Re: [Rum] draft-ietf-rum-rue-02.txt

Paul Kyzivat <pkyzivat@alum.mit.edu> Thu, 30 January 2020 18:00 UTC

Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: rum@ietfa.amsl.com
Delivered-To: rum@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A15CD1208BB for <rum@ietfa.amsl.com>; Thu, 30 Jan 2020 10:00:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=alum.mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WDlAvEmUI69e for <rum@ietfa.amsl.com>; Thu, 30 Jan 2020 10:00:25 -0800 (PST)
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (mail-bn8nam12on2089.outbound.protection.outlook.com [40.107.237.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 18CB9120816 for <rum@ietf.org>; Thu, 30 Jan 2020 10:00:24 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Dh0K/UCjSu1bRgOpuJUIxEiMLdxax2tTA50P0VcpWbyyraUTMyFDLdlC/m4w2hmTBsa6GSmg5wrWg1JbHdlUchnqO5NGKVAI8DHBdCywjZFeZQCphMY6X1nxuV+nVR8pgt5pZ1yv4rgxQK9IF1FinR5rhFeFq4TtcH2qVwUymdEeIx3LD0ODxdp2sBZE2mXzPhfpBVqvjHaGdk+DPaqF46FZK19pZAJav8cR2CBUIjg6b2Na3Orb6RNnPXfhJPLZWQys+mXu2FPKIPJWrVhLIuXTd5gX1Fv+ebK6vxt9PD5Kk2mowfaSO7y94hAfrkxwxUFAVjFDIr5Eo4TPPTIoUQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3QUU5WVwZm3SCpB8fneUAEvcjg4IwhW72JhZfIivPnA=; b=Bd1g0NXDONFJZDtFBcGENpug5A/E9wi//lkmcjLrnwifrzCw+Qk63iurtVrBLxezLiNDK4hhX2rIBhOUnoQ6LN11rpzct/QAWbuBKmi4Cz8uXw4eahkjzLk0N7S720jnjkODVseFXAheB9OxEfT9sX639ZKZRqnt43bt3eWFeeNbF/1A4Yv+jV7AfGZKPpug5AaiSdiZBD2Cqg0AZ6OaXI8GnPgkzXpg3koW9S7n+fJDt0AJw3ixbLEZ4g89SZhLq7DuUOQPzOK5ltRNxIWJKAlQRnKzqt5aD88w/2Ml0Rea2KRBseDibUVS9ccAmOYViuxdyvCJaPEnCPQUfO+G9g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 18.7.68.33) smtp.rcpttodomain=ietf.org smtp.mailfrom=alum.mit.edu; dmarc=bestguesspass action=none header.from=alum.mit.edu; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alum.mit.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3QUU5WVwZm3SCpB8fneUAEvcjg4IwhW72JhZfIivPnA=; b=dC1uF/eBAoEfpiO4EzNBJeDQUWnoBvydzdALuTZaPQuoHWQQrpqFT8E9ScmwQlTC7p4p8hJVOejLLAZJlw1emhid0cuHxEj5p/PCx+3eOvdvnV7hoO2ksHp01V/vIKYj4+Xg8qS2XSrxDYKQ4SptAkScU2EwSb7Niihp91y2jCc=
Received: from DM3PR12CA0076.namprd12.prod.outlook.com (2603:10b6:0:57::20) by DM5PR12MB2358.namprd12.prod.outlook.com (2603:10b6:4:b3::34) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2665.20; Thu, 30 Jan 2020 18:00:22 +0000
Received: from SN1NAM02FT027.eop-nam02.prod.protection.outlook.com (2a01:111:f400:7e44::200) by DM3PR12CA0076.outlook.office365.com (2603:10b6:0:57::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2665.22 via Frontend Transport; Thu, 30 Jan 2020 18:00:22 +0000
Authentication-Results: spf=pass (sender IP is 18.7.68.33) smtp.mailfrom=alum.mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=alum.mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of alum.mit.edu designates 18.7.68.33 as permitted sender) receiver=protection.outlook.com; client-ip=18.7.68.33; helo=outgoing-alum.mit.edu;
Received: from outgoing-alum.mit.edu (18.7.68.33) by SN1NAM02FT027.mail.protection.outlook.com (10.152.72.99) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2686.25 via Frontend Transport; Thu, 30 Jan 2020 18:00:21 +0000
Received: from Kokiri.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id 00UI0J1G014046 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT) for <rum@ietf.org>; Thu, 30 Jan 2020 13:00:20 -0500
To: rum@ietf.org
References: <158033443345.2803.14350232562292068648@ietfa.amsl.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <ccc9ecd9-2c73-ca5c-7e51-fce59b1e8654@alum.mit.edu>
Date: Thu, 30 Jan 2020 13:00:18 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:68.0) Gecko/20100101 Thunderbird/68.4.1
MIME-Version: 1.0
In-Reply-To: <158033443345.2803.14350232562292068648@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.7.68.33; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(39860400002)(136003)(346002)(376002)(396003)(199004)(189003)(336012)(316002)(186003)(786003)(2906002)(7596002)(36906005)(75432002)(478600001)(26826003)(246002)(31696002)(6916009)(5660300002)(86362001)(2616005)(956004)(70206006)(8936002)(8676002)(31686004)(26005)(70586007)(356004); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR12MB2358; H:outgoing-alum.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-alum.mit.edu; A:1; MX:1;
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 20125c05-4347-4b54-39c3-08d7a5ae4677
X-MS-TrafficTypeDiagnostic: DM5PR12MB2358:
X-Microsoft-Antispam-PRVS: <DM5PR12MB235885406B8B377260FE15D7F9040@DM5PR12MB2358.namprd12.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-Forefront-PRVS: 02981BE340
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: RfzLIHqEnkUOFTf9hObk24eGn4RHRcjgWDnciTiqtLebvr1DdVgXCRBdn88lC6rLUQMXJ1SZxF+qM4uDu+zIeo47tsqnZecx2Pw8kevQKQfsaYEHyxYV4e2bsxTh1kO2UFUrqbhlZu6rYWMRPL9i3U1M4QnyDJ9pSx8p48Y8EC84HypiLWg9ncsiEw4sjFx1VXLP1uM28+r7ABf6YndsK1r9pvGo5Lxru3PF8sACiUfoJBK14T7BQIU3iK/JiINaHsaNdmKz1E/oxTo6h4PqsMFVxBs6TlXOFrjWNBzlzwnNlZW69TXqcXaSoYLe3R9JT70BSJfLuOA9doGn9HhgBL3ZUX/mzVbN6t3bJCAEjBDHA2q8kIXb8KYg5fz1pDOuOpR1gCSh6NOTQVAOLOBqRhURyOMmeIknK03XoG6jQjbApzLSLGSGwLvyW2GGccI9
X-OriginatorOrg: alum.mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Jan 2020 18:00:21.9904 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 20125c05-4347-4b54-39c3-08d7a5ae4677
X-MS-Exchange-CrossTenant-Id: 3326b102-c043-408b-a990-b89e477d582f
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3326b102-c043-408b-a990-b89e477d582f; Ip=[18.7.68.33]; Helo=[outgoing-alum.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR12MB2358
Archived-At: <https://mailarchive.ietf.org/arch/msg/rum/n9Yi6-02NIWSKhr6vjPuDhrJ_JA>
Subject: Re: [Rum] draft-ietf-rum-rue-02.txt
X-BeenThere: rum@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Relay User Machine <rum.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rum>, <mailto:rum-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rum/>
List-Post: <mailto:rum@ietf.org>
List-Help: <mailto:rum-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rum>, <mailto:rum-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Jan 2020 18:00:30 -0000

Here are some further comments on -02:

This update has largely expunged separate specifications for the RUE and 
the provider server the RUE connects to in favor of talking about the 
RUE Interface that both are required to implement. In some cases that 
makes sense because the requirements are the same on both sides. In 
other cases it seems to dodge the issue that the two sides have 
different roles and responsibilities. For instance: RFC5626 (outbound), 
RFC6665 (events), RFC6442 (geoloc).

Section 5.2.1 now says:

    The all outbound calls MUST be routed through an outbound proxy if
    configured.

(It previously specified the RUE.) IIUC this really does only apply to 
the RUE. AFAIK we don't specify any configuration for the provider, and 
presumably providers can do whatever they want that works. (Also, the 
language is a bit messed up.)

Section 5.2.3 says:

    To identify the owner of a RUE, the initial INVITE for a call from a
    RUE, or the 200 OK accepting a call by a RUE, identifies the owner by
    sending a Call-Info header with a purpose parameter of "rue-owner".

This new purpose parameter needs to be registered with IANA. It 
currently isn't mentioned in section 11.

Section 5.2.5 says:

    The implementations comply with [RFC6881] for handling of emergency
    calls.

This is not a normative statement. AFAICT there is no normative 
requirement to support this. And this is another asymmetric case. (IIUC 
the provider need not include GeoLoc in outbound calls to the RUE.)

This section also uses "client" and "server" to refer to the RUE and 
Provider sides of a RUE Interface. This differs from using "client" to 
refer to UAC and "server" for UAS.

Section 5.5 and elsewhere use the following construction:

    Implementations MUST conform to ... with the understanding that ...

That language seems a bit vague to me. Is this relaxing any normative 
statements in the reference, or simply stating that only a subset of the 
standard will be used in practice? I'd like to see this tightened up 
normatively.

Section 6.3:

I think this is saying that RUEs MUST support VP8 unless they can't, 
while providers MUST *support* VP8 but need not use it in every call, 
such as when connecting to another endpoint that doesn't. I get the 
spirit, but it fails to make clear when an implementation is non-conforming.

For instance, is it acceptable for a provider's interpreters to use 
non-RUE devices that don't support VP8? Is it acceptable for the 
provider video-mail server to not support VP8?

Section 8:

IIUC this means that the provider may or may not include a "mwi" entry 
in the configuration, but if it is configured that both sides are 
required to support it as specified.

Section 9.1:

This makes it optional for a RUE to make the choice of provider 
available to the user. Is that what we want?

Section 9.3:

These schemas use the [JCR] notation. This dates back to the early 
versions of this document several years ago. At the time there was 
single accepted schema notation for JSON. JCR was under development at 
the time. I haven't kept up with what has been happening with JSON 
schemas. I just looked and it appears that 
draft-newton-json-content-rules-09 is the latest version of JCR. I don't 
know if that means it was abandoned in favor of something else. We need 
to investigate this.

	Thanks,
	Paul