Re: [Sframe] Proposal: SFrame && SPacket && !SIDU

Richard Barnes <rlb@ipv.sx> Tue, 07 September 2021 19:46 UTC

Return-Path: <rlb@ipv.sx>
X-Original-To: sframe@ietfa.amsl.com
Delivered-To: sframe@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 05DDA3A11F7 for <sframe@ietfa.amsl.com>; Tue, 7 Sep 2021 12:46:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ipv-sx.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c7Ltfuqwe60z for <sframe@ietfa.amsl.com>; Tue, 7 Sep 2021 12:46:16 -0700 (PDT)
Received: from mail-qk1-x72e.google.com (mail-qk1-x72e.google.com [IPv6:2607:f8b0:4864:20::72e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 68DF63A11F5 for <sframe@ietf.org>; Tue, 7 Sep 2021 12:46:16 -0700 (PDT)
Received: by mail-qk1-x72e.google.com with SMTP id f22so128894qkm.5 for <sframe@ietf.org>; Tue, 07 Sep 2021 12:46:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipv-sx.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=+Kv8tfoiJl3mam66pZsi4ltEo00wcS0m3790BBCPmK8=; b=rg+oUjbx7Ir+rLEF7XHnH71zuaCNV/sQytd96MI8QnvQqO2DKOi357A95cvcMFg42v 8iqKP6bAgNrleXoM2fJG2ufmy2dWbu0iSkUsAN3Ypd7lHYJ0znWDTOsLQ4LK3fIIAUgB eTaBAEIwkYuHV4/A1n1snRYUG6AkDJIdhuQcg0WC6D6nMVIcmnSKDotC2KepEzfiLfY0 3ktW+60aPH7GxkDMob6Pdz6AvvFdgSOSasbTQ31XNzOK3lfFG256i7MuAwB8cw4RGrzh w5cKCe+EVubit3lDRHEP7KPLtZSKGSjp36MaKkV0zNNfUnGWKeij/uWAY5GXItb2urdd lr5w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=+Kv8tfoiJl3mam66pZsi4ltEo00wcS0m3790BBCPmK8=; b=s7iuqzggO7q3bOW/3JkNUeiA03tWAkxxCLgthj9FBz+esdJcmHVeg4BYIuv52x/UX7 cYSUEWTh0K9EP5zSe8Hlz0OiYZbb8N/AKAZ6DgLZ+N7a9s4ktQ1lugjqHmkWgzw+HdIE R+07GgYefF//f+raa8ZmePMjCYFsh+y+W+jIGntRB1s1NyN01PKhoA+FmFeqfv9Szwlc 0X3OmYeVBpCX94+M6ggLN2qFZv4+QuhnhXhqALOgIfEfjzF0GLTOg3io9uhMJUiiI6mY JCjB5BFmnwuRNQCFmPLnzQPbA+RNJGv8wvWj84xuLTCGGU6s+FFr830Q+8HJKIZYTwPz 7suQ==
X-Gm-Message-State: AOAM53246kh82efNlKI71h8mCPkdLXXo8OonMWhAXhWGQg2v+V4tPVas Ota4x4lAhsVHgg/7c5OnMNHe11p4aBmMLybyzfzhuQ==
X-Google-Smtp-Source: ABdhPJyHz7ZDg5i3LhAVcwkRyuD6D6HQ+Qlx1zV4wBvNKPPg1EXknZYbJ6nhQ2QGKxDWw9thCyAkEWyyuMx8Q/JcDHs=
X-Received: by 2002:ae9:f701:: with SMTP id s1mr17659434qkg.223.1631043974271; Tue, 07 Sep 2021 12:46:14 -0700 (PDT)
MIME-Version: 1.0
References: <CAL02cgSytJSLPziTzTOAQZFke47YrhdS381b4OmqcMPM1=Nzbw@mail.gmail.com> <CANRTqcNATCQcSyTr9Vcs3Y9uMJ1f_4FDKGo6idF9D+9ae+SX9g@mail.gmail.com>
In-Reply-To: <CANRTqcNATCQcSyTr9Vcs3Y9uMJ1f_4FDKGo6idF9D+9ae+SX9g@mail.gmail.com>
From: Richard Barnes <rlb@ipv.sx>
Date: Tue, 07 Sep 2021 15:46:02 -0400
Message-ID: <CAL02cgRmgOn1bvzLY4aFojYh306O6-BxJ3B_5Agq5KVEypACSg@mail.gmail.com>
To: Sergio Garcia Murillo <sergio.garcia.murillo@cosmosoftware.io>
Cc: sframe@ietf.org
Content-Type: multipart/alternative; boundary="000000000000b32a7505cb6d0427"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sframe/T_Z6t2x_Ijc9A20mRjbeKJFPbD4>
Subject: Re: [Sframe] Proposal: SFrame && SPacket && !SIDU
X-BeenThere: sframe@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Secure Media Frames <sframe.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sframe>, <mailto:sframe-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sframe/>
List-Post: <mailto:sframe@ietf.org>
List-Help: <mailto:sframe-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sframe>, <mailto:sframe-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Sep 2021 19:46:22 -0000

I'm not totally sure what you mean by "spatial frames" here; looks like the
notion varies some by codec.  Assuming "spatial frames" are frames in the
sense of "something that comes out of depacketizater", I think we're
probably on the same page.

Maybe it would be clearer to state the proposal as: Encryption is done in
units of whole RTP payloads.  One payload for SPacket; all payloads in the
frame for SFrame.  We would not support cases where an encrypted unit would
span a partial RTP payload.  For example:

NOT OK
Payload 1: First part of SFrame unit A
Payload 2: Second part of A, first part of B
Payload 3: Second part of B

OK
Payload 1: SFrame unit A
Payload 2: First part of Sframe unit B
Payload 3: Second part of B

Does that line up with what you have in mind?

--Richard

On Mon, Sep 6, 2021 at 2:53 PM Sergio Garcia Murillo <
sergio.garcia.murillo@cosmosoftware.io> wrote:

> Hi Richard,
>
> Just one minor comment, the "media frames", should be spatial frames if
> SVC is used so an SFU is able to not forward all spatial layers to the
> receiver. Apart from that, I am ok with removing "SIDUs" from the scope.
>
> Best regards
> Sergio
>
> On Thu, Sep 2, 2021 at 10:20 PM Richard Barnes <rlb@ipv.sx> wrote:
>
>> Hi folks,
>>
>> I'd like to see if we can agree to limit our scope a bit.  There has been
>> discussion of multiple levels at which SFrame could be applied:
>>
>> * "SFrame" - Whole media frames
>> * "SPacket" - Individual RTP media payloads
>> * "SIDU" - Some codec-specific "independently decodeable units"
>>
>> I'd like to propose that we take "SIDU" off of the table, but keep the
>> other two.
>>
>> It seems like SFrame and SPacket both have strengths in certain scenarios
>> (depending on how you want to trade off bandwidth vs. complexity), but
>> they're both pretty straightforward in terms of how they integrate with the
>> media processing pipeline.  In particular, they don't have any
>> codec-dependence.  SIDU, by contrast, seems like a world of pain.  It
>> requires that the encryption scheme be entangled with the codec, which
>> requires special per-codec integration logic in the specifications.  And
>> the bandwidth gains for all that complexity are not that large.
>>
>> Is there anyone here who feels that SIDU is something this group needs to
>> spend time specifying?
>>
>> --Richard
>> --
>> Sframe mailing list
>> Sframe@ietf.org
>> https://www.ietf.org/mailman/listinfo/sframe
>>
>