Re: [Sframe] [dispatch] Magnus Westerlund's Block on charter-ietf-sframe-00-00: (with BLOCK and COMMENT)

Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com> Fri, 11 September 2020 10:04 UTC

Return-Path: <sergio.garcia.murillo@gmail.com>
X-Original-To: sframe@ietfa.amsl.com
Delivered-To: sframe@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98C403A0D72; Fri, 11 Sep 2020 03:04:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.047
X-Spam-Level:
X-Spam-Status: No, score=-3.047 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.948, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yZE6345KQL00; Fri, 11 Sep 2020 03:04:07 -0700 (PDT)
Received: from mail-wr1-x42f.google.com (mail-wr1-x42f.google.com [IPv6:2a00:1450:4864:20::42f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3579B3A0D78; Fri, 11 Sep 2020 03:04:07 -0700 (PDT)
Received: by mail-wr1-x42f.google.com with SMTP id z1so10888485wrt.3; Fri, 11 Sep 2020 03:04:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=Z93yAL/eJzU4jl5Ta0Xsk1TPP7NIP7Hu12BbivJcyCk=; b=ntuVq6v1wc9Hc+hNrEs727jQEHgyRYSpRg4GOSk3gyMEWpi3ApHErg3nyX65C2WJT0 WCYU5hP/nJIHElcTJUTNg1jxkHsXW8+dvBhgSTWnhVQHyrkQ9hS0lNqfwyHIhslaKLXC a/4f/I7Y41oZNdD7jOjEUWt008wHDmqE3NMZov5ZDg2bCHubFeDC3wYQIWaAwSg9q0Qy CBPCNkRkQQegzbuBJTdzOKMjPSMWjcfuJ01pru2iqx1GchN5j01y6xlcTm9GSoefpoWL w1IGVvudaF3k1kwmZSmrX3XpiDHGTWLYJ41R/4jX4Y/aIScwe/HQK1JL0P7MyX2rbTLd y86w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=Z93yAL/eJzU4jl5Ta0Xsk1TPP7NIP7Hu12BbivJcyCk=; b=jn0+gCmdGSecW54mdDhY/OWAxcadnSQb1JZtZom9Eh/kxeDDpChj7W6fVMhEXWUzpa Zia2db5KjoxddBK7aNGeQF/fBnqxbES0J+7VG8bZF6w0/JdSd+qzbDv760U1DgX2Fsg0 7fwyMA0ioWWtY4wE6OSfQtNODDmQBscvbRUYxj2ReAQSpwVZMQmAqyn4qUsPQGz4ttAT BBk6hylMDfg3Hb+PqEFySDmJ8B6ZL81uzFnMp6G3fQw37cnNzL+uuBeMuXO+9FZZ2wVb LvK5MG6WnoySZbQAoRnYTzSvtj6oJ4ZUwK4/f4AvQEgROyuErqFiM/XfIn2KaWG1so1T sgnw==
X-Gm-Message-State: AOAM530R8dOTx0Cw2vyZNwvIjAo0gECOHH+ld+JOkPEuhH2X1Bp3FSXG ktXKNnuQI55TJhq+jgkqDInBTBm6/y6YfaVa
X-Google-Smtp-Source: ABdhPJz14pYiZ/y8OfiHHlRIhuA6SJCtVWVLgcjpZQrA5Fp89CHKG3SkimNkj74zKGgA0iJNq7wFFA==
X-Received: by 2002:adf:dc47:: with SMTP id m7mr1278310wrj.100.1599818645239; Fri, 11 Sep 2020 03:04:05 -0700 (PDT)
Received: from [192.168.0.11] (79.108.125.160.dyn.user.ono.com. [79.108.125.160]) by smtp.googlemail.com with ESMTPSA id p11sm3322304wma.11.2020.09.11.03.04.04 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 11 Sep 2020 03:04:04 -0700 (PDT)
To: Magnus Westerlund <magnus.westerlund=40ericsson.com@dmarc.ietf.org>, "sergio.garcia.murillo@cosmosoftware.io" <sergio.garcia.murillo@cosmosoftware.io>, "rlb@ipv.sx" <rlb@ipv.sx>
Cc: "sframe-chairs@ietf.org" <sframe-chairs@ietf.org>, "dispatch@ietf.org" <dispatch@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "sframe@ietf.org" <sframe@ietf.org>
References: <159949693494.2875.16993532753477402380@ietfa.amsl.com> <CAL02cgS=y7mBt10n+jCGwUoy54eeH9ZXFijQdDSKk5Qt9mNrUw@mail.gmail.com> <e0b5dc1c04ab6b5cee2c88b5b1b348d7c70a5d4c.camel@ericsson.com> <a3fbe87c-d60b-23f1-2968-c7ac6ad50ea4@cosmosoftware.io> <5c6c96621b29ebf4b1f84e53ae3a414c9d0ec3a5.camel@ericsson.com>
From: Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>
Message-ID: <05085c6c-0c30-a407-8f41-b6c9be8100bc@gmail.com>
Date: Fri, 11 Sep 2020 12:04:03 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.12.0
MIME-Version: 1.0
In-Reply-To: <5c6c96621b29ebf4b1f84e53ae3a414c9d0ec3a5.camel@ericsson.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/sframe/oVi6wOu5Z6qs4pQ13FxtSFdnYzk>
Subject: Re: [Sframe] [dispatch] Magnus Westerlund's Block on charter-ietf-sframe-00-00: (with BLOCK and COMMENT)
X-BeenThere: sframe@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <sframe.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sframe>, <mailto:sframe-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sframe/>
List-Post: <mailto:sframe@ietf.org>
List-Help: <mailto:sframe-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sframe>, <mailto:sframe-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Sep 2020 10:04:10 -0000

On 11/09/2020 9:39, Magnus Westerlund wrote:
> Hi,
>
> I think we are making good progress here.
>
> On Fri, 2020-09-11 at 04:25 +0200, Sergio Garcia Murillo wrote:
>> On 10/09/2020 17:26, Magnus Westerlund wrote:
>>
>>> [...] However, the issue I really reacted to here is the fact that the
>>> charter is
>>> stating that it should do an RTP payload format. When doing an RTP payload
>>> format I think it is pre-mature of the charter to say that the signalling
>>> required for the RTP payload foramt is out of scope. I think that needs to
>>> be
>>> part of the process to discuss in the RTP payload format how an RTP
>>> middlebox
>>> can use the payload format, and any RTP extension like frame marking to
>>> figure
>>> out what to do when switching. That RTP payload format will require some
>>> configuration capability to be able to work.
>>>
>>> So what I am really asking for is the removable of the restriction that
>>> prevents
>>> a regular RTP payload format design work. And stating that SDP is out of
>>> scope
>>> implies that to me in the direct context of the payload format.
>>
>> I agree. As I read the charter, SDP is out of the scope for
>> negotiating/signaling the usage of SFrame and the parameters that may be
>> used for encryption/decryption.
> The signalling for what is in the SFRAME is out of scope also.
>
> So do I assume correctly that the idea is that the application layer using
> SFRAME if it haves multiple independent or sets of dependent streams there will
> be no support for that aspect in SFRAME layer? Instead it is up to the
> application to put such information to either put it inside the encapsualted
> part of the SFRAME or map it to the lower transport layer, like to RTP SSRCs and
> extension information.


If i understood you correctly, SFrame is kind of agnostic to the media 
streams. Currently it has a single global frame counter for all the 
transport, so the number of streams/dependency between them is not 
known/needed by SFrame.


>
>> However, if the encrypted output is going to be transmitted over RTP
>> using a new packetization format, we need to address how to negotiate
>> that in the SDP.
> Good
>
>> Note that this new packetization format will not only be alid for
>> transporting encrypted frames (SFrame or not) but even any other
>> audio/video frames.
> I understand the potential exists. However, the recommendation for RTP has been
> to try to consider Application Level Framing. In the case of SFRAME that
> consideration moves up above SFRAME in the choice of how data is split into
> SFRAMEs. However, having an RTP paylaod format for SFRAME, then that should
> carry SFRAMEs. If you starts putting in other binary objects into it, then you
> create a new demultiplexing point for format between the RTP payload format and
> the SFRAME processing. That appears unmotivated.


Note that SFRAME is not the only encryption possible with w3c insertable 
streams, it is up to the application to define its own crypto if they 
want. So the payload must be able to transport non-SFRAME opaque blobs.


>
>>
>>> [...]
>>> Maybe one way forward is to break the paragraph talking about signalling and
>>> RTP
>>> payload format into two different paragraph. Where the RTP payload format
>>> need
>>> for signalling is not associated with the higher level need for SFRAME
>>> signalling over for example a SIP system. Which I am fine with excluding
>>> explicitly.
>>>
>>> So just talking about the RTP Payload format. I think this do need a model
>>> for
>>> how an RTP SFU is going to be able to do switching on it. Shouldn't that be
>>> in
>>> scope?
>> Note that the RTP payload format may not be the one providing the
>> switching information for an SFU. It is much cleaner to carry that
>> information in a new (hop-by-hop encrypted) header extension so the
>> payload does not need to be parser by the SFU at all, so the
>> packetization can be "payload-agnostic".
>
> Yes, I agree that putting the layer dependency information into an payload
> external header extension etc is very reasonable. However, the RTP payload
> format will need to discuss this need and potentially recommend a particular
> method for carrying the dependency information within RTP.
>
> So to conlude I think there is one charter related question here.
>
> Should the RTP payload format aspect of the charter be more explicit in that it
> needs to disucss the general model of how to use SFRAME and how an application
> can use the facilities of RTP to get good performance from RTP mechanism like
> FEC and retransmission?


I don't think so, RTX and FEC frames MUST not be modified/affected by 
SFRAME/the new packetization format, so they work out of the box. We can 
be explicit about that in the chapter as a requirement.


Best regards

Sergio