Re: [Sframe] I-D Action: draft-ietf-sframe-enc-02.txt

Richard Barnes <rlb@ipv.sx> Mon, 10 July 2023 22:03 UTC

Return-Path: <rlb@ipv.sx>
X-Original-To: sframe@ietfa.amsl.com
Delivered-To: sframe@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29AF8C14CE2F for <sframe@ietfa.amsl.com>; Mon, 10 Jul 2023 15:03:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.893
X-Spam-Level:
X-Spam-Status: No, score=-1.893 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ipv-sx.20221208.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P6a-j2vjImtv for <sframe@ietfa.amsl.com>; Mon, 10 Jul 2023 15:03:02 -0700 (PDT)
Received: from mail-ej1-x629.google.com (mail-ej1-x629.google.com [IPv6:2a00:1450:4864:20::629]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92DE4C17EB50 for <sframe@ietf.org>; Mon, 10 Jul 2023 15:02:45 -0700 (PDT)
Received: by mail-ej1-x629.google.com with SMTP id a640c23a62f3a-9924ac01f98so662337766b.1 for <sframe@ietf.org>; Mon, 10 Jul 2023 15:02:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipv-sx.20221208.gappssmtp.com; s=20221208; t=1689026563; x=1691618563; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=PjZSwSmhIRtzgY8B8e4ieO5XK0fPb7LkSsf9q2oUrJk=; b=dUTmC6MXdFQBxtgjpv9OvNnnSFp1Au7Z1qqnCMZdK3PZWUc752da39JexDTLzsr9xP NS1wECTbRd/pKrX2FiG3WLbN7gA8nFeC/pWGpcavOlftVp5dBLk0X/BCzF6iY+qmdmwE Mhg9/vWaNYGpVH25w7e8SbMxWP5iF6PHQu8fy3WNzKQosoHmbLoKADAIQxUpdCf9herU Eju/iSSiSP/UeYJom3zNesvDPYfJE1C/t0cTgZ9K7FNVV8nbfUxsRvrsDRKruWL8qcHl ibufgTLyhIteCkNMYRYRxvopOD9OreQpk1ArR0/7lyHfhTgfrfDOrSx/+v7KtAUhsWdC SvPg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1689026563; x=1691618563; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=PjZSwSmhIRtzgY8B8e4ieO5XK0fPb7LkSsf9q2oUrJk=; b=gmtUnGKe16zBfVa1H1Sf8SmeN7AKUQgJXwn0rpsVpwrWCfGp4SlwKgahOM1Eu3Q1hP 8HVUXirjJIglNeFsRzVtXLs3WDN5PFR4Vtv/2xFEq+kQT2dnIuU5/EXlU6ZGUnygF++3 fSo7haBPt3/U05T8FSQyYZDgKX9KxwBxEjMYbtowQseI+n6swfZo+0kd5c9TeJgHcJcS t1uKjrtZMjZdlZpCc7RdPGE+0UuMXo2+gXvstiTcBa/OsoT+pgdU/1v4X6oz+M46GTzz a4JAhkMCZsKVJQfx4sEbxG+ja8JXPEo0tPOxEdlxchiMSOxx0a4RqC+tHY4oUerr0YXC n4ZA==
X-Gm-Message-State: ABy/qLZwbJV099oOw1RI8nu5tsofB10DukvW8PQMSKzSl8M2WVHx3BUO STIqIAy7vchSRNm+8G4XXhc6U0DPnadUVR0UFvslavn80gmX75gfuVM=
X-Google-Smtp-Source: APBJJlHX+it7xho0w3G+gUoLLW55An1hSUtry9jPne5NE/nP8V+OEf+0JqZPMyYS0DEtZXh5KLID24MjTJazbEWM/9A=
X-Received: by 2002:a17:906:51c5:b0:965:ff38:2fbb with SMTP id v5-20020a17090651c500b00965ff382fbbmr15199948ejk.1.1689026562956; Mon, 10 Jul 2023 15:02:42 -0700 (PDT)
MIME-Version: 1.0
References: <168902625631.22767.10711503483421173606@ietfa.amsl.com>
In-Reply-To: <168902625631.22767.10711503483421173606@ietfa.amsl.com>
From: Richard Barnes <rlb@ipv.sx>
Date: Mon, 10 Jul 2023 18:02:31 -0400
Message-ID: <CAL02cgTSuvb9LK8sNGmPjoqdH8k81-ojHnmSM=FhrHqrQKBugA@mail.gmail.com>
To: sframe@ietf.org
Cc: i-d-announce@ietf.org
Content-Type: multipart/alternative; boundary="0000000000004d374a06002924b6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sframe/jh8Kq6SwTuILJKCKvFe7ksp4I3E>
Subject: Re: [Sframe] I-D Action: draft-ietf-sframe-enc-02.txt
X-BeenThere: sframe@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Secure Media Frames <sframe.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sframe>, <mailto:sframe-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sframe/>
List-Post: <mailto:sframe@ietf.org>
List-Help: <mailto:sframe-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sframe>, <mailto:sframe-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jul 2023 22:03:03 -0000

Hi all,

This version addresses almost all of the outstanding issues.  It does not
address the adoption call feedback, and the test vectors are now well and
truly broken.  (I just didn't have time to address these issues.)  I hope
to follow up with a new version that addresses these known issues soon,
probably about the time the I-D posting window opens back up.

In the meantime, your feedback would be helpful on a few issues I noticed
while editing:
https://github.com/sframe-wg/sframe/issues/128
https://github.com/sframe-wg/sframe/issues/129

It would probably be good if a couple of folks could go through the delta /
recently merged PRs and make sure they agree with them, since some
judgement calls were involved.

Overall, though, once we get the current issue list cleared, I believe we
will be in pretty good shape for WGLC.

Thanks,
--Richard




On Mon, Jul 10, 2023 at 5:57 PM <internet-drafts@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories. This Internet-Draft is a work item of the Secure Media Frames
> (SFRAME) WG of the IETF.
>
>    Title           : Secure Frame (SFrame)
>    Authors         : Emad Omara
>                      Justin Uberti
>                      Sergio Garcia Murillo
>                      Richard L. Barnes
>                      Youenn Fablet
>    Filename        : draft-ietf-sframe-enc-02.txt
>    Pages           : 43
>    Date            : 2023-07-10
>
> Abstract:
>    This document describes the Secure Frame (SFrame) end-to-end
>    encryption and authentication mechanism for media frames in a
>    multiparty conference call, in which central media servers (selective
>    forwarding units or SFUs) can access the media metadata needed to
>    make forwarding decisions without having access to the actual media.
>
>    The proposed mechanism differs from the Secure Real-Time Protocol
>    (SRTP) in that it is independent of RTP (thus compatible with non-RTP
>    media transport) and can be applied to whole media frames in order to
>    be more bandwidth efficient.
>
> The IETF datatracker status page for this Internet-Draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sframe-enc/
>
> There is also an HTML version available at:
> https://www.ietf.org/archive/id/draft-ietf-sframe-enc-02.html
>
> A diff from the previous version is available at:
> https://author-tools.ietf.org/iddiff?url2=draft-ietf-sframe-enc-02
>
> Internet-Drafts are also available by rsync at rsync.ietf.org:
> :internet-drafts
>
>
> --
> Sframe mailing list
> Sframe@ietf.org
> https://www.ietf.org/mailman/listinfo/sframe
>