietf-rum-rue/
>>> There are also htmlized versions available at:
>>> https://tools.ietf.org/html/draft-ietf-rum-rue-02
>>> https://datatracker.ietf.org/doc/html/draft-ietf-rum-rue-02
>>> A diff from the previous version is available at:
>>> https://www.ietf.org/rfcdiff?url2=draft-ietf-rum-rue-02
>>> Please note that it may take a couple of minutes from the time of submission
>>> until the htmlized version and diff are available at tools.ietf.org.
>>> Internet-Drafts are also available by anonymous FTP at:
>>> ftp://ftp.ietf.org/internet-drafts/
>>
>> -- 
>> Rum mailing list
>> Rum@ietf.org
>> https://www.ietf.org/mailman/listinfo/rum
>