Re: [Rum] draft-ietf-rum-rue-02.txt
Paul Kyzivat <pkyzivat@alum.mit.edu> Thu, 30 January 2020 18:00 UTC
Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: rum@ietfa.amsl.com
Delivered-To: rum@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A15CD1208BB for <rum@ietfa.amsl.com>; Thu, 30 Jan 2020 10:00:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=alum.mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WDlAvEmUI69e for <rum@ietfa.amsl.com>; Thu, 30 Jan 2020 10:00:25 -0800 (PST)
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2089.outbound.protection.outlook.com [40.107.237.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18CB9120816 for <rum@ietf.org>; Thu, 30 Jan 2020 10:00:24 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Dh0K/UCjSu1bRgOpuJUIxEiMLdxax2tTA50P0VcpWbyyraUTMyFDLdlC/m4w2hmTBsa6GSmg5wrWg1JbHdlUchnqO5NGKVAI8DHBdCywjZFeZQCphMY6X1nxuV+nVR8pgt5pZ1yv4rgxQK9IF1FinR5rhFeFq4TtcH2qVwUymdEeIx3LD0ODxdp2sBZE2mXzPhfpBVqvjHaGdk+DPaqF46FZK19pZAJav8cR2CBUIjg6b2Na3Orb6RNnPXfhJPLZWQys+mXu2FPKIPJWrVhLIuXTd5gX1Fv+ebK6vxt9PD5Kk2mowfaSO7y94hAfrkxwxUFAVjFDIr5Eo4TPPTIoUQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3QUU5WVwZm3SCpB8fneUAEvcjg4IwhW72JhZfIivPnA=; b=Bd1g0NXDONFJZDtFBcGENpug5A/E9wi//lkmcjLrnwifrzCw+Qk63iurtVrBLxezLiNDK4hhX2rIBhOUnoQ6LN11rpzct/QAWbuBKmi4Cz8uXw4eahkjzLk0N7S720jnjkODVseFXAheB9OxEfT9sX639ZKZRqnt43bt3eWFeeNbF/1A4Yv+jV7AfGZKPpug5AaiSdiZBD2Cqg0AZ6OaXI8GnPgkzXpg3koW9S7n+fJDt0AJw3ixbLEZ4g89SZhLq7DuUOQPzOK5ltRNxIWJKAlQRnKzqt5aD88w/2Ml0Rea2KRBseDibUVS9ccAmOYViuxdyvCJaPEnCPQUfO+G9g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 18.7.68.33) smtp.rcpttodomain=ietf.org smtp.mailfrom=alum.mit.edu; dmarc=bestguesspass action=none header.from=alum.mit.edu; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alum.mit.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3QUU5WVwZm3SCpB8fneUAEvcjg4IwhW72JhZfIivPnA=; b=dC1uF/eBAoEfpiO4EzNBJeDQUWnoBvydzdALuTZaPQuoHWQQrpqFT8E9ScmwQlTC7p4p8hJVOejLLAZJlw1emhid0cuHxEj5p/PCx+3eOvdvnV7hoO2ksHp01V/vIKYj4+Xg8qS2XSrxDYKQ4SptAkScU2EwSb7Niihp91y2jCc=
Received: from DM3PR12CA0076.namprd12.prod.outlook.com (2603:10b6:0:57::20) by DM5PR12MB2358.namprd12.prod.outlook.com (2603:10b6:4:b3::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2665.20; Thu, 30 Jan 2020 18:00:22 +0000
Received: from SN1NAM02FT027.eop-nam02.prod.protection.outlook.com (2a01:111:f400:7e44::200) by DM3PR12CA0076.outlook.office365.com (2603:10b6:0:57::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2665.22 via Frontend Transport; Thu, 30 Jan 2020 18:00:22 +0000
Authentication-Results: spf=pass (sender IP is 18.7.68.33) smtp.mailfrom=alum.mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=alum.mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of alum.mit.edu designates 18.7.68.33 as permitted sender) receiver=protection.outlook.com; client-ip=18.7.68.33; helo=outgoing-alum.mit.edu;
Received: from outgoing-alum.mit.edu (18.7.68.33) by SN1NAM02FT027.mail.protection.outlook.com (10.152.72.99) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2686.25 via Frontend Transport; Thu, 30 Jan 2020 18:00:21 +0000
Received: from Kokiri.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id 00UI0J1G014046 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT) for <rum@ietf.org>; Thu, 30 Jan 2020 13:00:20 -0500
To: rum@ietf.org
References: <158033443345.2803.14350232562292068648@ietfa.amsl.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <ccc9ecd9-2c73-ca5c-7e51-fce59b1e8654@alum.mit.edu>
Date: Thu, 30 Jan 2020 13:00:18 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:68.0) Gecko/20100101 Thunderbird/68.4.1
MIME-Version: 1.0
In-Reply-To: <158033443345.2803.14350232562292068648@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.7.68.33; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(39860400002)(136003)(346002)(376002)(396003)(199004)(189003)(336012)(316002)(186003)(786003)(2906002)(7596002)(36906005)(75432002)(478600001)(26826003)(246002)(31696002)(6916009)(5660300002)(86362001)(2616005)(956004)(70206006)(8936002)(8676002)(31686004)(26005)(70586007)(356004); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR12MB2358; H:outgoing-alum.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-alum.mit.edu; A:1; MX:1;
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 20125c05-4347-4b54-39c3-08d7a5ae4677
X-MS-TrafficTypeDiagnostic: DM5PR12MB2358:
X-Microsoft-Antispam-PRVS: <DM5PR12MB235885406B8B377260FE15D7F9040@DM5PR12MB2358.namprd12.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-Forefront-PRVS: 02981BE340
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: RfzLIHqEnkUOFTf9hObk24eGn4RHRcjgWDnciTiqtLebvr1DdVgXCRBdn88lC6rLUQMXJ1SZxF+qM4uDu+zIeo47tsqnZecx2Pw8kevQKQfsaYEHyxYV4e2bsxTh1kO2UFUrqbhlZu6rYWMRPL9i3U1M4QnyDJ9pSx8p48Y8EC84HypiLWg9ncsiEw4sjFx1VXLP1uM28+r7ABf6YndsK1r9pvGo5Lxru3PF8sACiUfoJBK14T7BQIU3iK/JiINaHsaNdmKz1E/oxTo6h4PqsMFVxBs6TlXOFrjWNBzlzwnNlZW69TXqcXaSoYLe3R9JT70BSJfLuOA9doGn9HhgBL3ZUX/mzVbN6t3bJCAEjBDHA2q8kIXb8KYg5fz1pDOuOpR1gCSh6NOTQVAOLOBqRhURyOMmeIknK03XoG6jQjbApzLSLGSGwLvyW2GGccI9
X-OriginatorOrg: alum.mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jan 2020 18:00:21.9904 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 20125c05-4347-4b54-39c3-08d7a5ae4677
X-MS-Exchange-CrossTenant-Id: 3326b102-c043-408b-a990-b89e477d582f
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3326b102-c043-408b-a990-b89e477d582f; Ip=[18.7.68.33]; Helo=[outgoing-alum.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR12MB2358
Archived-At: <https://mailarchive.ietf.org/arch/msg/rum/n9Yi6-02NIWSKhr6vjPuDhrJ_JA>
Subject: Re: [Rum] draft-ietf-rum-rue-02.txt
X-BeenThere: rum@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Relay User Machine <rum.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rum>, <mailto:rum-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rum/>
List-Post: <mailto:rum@ietf.org>
List-Help: <mailto:rum-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rum>, <mailto:rum-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jan 2020 18:00:30 -0000
Here are some further comments on -02: This update has largely expunged separate specifications for the RUE and the provider server the RUE connects to in favor of talking about the RUE Interface that both are required to implement. In some cases that makes sense because the requirements are the same on both sides. In other cases it seems to dodge the issue that the two sides have different roles and responsibilities. For instance: RFC5626 (outbound), RFC6665 (events), RFC6442 (geoloc). Section 5.2.1 now says: The all outbound calls MUST be routed through an outbound proxy if configured. (It previously specified the RUE.) IIUC this really does only apply to the RUE. AFAIK we don't specify any configuration for the provider, and presumably providers can do whatever they want that works. (Also, the language is a bit messed up.) Section 5.2.3 says: To identify the owner of a RUE, the initial INVITE for a call from a RUE, or the 200 OK accepting a call by a RUE, identifies the owner by sending a Call-Info header with a purpose parameter of "rue-owner". This new purpose parameter needs to be registered with IANA. It currently isn't mentioned in section 11. Section 5.2.5 says: The implementations comply with [RFC6881] for handling of emergency calls. This is not a normative statement. AFAICT there is no normative requirement to support this. And this is another asymmetric case. (IIUC the provider need not include GeoLoc in outbound calls to the RUE.) This section also uses "client" and "server" to refer to the RUE and Provider sides of a RUE Interface. This differs from using "client" to refer to UAC and "server" for UAS. Section 5.5 and elsewhere use the following construction: Implementations MUST conform to ... with the understanding that ... That language seems a bit vague to me. Is this relaxing any normative statements in the reference, or simply stating that only a subset of the standard will be used in practice? I'd like to see this tightened up normatively. Section 6.3: I think this is saying that RUEs MUST support VP8 unless they can't, while providers MUST *support* VP8 but need not use it in every call, such as when connecting to another endpoint that doesn't. I get the spirit, but it fails to make clear when an implementation is non-conforming. For instance, is it acceptable for a provider's interpreters to use non-RUE devices that don't support VP8? Is it acceptable for the provider video-mail server to not support VP8? Section 8: IIUC this means that the provider may or may not include a "mwi" entry in the configuration, but if it is configured that both sides are required to support it as specified. Section 9.1: This makes it optional for a RUE to make the choice of provider available to the user. Is that what we want? Section 9.3: These schemas use the [JCR] notation. This dates back to the early versions of this document several years ago. At the time there was single accepted schema notation for JSON. JCR was under development at the time. I haven't kept up with what has been happening with JSON schemas. I just looked and it appears that draft-newton-json-content-rules-09 is the latest version of JCR. I don't know if that means it was abandoned in favor of something else. We need to investigate this. Thanks, Paul
- [Rum] I-D Action: draft-ietf-rum-rue-02.txt internet-drafts
- Re: [Rum] draft-ietf-rum-rue-02.txt: Configuration Paul Kyzivat
- Re: [Rum] draft-ietf-rum-rue-02.txt: Configuration Brian Rosen
- Re: [Rum] draft-ietf-rum-rue-02.txt: Configuration Paul Kyzivat
- Re: [Rum] draft-ietf-rum-rue-02.txt Paul Kyzivat
- Re: [Rum] draft-ietf-rum-rue-02.txt: Configuration James Hamlin
- Re: [Rum] draft-ietf-rum-rue-02.txt: Configuration Paul Kyzivat
- Re: [Rum] draft-ietf-rum-rue-02.txt Brian Rosen
- Re: [Rum] draft-ietf-rum-rue-02.txt: Configuration Brian Rosen
- Re: [Rum] draft-ietf-rum-rue-02.txt Paul Kyzivat
- Re: [Rum] draft-ietf-rum-rue-02.txt Brian Rosen
- Re: [Rum] draft-ietf-rum-rue-02.txt Paul Kyzivat
- Re: [Rum] draft-ietf-rum-rue-02.txt Brian Rosen