Re: [Rum] draft-ietf-rum-rue-02.txt: Configuration

Paul Kyzivat <pkyzivat@alum.mit.edu> Wed, 12 February 2020 16:50 UTC

Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: rum@ietfa.amsl.com
Delivered-To: rum@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0766120854 for <rum@ietfa.amsl.com>; Wed, 12 Feb 2020 08:50:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.7
X-Spam-Level:
X-Spam-Status: No, score=-1.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=alum.mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hu7XIdxtqHYt for <rum@ietfa.amsl.com>; Wed, 12 Feb 2020 08:50:02 -0800 (PST)
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on20604.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e88::604]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EEE62120823 for <rum@ietf.org>; Wed, 12 Feb 2020 08:50:01 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=H6sFxsaEgrGAR3CAWhT33ALQTgzYVwWE3d7B8MPymMYzi0ywIVTWupeTAqLhOCdC/GzYvrr1oiJmcjKt21EX/uCQFfgDkGmC+BhceaECmejaLjuBPMk/gGRndsQXf9VOpaDTWAVs8T3lrfkp5Ac/+YzR3OjdatqnAEp/u3RG5gsDu5oPtHQE7xJkZI8hu+HYxuoFIE5EAzD+QH+VT1ALn0sXkXGj6EJO8nd+E1LuSXiBuWUCDIr5X06PJUTnJXEv9eZlsocSoM75ukWQoUOwFLMQXNiqJWBMOUGx417z/knTDI1g++yfXYZzLd6M/VGcchF35WSQiuwfl229Jz1aNw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dw/LQ8QYFLnW+owMRl3ytfdfhY6+9Lt7dSVSFJ8JtHE=; b=HNk5DMLx04jlwU5JOWAjR0469SNw1m6lHZ9SPRvHVh4IJRsKbFsRrL2y57DHXEaUZGwuIspuR7FXRjJJ2nT36qdyejtwuWWIPJl2QVo/E7Z6PDbN0E2OCPyehDQzPswcQqnxEyUgJrfCTv6jSDjYvY0sNhCeMzyNRibIpB35pwbhY62mCzNpHmbfwIfrkitewamZOR21mPzP/wMf9xF0XWfGGrSZ9N41zzJhvCwdqtdtIztYiCBv1ynznmtraK5PJ48PW7SxP3zqYeQmGUEuigdPIQ5ZFvKETPnKrm9QKPzOP48c6rNk9nxTn/lEZVlB882g49qSv6sx8fLecAfKxg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 18.7.68.33) smtp.rcpttodomain=ietf.org smtp.mailfrom=alum.mit.edu; dmarc=bestguesspass action=none header.from=alum.mit.edu; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alum.mit.edu; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dw/LQ8QYFLnW+owMRl3ytfdfhY6+9Lt7dSVSFJ8JtHE=; b=LsbBiQdarx1PsgRjoyqrRIoB8GySo9Ho9NDO0qAqrIHWQLRuJP3SytHtc+LE/YAsLP9JHz4V94sM1POkL8MgocqRRrInGocNzPcnN56eABcRS+IrssG04fqzlbTR02BrDyh2wjG3Qxwpl06OOe41Y4aFM7pSPs2X7HHDcAbh3qI=
Received: from DM3PR12CA0046.namprd12.prod.outlook.com (2603:10b6:0:56::14) by CY4PR12MB1176.namprd12.prod.outlook.com (2603:10b6:903:38::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.27; Wed, 12 Feb 2020 16:50:00 +0000
Received: from CY1NAM02FT046.eop-nam02.prod.protection.outlook.com (2a01:111:f400:7e45::204) by DM3PR12CA0046.outlook.office365.com (2603:10b6:0:56::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2707.24 via Frontend Transport; Wed, 12 Feb 2020 16:50:00 +0000
Authentication-Results: spf=pass (sender IP is 18.7.68.33) smtp.mailfrom=alum.mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=alum.mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of alum.mit.edu designates 18.7.68.33 as permitted sender) receiver=protection.outlook.com; client-ip=18.7.68.33; helo=outgoing-alum.mit.edu;
Received: from outgoing-alum.mit.edu (18.7.68.33) by CY1NAM02FT046.mail.protection.outlook.com (10.152.74.232) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2729.22 via Frontend Transport; Wed, 12 Feb 2020 16:49:59 +0000
Received: from Kokiri.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id 01CGnvPG007831 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT) for <rum@ietf.org>; Wed, 12 Feb 2020 11:49:58 -0500
To: rum@ietf.org
References: <1581510537826.7963@purple.us>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <c52742f2-2704-89ff-2291-fe01dd536e9e@alum.mit.edu>
Date: Wed, 12 Feb 2020 11:49:57 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:68.0) Gecko/20100101 Thunderbird/68.4.2
MIME-Version: 1.0
In-Reply-To: <1581510537826.7963@purple.us>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.7.68.33; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10009020)(39860400002)(346002)(376002)(396003)(136003)(199004)(189003)(53546011)(36906005)(7596002)(966005)(8676002)(316002)(86362001)(186003)(8936002)(786003)(66574012)(336012)(356004)(26826003)(478600001)(2906002)(246002)(31696002)(5660300002)(956004)(31686004)(70586007)(2616005)(6916009)(26005)(70206006)(75432002); DIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR12MB1176; H:outgoing-alum.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-alum.mit.edu; A:1; MX:1;
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2ebceb06-130d-4822-d5e5-08d7afdb9931
X-MS-TrafficTypeDiagnostic: CY4PR12MB1176:
X-Microsoft-Antispam-PRVS: <CY4PR12MB1176F556917B00B6FBD0E8B1F91B0@CY4PR12MB1176.namprd12.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-Forefront-PRVS: 0311124FA9
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-OriginatorOrg: alum.mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Feb 2020 16:49:59.7241 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 2ebceb06-130d-4822-d5e5-08d7afdb9931
X-MS-Exchange-CrossTenant-Id: 3326b102-c043-408b-a990-b89e477d582f
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3326b102-c043-408b-a990-b89e477d582f; Ip=[18.7.68.33]; Helo=[outgoing-alum.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR12MB1176
Archived-At: <https://mailarchive.ietf.org/arch/msg/rum/zW6FgCa0atf9KOFhsIjRlrhYGJU>
Subject: Re: [Rum] draft-ietf-rum-rue-02.txt: Configuration
X-BeenThere: rum@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Relay User Machine <rum.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rum>, <mailto:rum-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rum/>
List-Post: <mailto:rum@ietf.org>
List-Help: <mailto:rum-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rum>, <mailto:rum-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Feb 2020 16:50:06 -0000

Hi James,

I'm happy to see you posting here.

On 2/12/20 7:28 AM, James Hamlin wrote:
> Brian
> 
> 
> We do need to be clear, that:-
> 
>   * A VRS user needs an account with a provider before they can use the
>     service.

With *a* provider. Given that, they can get service from another 
provider via dial around. And/or they can have accounts with multiple 
providers.

If the RUE supports connections to multiple providers, and also supports 
one-stage dial-around then the distinction between the two, at least for 
outgoing calls, will be subtle.

>   * Config settings, especially credentials and phone number, are only
>     valid for one user account, within the lifetime returned in the JSON
>     object
>   * A user-agent header should be supplied when retrieving configuration
>     so that configuration can be specific to the RUE

Agree.

The point I was trying to make is that each provider will want to 
maintain the config information for its own account. If the user has 
accounts with multiple providers, then the RUE needs to fetch the config 
information for each of them from the corresponding provider.

Separately the RUE will need common config information - notably which 
providers user has accounts with. I'm imagining that the RUE will hold 
that locally. If the user has multiple RUEs then it might be helpful to 
have some common place to store that common config information, but I 
don't know who would host it.

	Thanks,
	Paul

> Best regards
> 
> 
> James
> 
> 
> 
> 
> On 29/01/2020 23:04, Brian Rosen wrote:
>  > The configuration file mechanism needs work.
>  > The current mechanism supports multiple providers in that it allows 
> multiple username/passwords.
>  > That’s probably insufficient.  For example, each provider may have 
> their own TURN server.  Probably, we want to allow any of the parameters 
> to be either in the “top level” part of the object, in which case they 
> apply globally, or in a per-provider part of the object in which case it 
> only applies to that provider.
>  >
>  > There is also the issue of cleartext passwords.
>  >
>  > I was thinking about that, but didn’t really work out a solution.  
> What I’m thinking about is that maybe there is a single 
> username/password that unlocks the file, and in the file are 
> per-provider records.  The device itself manages the encrypt and decrypt 
> of the file.
>  >
>  > I wondered if we could use .well-known, plus that username, to find 
> the file at the default provider’s website, as listed in the provider 
> file, but the user may have more than one TN at more than one default 
> provider, so I got back to a pre-provisioned URI.
>  >
>  > This update does address all the issues I knew about.
>  >
>  > I got a private email that told me the example config file didn’t 
> lint, and I found two errors that I’ll get into the next revision.  
> Since we’re likely to change that part of the document anyway, that’s no 
> big deal.
>  >
>  > Someone also asked about why we specified STUN/TURN in the config, 
> but didn’t mention it anywhere else.  It gets into the requirements via 
> the WebRTC transport spec, which requires ICE, which requires 
> STUN/TURN.  So technically, it’s okay, but do we want to point that out?
>  >
>  > Brian
>  >
>  >
>  >> On Jan 29, 2020, at 5:51 PM, Paul Kyzivat <pkyzivat@alum.mit.edu> wrote:
>  >>
>  >> Brian,
>  >>
>  >> Thanks for the update. I think I will have a number of questions 
> once have more time for study, but I have one right off:
>  >>
>  >> Section 9 says that there is one file for device configuration. That 
> won't make it practical for a single RUE to support a user with accounts 
> with multiple providers. Rather, to be workable it will be necessary for 
> there to be a configuration file for each provider that the user of the 
> RUE uses.
>  >>
>  >> The exact mechanism for setting that up needs to be worked out. 
> Perhaps it would be sufficient for there to be another entry, for each 
> provider, in the provider list file that is used by the RUE to retrieve 
> the configuration for that provider.
>  >>
>  >>     Thanks,
>  >>     Paul
>  >>
>  >> On 1/29/20 4:47 PM, internet-drafts@ietf.org wrote:
>  >>> A New Internet-Draft is available from the on-line Internet-Drafts 
> directories.
>  >>> This draft is a work item of the Relay User Machine WG of the IETF.
>  >>>         Title           : Interoperability Profile for Relay User 
> Equipment
>  >>>         Author          : Brian Rosen
>  >>>     Filename        : draft-ietf-rum-rue-02.txt
>  >>>     Pages           : 28
>  >>>     Date            : 2020-01-29
>  >>> Abstract:
>  >>>    Video Relay Service (VRS) is a term used to describe a method by
>  >>>    which a hearing persons can communicate with deaf/Hard of Hearing
>  >>>    user using an interpreter ("Communications Assistant") connected via
>  >>>    a videophone to the deaf/HoH user and an audio telephone call to the
>  >>>    hearing user.  The CA interprets using sign language on the
>  >>>    videophone link and voice on the telephone link.  Often the
>  >>>    interpreters may be supplied by a company or agency termed a
>  >>>    "provider" in this document.  The provider also provides a video
>  >>>    service that allows users to connect video devices to their service,
>  >>>    and subsequently to CAs and other dead/HoH users.  It is desirable
>  >>>    that the videophones used by the deaf/HoH/H-I user conform to a
>  >>>    standard so that any device may be used with any provider and that
>  >>>    video calls direct between deaf/HoH users work.  This document
>  >>>    describes the interface between a videophone and a provider.
>  >>> The IETF datatracker status page for this draft is:
>  >>> https://datatracker.ietf.org/doc/draft-ietf-rum-rue/
>  >>> There are also htmlized versions available at:
>  >>> https://tools.ietf.org/html/draft-ietf-rum-rue-02
>  >>> https://datatracker.ietf.org/doc/html/draft-ietf-rum-rue-02
>  >>> A diff from the previous version is available at:
>  >>> https://www.ietf.org/rfcdiff?url2=draft-ietf-rum-rue-02
>  >>> Please note that it may take a couple of minutes from the time of 
> submission
>  >>> until the htmlized version and diff are available at tools.ietf.org.
>  >>> Internet-Drafts are also available by anonymous FTP at:
>  >>> ftp://ftp.ietf.org/internet-drafts/
>  >>
>  >> --
>  >> Rum mailing list
>  >> Rum@ietf.org
>  >> https://www.ietf.org/mailman/listinfo/rum
>  >
>  >
> 
> 
>