Re: [Rum] IPv6

Ed Sayers <ed.sayers@purple.us> Wed, 01 September 2021 08:43 UTC

Return-Path: <ed.sayers@purple.us>
X-Original-To: rum@ietfa.amsl.com
Delivered-To: rum@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BC783A11CB for <rum@ietfa.amsl.com>; Wed, 1 Sep 2021 01:43:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=purplenetwork.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j5dFTMbDiPAv for <rum@ietfa.amsl.com>; Wed, 1 Sep 2021 01:43:22 -0700 (PDT)
Received: from stmail.purple.us (stmail.purple.us [54.177.79.196]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B38D3A11C7 for <rum@ietf.org>; Wed, 1 Sep 2021 01:43:18 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by stmail.purple.us (Postfix) with ESMTP id CE0521A1C55; Wed, 1 Sep 2021 03:49:02 -0500 (CDT)
Authentication-Results: stmail.purple.us; dkim=pass (1024-bit rsa key sha256) header.d=purplenetwork.onmicrosoft.com header.i=@purplenetwork.onmicrosoft.com header.b=UW41PQxc header.a=rsa-sha256 header.s=selector2-PurpleNetwork-onmicrosoft-com x-bits=1024; x-trusted-ip=pass
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12lp2049.outbound.protection.outlook.com [104.47.66.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by stmail.purple.us (Postfix) with ESMTPS id 1BA901A1C42; Wed, 1 Sep 2021 03:49:02 -0500 (CDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OLXt00Q/BE5yG35nQeKmgv50jVEWCFxpxKLPLgblNbEnTUkZT0me8JYP3Vl2EtfK9b6hMWnRBAHWeD7ORT0b9geO24xvhfV/JLtXtL3nxwVFXv/apQiD3mpyykD1f0hVpdg5A6C4MfI8zXXtBNPRD5/e3M8znQm6UGCISYaEjghnEHXfGRtH3A7v392jciWCUUqWh7e5UOzGNUrc2xU64ZWnoHE6haMVrmTxv+bQGmZYrDHcVCtacvxzHs1ZLLE3uJVIHwuEt1nPIxFZxonVY02Qut1Ke9+W5WGuWkrXMe8lzWfWgDmIkI1n0vfFBdR6cFflSMliEh6aX8Xw9TqJng==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EA3QcIPahHnTUXqEawYPPQ2zgyG++WuVf8jVVexV3EE=; b=JEG2XIjKZbdvVORrMNrpbIrdsVVJVvYNOydo7Iumey1TC3C+xg/wEJQxWUAhsZERlt/0qaguF6fpw6FfihlHr5xzD3WykUZdVSq5Ctc5qqPTYw+kLk2Yp30LDWB0Vew2+G0cW5RjYr7CqL4OhPtb0SRc8TVgCy+4NQ2IWNVqBsl8dhSaMzcAC4CxsLX36DDoZA3iqcmDsPHuidc7i7gLhk7uM9AUDSuwoR4ok1UKG1lUgEosalATs4g2nowk4dsdITl4VNqueD4NF1se1aMq5TLbTeIVa1m2byrF1I7IUhBwBv3Zzg4vfPUlRrT7oFUl3gQtPTqisTo2cQNMuwt8fQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=purple.us; dmarc=pass action=none header.from=purple.us; dkim=pass header.d=purple.us; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=PurpleNetwork.onmicrosoft.com; s=selector2-PurpleNetwork-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EA3QcIPahHnTUXqEawYPPQ2zgyG++WuVf8jVVexV3EE=; b=UW41PQxc8pL7nGWuHnmHrMaYHms3x4GHQPA1ij9/yu0oubg3gux0+sZRGHGL/TbhgHwIXgYiRkRKQT/yIsp6eUoLrqIW1ePZI1TGQ0QQiSkc7okVeSaGgGyQQw9Y6JGU3LJG1meEu69JrWqLw0DJS0gExgyKA3/oxK0H3wI66JY=
Received: from DM6PR19MB3930.namprd19.prod.outlook.com (2603:10b6:5:241::9) by DM5PR19MB1241.namprd19.prod.outlook.com (2603:10b6:3:bc::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4457.23; Wed, 1 Sep 2021 08:43:13 +0000
Received: from DM6PR19MB3930.namprd19.prod.outlook.com ([fe80::b868:13d2:5289:cf4b]) by DM6PR19MB3930.namprd19.prod.outlook.com ([fe80::b868:13d2:5289:cf4b%9]) with mapi id 15.20.4457.024; Wed, 1 Sep 2021 08:43:13 +0000
From: Ed Sayers <ed.sayers@purple.us>
To: Brian Rosen <br@brianrosen.net>, "Olle E. Johansson" <oej@edvina.net>
CC: Paul Kyzivat <pkyzivat@alum.mit.edu>, "rum@ietf.org" <rum@ietf.org>
Thread-Topic: [Rum] IPv6
Thread-Index: AdeeSsUbffPyNERDROeDyEupIDr9gwABPagAAACZLwAALks9kA==
Date: Wed, 01 Sep 2021 08:43:13 +0000
Message-ID: <DM6PR19MB3930434C5C140C8034BA5944FCCD9@DM6PR19MB3930.namprd19.prod.outlook.com>
References: <DM6PR19MB39305196B68E46EAB26AD999FCCC9@DM6PR19MB3930.namprd19.prod.outlook.com> <A36E8E3C-B421-4242-B368-51D9E21907D4@edvina.net> <CAOPrzE07F2co3=-fJh6gCsY8n2KehLVOqLygF5MyW6C79rdQTw@mail.gmail.com>
In-Reply-To: <CAOPrzE07F2co3=-fJh6gCsY8n2KehLVOqLygF5MyW6C79rdQTw@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
authentication-results: brianrosen.net; dkim=none (message not signed) header.d=none;brianrosen.net; dmarc=none action=none header.from=purple.us;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 709ddd5c-d906-4844-ddca-08d96d2488f7
x-ms-traffictypediagnostic: DM5PR19MB1241:
x-microsoft-antispam-prvs: <DM5PR19MB12412D0D2F01BCE19A8C9491FCCD9@DM5PR19MB1241.namprd19.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6430;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR19MB3930.namprd19.prod.outlook.com; PTR:; CAT:NONE; SFS:(376002)(136003)(366004)(346002)(396003)(39840400004)(478600001)(99936003)(71200400001)(8676002)(6506007)(26005)(8936002)(9326002)(166002)(38070700005)(83380400001)(186003)(44832011)(33656002)(66574015)(966005)(122000001)(66946007)(53546011)(66476007)(66446008)(86362001)(7696005)(38100700002)(4326008)(66616009)(2906002)(9686003)(55016002)(110136005)(54906003)(55236004)(316002)(5660300002)(66556008)(64756008)(76116006)(52536014)(80162009); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/related; boundary="_004_DM6PR19MB3930434C5C140C8034BA5944FCCD9DM6PR19MB3930namp_"; type="multipart/alternative"
MIME-Version: 1.0
X-OriginatorOrg: purple.us
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR19MB3930.namprd19.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 709ddd5c-d906-4844-ddca-08d96d2488f7
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Sep 2021 08:43:13.1023 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 0041a4e6-62ee-427c-beeb-e6aa18257d91
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Q+iiXreifBUIm1hnDOxKjDxdw4meDMDA8Luo/rfEUNwPHcbrByMLddwyO6mDlW2aJz91HfVHUhlUPUIHXzhrzw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR19MB1241
Archived-At: <https://mailarchive.ietf.org/arch/msg/rum/RA9-mPRke7AMgT8lVlwZuNYN8YU>
Subject: Re: [Rum] IPv6
X-BeenThere: rum@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Relay User Machine <rum.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rum>, <mailto:rum-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rum/>
List-Post: <mailto:rum@ietf.org>
List-Help: <mailto:rum-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rum>, <mailto:rum-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Sep 2021 08:43:29 -0000

Hi Brian,

I am sure this is a bit rough and could do with a tidy up. I think it covers it though:

“
The RUM client MUST support RFC-6052 and RFC-7050 in order to synthesize routable IPv6 addresses. For example, when IPv4 addresses are seen in SIP signalling or SDP but IPv6 addresses are needed by the client.
“


Ed Sayers
Endpoint SDK Team Lead
Purple, a Division of ZP Better Together, LLC
purplevrs.com<https://purplevrs.com/>

[Purple is DEI certified!]
The information contained in this e-mail message is intended only for the personal and confidential use of the recipient(s) named above. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message.




From: Brian Rosen <br@brianrosen.net>
Sent: 31 August 2021 11:23
To: Olle E. Johansson <oej@edvina.net>
Cc: Ed Sayers <ed.sayers@purple.us>; Paul Kyzivat <pkyzivat@alum.mit.edu>; rum@ietf.org
Subject: Re: [Rum] IPv6

While I would be willing to work on such a document and as sipvore chair I sure it would be a welcome draft, as author and co-chit here I don’t want a mis ref to it holding up our document.

So, I am happy to include those RFCs as requirements. If you want to suggest any text beyond just making them required, I’d be happy to include it, and we can then work on a more general draft.

Brian

On Tue, Aug 31, 2021 at 6:05 AM Olle E. Johansson <oej@edvina.net<mailto:oej@edvina.net>> wrote:


> On 31 Aug 2021, at 11:53, Ed Sayers <ed.sayers@purple.us<mailto:ed.sayers@purple.us>> wrote:
>
> Hi,
>
> I have separated out IPv6 as a topic.
>
> We all know that IPv6 is the way to go, and also necessary as the IPv4 address range has all but dried up.
> However, the transition to IPv6 across the World has not been an easy one and is definitely not 'just SIP'.
>
> It is also very true to say that IPv6 needs to be embraced on endpoints; US mobile phone carriers were forced to start using IPv6 for handsets a long time ago.
> However, huge swathes of the Internet remain IPv4, because adding IPv6 to Infrastructure is not such as easy task to tackle, and because those IP addresses rarely change compared to endpoints.
>
> Again, we all agree - IPv6 is the way to go. But, IPv4, NAT64 and DNS64 are going to be needed for a long time to come.
> For many use-cases, DNS64 and NAT64 hide the transition back to the IPv4 Internet when not supported by Infrastructure.
> But, as we know, SDP include IP addresses that DNS64 and NAT64 cannot see and will not translate.
>
> Therefore, we'd like to propose for consideration that a RUM endpoint must also support the following RFCs as a possible fall back to aid the necessary transition to IPv6 over time:
> * RFC-6052 - IPv6 Addressing of IPv4/IPv6 Translators
> * RFC-7050 - Discovery of the IPv6 Prefix Used for IPv6 Address Synthesis

What makes this special for RUM? Isn’t this support needed for all SIP implementations? If this is needed for transition, I would love to see these in a  generic document for SIP - how to implement it, considerations for SIP and offer/answer as well as security considerations.

/O
>
>
> Ed Sayers
> Endpoint SDK Team Lead
> Purple, a Division of ZP Better Together, LLC
> purplevrs.com<http://purplevrs.com>
>
> The information contained in this e-mail message is intended only for the personal and confidential use of the recipient(s) named above. If you have received this communication in error, please notify us immediately by e-mail, and delete the original message.
>
>
>
>
> -----Original Message-----
> From: Rum <rum-bounces@ietf.org<mailto:rum-bounces@ietf.org>> On Behalf Of Brian Rosen
> Sent: 30 August 2021 22:24
> To: Paul Kyzivat <pkyzivat@alum.mit.edu<mailto:pkyzivat@alum.mit.edu>>
> Cc: Chad Leeper <chad.leeper@convorelay.com<mailto:chad.leeper@convorelay.com>>; rum@ietf.org<mailto:rum@ietf.org>
> Subject: Re: [Rum] IPv6 and encryption
>
> I don’t think there are ANY alternatives to SRTP.  There are alternatives to DTLS-SRTP.  There are moves within the IETF to deprecate SDES, specifically.  There is push back on that, but it’s an ongoing discussion because SDES isn’t secure enough.   Since all providers I know about anchor media, this only affects the initial hop.  Users really want to hear that their media is protected end to end (at least hop by hop) but our document doesn’t require that.  Again, we need a STANDARDS based solution, and we have to live within the constraints the IETF has for new standards with respect to security.  Like nearly every organization, the IETF is much more security conscious than it was, and won’t tolerate bad security although it often recognizes the necessity for backwards compatibility as long as it’s not to a known insecure mechanism.
>
> I really think this is a “step up to the bar” thing.  We’ve spent lots of time and cycles implementing things that turn out not to be secure enough, and we have to move forward on things that are.  DTLS-SRTP is one of those things, as is IPv6.
>
> Brian
>
>
>> On Aug 30, 2021, at 5:06 PM, Paul Kyzivat <pkyzivat@alum.mit.edu<mailto:pkyzivat@alum.mit.edu>> wrote:
>>
>> Chad,
>>
>> Welcome to the RUM WG!
>>
>> On 8/30/21 11:51 AM, Chad Leeper wrote:
>>> - While WebRTC w/ SRTP/DTLS (encryption) is an excellent idea going forward, it can't be a "MUST" requirement.  I agree with Roger Slusser that mandating compliance using MUST requires providers to implement significant development to change over to what RUM is specifying.
>>
>> The requirements in this doc will apply only to devices that claim to conform to it. Presumably you could continue to support your existing devices using whatever mechanisms they currently use. So the implementation burden is only on the server side, not the legacy device side. (Of course the FCC will have a say in this.)
>>
>> One motivation for the webrtc requirement is so that a RUE can be built on top of WebRTC. E.g., it can be a server that supports deaf users using any device with a browser. Such a server is effectively just signaling gateway that can establish a p2p link between the browser and the VRS provider server. (It does have to transcode RTT, but that is less of a burden.)
>>
>> When defining a specification for an interface that is to be implemented by independent parties it is necessary for essential functions to have at least one mandatory to implement mechanism. Currently there are no standards for connecting a RUE to a provider, so we need to pick *something* to be mandatory to implement. If you have an alternative for the media you would prefer, then please make a specific proposal.
>>
>>> - We should keep any new privacy requirements very minimal at this time.  While companies in the EU have already created their systems in compliance with the GDPR, most of the world hasn't created an equivalent yet.  So what may look like an easy change to EU implementers may be a dramatic change for others.
>>
>> I don't think we have said much about privacy of retained data. But we are concerned that the media and signaling be private between the RUE and the provider. That is a low bar these days. It is unlikely that anything less could be approved. I expect the FCC will agree.
>>
>> If you have an alternate proposal that achieves that then make a proposal we can discuss.
>>
>>      Thanks,
>>      Paul
>>
>>> On Fri, Aug 27, 2021 at 3:16 PM Paul Kyzivat <pkyzivat@alum.mit.edu<mailto:pkyzivat@alum.mit.edu> <mailto:pkyzivat@alum.mit.edu<mailto:pkyzivat@alum.mit.edu>>> wrote:
>>>   Providers,
>>>   My request below to Roger should have been broader. You all seem to
>>>   have
>>>   the same issue. I encourage any/all of you to make an alternative
>>>   proposal here. Just saying "we don't like what is there" isn't helpful
>>>   without an alternative.
>>>            Thanks,
>>>            Paul
>>>   On 8/26/21 5:40 PM, Paul Kyzivat wrote:
>>>> Roger,
>>>>
>>>> On 8/26/21 3:30 PM, Roger Slusser wrote:
>>>>
>>>>> Most providers already support encryption and IPV6 on a limited
>>>   scope,
>>>>> not necessarily the way it is defined in RUM spec. Mandating
>>>>> compliance using MUST requires providers to discard sometimes huge
>>>>> amounts of development to change over to what RUM is specifying.
>>>   The
>>>>> push back is not about doing these things it is about the loss of
>>>>> time, effort and money to do them in the way RUM mandates with
>>>   MUSTs.
>>>>
>>>> Do you think there is something else we could write in this spec
>>>   that
>>>> covers encryption and IPv6 in a way that is less burdensome for
>>>> providers while remaining interoperable with all providers?
>>>>
>>>> If so, can you please spell it out?
>>>   --     Rum mailing list
>>>   Rum@ietf.org<mailto:Rum@ietf.org> <mailto:Rum@ietf.org<mailto:Rum@ietf.org>>
>>>   https://www.ietf.org/mailman/listinfo/rum
>>>   <https://www.ietf.org/mailman/listinfo/rum>
>>
>> --
>> Rum mailing list
>> Rum@ietf.org<mailto:Rum@ietf.org>
>> https://www.ietf.org/mailman/listinfo/rum
>
> --
> Rum mailing list
> Rum@ietf.org<mailto:Rum@ietf.org>
> https://www.ietf.org/mailman/listinfo/rum
> --
> Rum mailing list
> Rum@ietf.org<mailto:Rum@ietf.org>
> https://www.ietf.org/mailman/listinfo/rum