Skip to main content

Connection Establishment for Media Anchoring (CEMA) for the Message Session Relay Protocol (MSRP)
draft-ietf-simple-msrp-cema-07

Revision differences

Document history

Date Rev. By Action
2012-08-22
07 (System) post-migration administrative database adjustment to the No Objection position for Peter Saint-Andre
2012-07-09
07 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2012-07-09
07 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2012-07-09
07 (System) IANA Action state changed to In Progress from Waiting on Authors
2012-07-09
07 (System) IANA Action state changed to Waiting on Authors from In Progress
2012-07-09
07 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent
2012-07-06
07 (System) IANA Action state changed to In Progress
2012-07-06
07 Amy Vezza State changed to Approved-announcement sent from Approved-announcement to be sent
2012-07-06
07 Amy Vezza IESG has approved the document
2012-07-06
07 Amy Vezza Closed "Approve" ballot
2012-07-06
07 Amy Vezza Ballot approval text was generated
2012-07-06
07 Amy Vezza State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2012-07-05
07 Robert Sparks [Ballot Position Update] Position for Robert Sparks has been changed to No Objection from Discuss
2012-07-03
07 Christer Holmberg New version available: draft-ietf-simple-msrp-cema-07.txt
2012-06-25
06 Christer Holmberg New version available: draft-ietf-simple-msrp-cema-06.txt
2012-05-03
05 Stephen Farrell [Ballot comment]

Thanks for addressing my discuss points, I've cleared.
2012-05-03
05 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss
2012-05-03
05 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss
2012-05-03
05 Christer Holmberg New version available: draft-ietf-simple-msrp-cema-05.txt
2012-04-17
04 Stephen Farrell
[Ballot discuss]

Thanks for addressing many of my discuss points. I think this
version is much clearer and only what were points #5 and #8 …
[Ballot discuss]

Thanks for addressing many of my discuss points. I think this
version is much clearer and only what were points #5 and #8
remain.

#5 I still don't understand how MIKEY for managing TLS-PSK
values is well-defined. The string "TLS" (still:-) does not occur
in RFC 6043.  It may be that the 3GPP docs spell this out
though - is that the case?

#8 How do MSRP endpoints figure out what authentication methods
they have in common in a way that's not attackable by an on-path
active attacker? That may be ok, but I'm afraid I'm just not
following the way this works with SDP and TLS negotiation
both in play.
2012-04-17
04 Stephen Farrell
[Ballot comment]
The TLS and MIKEY-TICKET references can't be informative.
Since Sean has a discuss on that (for TLS anyway) I'll just make
it a …
[Ballot comment]
The TLS and MIKEY-TICKET references can't be informative.
Since Sean has a discuss on that (for TLS anyway) I'll just make
it a comment here.

These comments on -03 don't seem to have been addressed so
I've left them in here:

- the term "anchor" is never really explained and it'd be good to do
that.

- hard to parse this from the top of p4: "In such cases,
middleboxes, that want to anchor the MSRP connection simply modify
the SDP c/m-line address information, similar to what it does for
non-MSRP media types" who's the last "it"?

"The CEMA extension is fully backward compatible." Seems a bit of
sales-talk. And (fully;-) backwards compatible with what?

- "Middleboxes cannot be deployed in environments that require
end-to-end SDP integrity protection or SDP encryption." I bet I
could deploy a middlebox in such an environment, perhaps not very
effectively, but I could. "Cannot" cannot be correct.
2012-04-17
04 Stephen Farrell Ballot comment and discuss text updated for Stephen Farrell
2012-04-17
04 Stephen Farrell
[Ballot discuss]
#1 cleared

As you'll see from the points below I have some issues with how
you're using TLS. Could be that some of …
[Ballot discuss]
#1 cleared

As you'll see from the points below I have some issues with how
you're using TLS. Could be that some of this is just a lack
of context on my part but I'd like to check at least.

#2  cleared

#3 cleared

#4 cleared

#5 I don't understand how MIKEY for managing TLS-PSK values is
well-defined. The string "TLS" does not occur in RFC 6043.  (I'd
just drop the MIKEY idea entirely - is anyone really gonna do that?)

#6 cleared

#7 cleared

#8 How do MSRP endpoints figure out what authentication methods
they have in common in a way that's not attackable by an on-path
active attacker? What is the list of "mechanisms" that you
mean in 7.2 (para starting with "If possible, ...")

#9 cleared

#10 cleared
2012-04-17
04 Stephen Farrell
[Ballot comment]

The TLS and MIKEY-TICKET references can't be informative.
Since Sean has a discuss on that I've left it as a comment
here.

These …
[Ballot comment]

The TLS and MIKEY-TICKET references can't be informative.
Since Sean has a discuss on that I've left it as a comment
here.

These comments on -03 don't seem to have been addressed so
I've left them in here:

- the term "anchor" is never really explained and it'd be good to do
that.

- hard to parse this from the top of p4: "In such cases,
middleboxes, that want to anchor the MSRP connection simply modify
the SDP c/m-line address information, similar to what it does for
non-MSRP media types" who's the last "it"?

- "The CEMA extension is fully backward compatible." Seems a bit of
sales-talk. And (fully;-) backwards compatible with what?

- "Middleboxes cannot be deployed in environments that require
end-to-end SDP integrity protection or SDP encryption." I bet I
could deploy a middlebox in such an environment, perhaps not very
effectively, but I could. "Cannot" cannot be correct.
2012-04-17
04 Stephen Farrell Ballot comment and discuss text updated for Stephen Farrell
2012-04-17
04 Stephen Farrell
[Ballot discuss]
#1 cleared

As you'll see from the points below I have some issues with how
you're using TLS. Could be that some of …
[Ballot discuss]
#1 cleared

As you'll see from the points below I have some issues with how
you're using TLS. Could be that some of this is just a lack
of context on my part but I'd like to check at least.

#2  cleared

#3 cleared

#4 How is the MIKEY reference not normative? 7.2 RECOMMENDS doing
either 1) TLS certs with blah (RFC 6042) or 2) MIKEY stuff. The
MIKEY RFC (RFC 6043) is informational so that's a downref.

#5 I don't understand how MIKEY for managing TLS-PSK values is
well-defined. The string "TLS" does not occur in RFC 6043.  (I'd
just drop the MIKEY idea entirely - is anyone really gonna do that?)

#6 cleared

#7 cleared

#8 How do MSRP endpoints figure out what authentication methods
they have in common in a way that's not attackable by an on-path
active attacker? What is the list of "mechanisms" that you
mean in 7.2 (para starting with "If possible, ...")

#9 cleared

#10 cleared
2012-04-17
04 Stephen Farrell Ballot discuss text updated for Stephen Farrell
2012-04-17
04 Stephen Farrell
[Ballot discuss]
#1 cleared

As you'll see from the points below I have some issues with how
you're using TLS. Could be that some of …
[Ballot discuss]
#1 cleared

As you'll see from the points below I have some issues with how
you're using TLS. Could be that some of this is just a lack
of context on my part but I'd like to check at least.

#2  cleared

#3 cleared

#4 How is the MIKEY reference not normative? 7.2 RECOMMENDS doing
either 1) TLS certs with blah (RFC 6042) or 2) MIKEY stuff. The
MIKEY RFC (RFC 6043) is informational so that's a downref.

#5 I don't understand how MIKEY for managing TLS-PSK values is
well-defined. The string "TLS" does not occur in RFC 6043.  (I'd
just drop the MIKEY idea entirely - is anyone really gonna do that?)

#6 Can you re-assure me that there are in fact implementations of
RFC 6072 and RFC 6043 (in the latter case usable for managing
TLS-PSK symmetric keys). If so, great, I'd appreciate some pointers
to those. If not, then are you really building on fiction? Wouldn't
that be a bad plan?

#7 cleared

#8 How do MSRP endpoints figure out what authentication methods
they have in common in a way that's not attackable by an on-path
active attacker? What is the list of "mechanisms" that you
mean in 7.2 (para starting with "If possible, ...")

#9 cleared

#10 cleared
2012-04-17
04 Stephen Farrell Ballot discuss text updated for Stephen Farrell
2012-04-17
04 Stephen Farrell
[Ballot discuss]
#1 cleared

As you'll see from the points below I have some issues with how
you're using TLS. Could be that some of …
[Ballot discuss]
#1 cleared

As you'll see from the points below I have some issues with how
you're using TLS. Could be that some of this is just a lack
of context on my part but I'd like to check at least.

#2  cleared

#3 cleared

#4 How is the MIKEY reference not normative? 7.2 RECOMMENDS doing
either 1) TLS certs with blah (RFC 6042) or 2) MIKEY stuff. The
MIKEY RFC (RFC 6043) is informational so that's a downref.

#5 I don't understand how MIKEY for managing TLS-PSK values is
well-defined. The string "TLS" does not occur in RFC 6043.  (I'd
just drop the MIKEY idea entirely - is anyone really gonna do that?)

#6 Can you re-assure me that there are in fact implementations of
RFC 6072 and RFC 6043 (in the latter case usable for managing
TLS-PSK symmetric keys). If so, great, I'd appreciate some pointers
to those. If not, then are you really building on fiction? Wouldn't
that be a bad plan?

#7 I don't get the trust model for "fingerprint" based
authentication for TLS. Who's including the fingerprint where and
using it to verify what self-signed cert?

#8 How do MSRP endpoints figure out what authentication methods
they have in common in a way that's not attackable by an on-path
active attacker? What is the list of "mechanisms" that you
mean in 7.2 (para starting with "If possible, ...")

#9 cleared

#10 cleared
2012-04-17
04 Stephen Farrell
[Ballot comment]
- the term "anchor" is never really explained and it'd be good to do
that.

- hard to parse this from the top …
[Ballot comment]
- the term "anchor" is never really explained and it'd be good to do
that.

- hard to parse this from the top of p4: "In such cases,
middleboxes, that want to anchor the MSRP connection simply modify
the SDP c/m-line address information, similar to what it does for
non-MSRP media types" who's the last "it"?

- "The CEMA extension is fully backward compatible." Seems a bit of
sales-talk. And (fully;-) backwards compatible with what?

- "Middleboxes cannot be deployed in environments that require
end-to-end SDP integrity protection or SDP encryption." I bet I
could deploy a middlebox in such an environment, perhaps not very
effectively, but I could. "Cannot" cannot be correct.

- In general, I'd ask you to think about describing TLS usage in section
7 from the point of view of the TLS endpoints and not based on the
various options for what a middlebox might do. I suspect that might lead to
a clearer description but hard to know unless you try.
2012-04-17
04 Stephen Farrell Ballot comment and discuss text updated for Stephen Farrell
2012-04-17
04 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-04-17
04 Christer Holmberg New version available: draft-ietf-simple-msrp-cema-04.txt
2011-12-21
03 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Nicolas Williams.
2011-12-15
03 Cindy Morgan Removed from agenda for telechat
2011-12-15
03 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation.
2011-12-15
03 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded
2011-12-15
03 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded
2011-12-15
03 Sean Turner
[Ballot comment]
s1: strike lawful intercept (I see Stephen made this a discuss otherwise I would have made it one too)

s2: Fingerprint Based TLS …
[Ballot comment]
s1: strike lawful intercept (I see Stephen made this a discuss otherwise I would have made it one too)

s2: Fingerprint Based TLS AUthentication:
    r/self-signed TLS certificate/self-signed certificate
    r/fingerprint/fingerprint (i.e., a hash of the self-signed certificate)

s2: Name Based TLS Authethication
    r/certificate authority/certification authority
    r/SubjectAltName parameter/SubjectAltName extension

s3: r/Support of the extension is optional./
      Support of the extension is OPTIONAL.

s7.2: certificates are by definition public so I'm a little confused by the following:

  1.  TLS certificates together with support of interacting with a
      Certificate Management Service [RFC6072], to which it publishes the
      public version of its own self-signed certificate and from which it
      fetches on demand the public certificates of other endpoints.

Maybe:

  1.  TLS certificates together with support of interacting with a
      Certificate Management Service [RFC6072], to which it publishes
      its self-signed certificate and from which it
      fetches on demand the self-signed certificates of other endpoints.

s7.2: (Stephen caught this too) MIKEY-TICKET is a normative reference.

s7.2: I share the same concerns Stephen has wrt the fingerprint authentication.

s7.3: Probably worth a pointer to the SIP issues based on the following:

  Even with seemingly end-to-end media integrity, at the time of the
  publication of this document there are other vulnerabilities in MSRP,
  due to vulnerabilities in the SIP signaling.
2011-12-15
03 Sean Turner
[Ballot discuss]
s7.1: I believe the following requires a normative reference to TLS:

  For backward compability, a CEMA-enabled MSRP
  endpoint MUST implement TLS. …
[Ballot discuss]
s7.1: I believe the following requires a normative reference to TLS:

  For backward compability, a CEMA-enabled MSRP
  endpoint MUST implement TLS.

s7.2: What is "a common authentication mechanism" in following:

  If possible, MSRP endpoints MUST use name-based authentication.  If
  not possible, if the MSRP endpoints support a common authentication
  mechanism, they MUST use that mechanism.  If the MSRP endpoints do
  not support such common authentication mechanism, they MUST try
  fingerprint-based authentication, which will succeed if there are no
  Middleboxes present.  If that also fails, the MSRP endpoints MUST
  either:
2011-12-15
03 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded
2011-12-15
03 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded
2011-12-14
03 Wesley Eddy [Ballot Position Update] New position, No Objection, has been recorded
2011-12-14
03 Stephen Farrell
[Ballot comment]
- the term "anchor" is never really explained and it'd be good to do
that.

- hard to parse this from the top …
[Ballot comment]
- the term "anchor" is never really explained and it'd be good to do
that.

- hard to parse this from the top of p4: "In such cases,
middleboxes, that want to anchor the MSRP connection simply modify
the SDP c/m-line address information, similar to what it does for
non-MSRP media types" who's the last "it"?

- "The CEMA extension is fully backward compatible." Seems a bit of
sales-talk. And (fully;-) backwards compatible with what?

- "Middleboxes cannot be deployed in environments that require
end-to-end SDP integrity protection or SDP encryption." I bet I
could deploy a middlebox in such an environment, perhaps not very
effectively, but I could. "Cannot" cannot be correct.

- In general, I'd ask you to think about describing TLS usage in section
7 from the point of view of the TLS endpoints and not based on the
various options for what a middlebox might do. I suspect that might lead to
a clearer description but hard to know unless you try.
2011-12-14
03 Stephen Farrell
[Ballot discuss]
#1 Lawful intercept is not a feature in this context (see rfc 2804)
I'd say just delete the phrase and you'll loose …
[Ballot discuss]
#1 Lawful intercept is not a feature in this context (see rfc 2804)
I'd say just delete the phrase and you'll loose nothing.

As you'll see from the points below I have some issues with how
you're using TLS. Could be that some of this is just a lack
of context on my part but I'd like to check at least.

#2 What name is authenticated in "name based authentication"? Would
any such name (in a cert issued by a locally trusted CA) do just
fine? 

#3 2nd para of 7.2: if an MSRP endpoint can get an "incorrect
impression" about TLS in the presence of a middlebox then how does
the MSRP endpoint ever benefit from authentication?

#4 How is the MIKEY reference not normative? 7.2 RECOMMENDS doing
either 1) TLS certs with blah (RFC 6042) or 2) MIKEY stuff. The
MIKEY RFC (RFC 6043) is informational so that's a downref.

#5 I don't understand how MIKEY for managing TLS-PSK values is
well-defined. The string "TLS" does not occur in RFC 6043.  (I'd
just drop the MIKEY idea entirely - is anyone really gonna do that?)

#6 Can you re-assure me that there are in fact implementations of
RFC 6072 and RFC 6043 (in the latter case usable for managing
TLS-PSK symmetric keys). If so, great, I'd appreciate some pointers
to those. If not, then are you really building on fiction? Wouldn't
that be a bad plan?

#7 I don't get the trust model for "fingerprint" based
authentication for TLS. Who's including the fingerprint where and
using it to verify what self-signed cert?

#8 How do MSRP endpoints figure out what authentication methods
they have in common in a way that's not attackable by an on-path
active attacker? What is the list of "mechanisms" that you
mean in 7.2 (para starting with "If possible, ...")

#9 I get the impression that the 2nd last paragraph of 7.2 is
what you think people will actually do and that all the rest
of that section is window dressing. Am I wrong? If I'm right,
then why not just plainly say that and then we can discuss
it more easily?

#10 If I'm wrong about #9: On what basis can an MSRP endpoint
pick between the two choices at the end of 7.2? What code do
I write?
2011-12-14
03 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded
2011-12-13
03 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded
2011-12-13
03 Robert Sparks
[Ballot comment]
The short title that appears on every page but the first needs to be changed. It's currently MRSP. CEMA or MSRP-CEMA would be …
[Ballot comment]
The short title that appears on every page but the first needs to be changed. It's currently MRSP. CEMA or MSRP-CEMA would be better.

In section 4.2, "either or all of the criteria" is unclear. I suggest "any of the following criteria" instead.

In 4.2 and 4.3, there are notes about resolving domain names before trying to match against addresses in c or m lines in SDP. They currently say "whether there address". I suggest "whether the address" instead.

In section 4.4 when you discuss handling multiple records from DNS, it's not clear whether all the resolved addresses must match or only one in the set must match.
2011-12-13
03 Robert Sparks
[Ballot discuss]
There are two paragraphs in section 7.2 (the ones starting "When an MSRP endpoint" and "If possible, MSRP endpoints") that need to be …
[Ballot discuss]
There are two paragraphs in section 7.2 (the ones starting "When an MSRP endpoint" and "If possible, MSRP endpoints") that need to be scoped to this extension. It might be enough to say CEMA-enabled MSRP endpoint everywhere you currently say MSRP endpoint, but that would likely make the text hard to read.

There's something wrong with the second paragraph and the list that follows it. It currently says "Check every authentication mechanism at your disposal. If they all fail, then based on local policy, decide whether you want to believe the failure is because there is a benign network that's trying to help you instead of a malicious party trying to hurt you." Is that what the document was actually trying to say? If so, then if you're going to allow an endpoint to make that decision (and I don't think you should since there's no way to tell that all the network elements are actually part of that benign network), why waste the time authenticating in the first place? Unless the paragraph intended something completely different, option 2 in the list should be removed.
2011-12-13
03 Robert Sparks [Ballot Position Update] New position, Discuss, has been recorded
2011-12-12
03 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded
2011-12-12
03 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded
2011-12-11
03 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded
2011-12-10
03 Pete Resnick
[Ballot comment]
Section 3:
  "Support of the extension is optional."

Do you mean "OPTIONAL"?

  "MSRP endpoints that
  support CEMA are required to …
[Ballot comment]
Section 3:
  "Support of the extension is optional."

Do you mean "OPTIONAL"?

  "MSRP endpoints that
  support CEMA are required to use RFC 4975 behavior in cases where
  they detect that the CEMA extension cannot be enabled."
 
Do you mean "REQUIRED"?

Section 4.1:

  In the following cases, where there is a Middlebox in the network,
  the CEMA extension cannot be used...

Do you mean "MUST NOT be used"?

Section 4.2:

  When the offerer receives an SDP answer, if the MSRP media
  description of the SDP answer does not contain an SDP 'msrp-cema'
  attribute, the offerer MUST check the criteria below.  If either or
  all of the criteria is met, the offerer MUST fallback to RFC 4975
  behavior, by sending a new SDP offer according to the procedures in
  RFC 4975 and RFC 4976.

This is mostly editorial, but since it involves 2119 language, I think it's worth fixing: The first MUST is redundant. If the offerer MUST do things based on the criteria, there is no need to say that you MUST check the criteria. (Also, "either" is the wrong word when there are more than two criteria. You meant "any".) Instead maybe:

  The offerer MUST fallback to RFC 4975 behavior, by sending a new
  SDP offer according to the procedures in RFC 4975 and RFC 4976, if
  it receives an SDP answer whose description does not contain an SDP
  'msrp-cema' attribute, any of the following criteria are met:
 
  [1...
    2...
    3...]
 
  The new offer MUST NOT contain an SDP 'msrp-cema' attribute.
2011-12-10
03 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded
2011-12-08
03 Peter Saint-Andre [Ballot Position Update] Position for Peter Saint-Andre has been changed to No Objection from Discuss
2011-12-07
03 Peter Saint-Andre
[Ballot comment]
It seems to me that the security considerations are somewhat underspecified, and I find the concept of a TLS B2BUA unsatisfying, but I …
[Ballot comment]
It seems to me that the security considerations are somewhat underspecified, and I find the concept of a TLS B2BUA unsatisfying, but I will let folks from the security area comment on those aspects of the specification.
2011-12-07
03 Peter Saint-Andre
[Ballot discuss]
Overall this is a fine document. I have a few topics I'd like to chat about.

1. Why isn't the text about RFC …
[Ballot discuss]
Overall this is a fine document. I have a few topics I'd like to chat about.

1. Why isn't the text about RFC 5952 comparison normative? Mandating a single comparison rule will improve the odds of interoperable implementations.

2. This is a rather strong statement: "Middleboxes cannot be deployed in environments that require end-to-end SDP integrity protection or SDP encryption." The introduction states that "[t]hese middleboxes anchor and control media, perform tasks such as NAT traversal, performance monitoring, lawful intercept, address domain bridging, interconnect Service Layer Agreement (SLA) policy enforcement, and so on." Do *all* of those behaviors prohibit end-to-end SDP integrity protection and SDP encryption"?

3. The actual procedures used in Fingerprint Based TLS Authentication and Name Based TLS Authentication are unspecified here, and no pointer is provided to other specifications that define these procedures. In the absence of a clear definition, how will these forms of authentication be performed?
2011-12-07
03 Peter Saint-Andre [Ballot Position Update] New position, Discuss, has been recorded
2011-12-07
03 Gonzalo Camarillo Placed on agenda for telechat - 2011-12-15
2011-12-07
03 Gonzalo Camarillo State changed to IESG Evaluation from Waiting for AD Go-Ahead.
2011-12-07
03 Gonzalo Camarillo [Ballot Position Update] New position, Yes, has been recorded for Gonzalo Camarillo
2011-12-07
03 Gonzalo Camarillo Ballot has been issued
2011-12-07
03 Gonzalo Camarillo Created "Approve" ballot
2011-11-30
03 Suresh Krishnan Request for Last Call review by GENART Completed. Reviewer: Suresh Krishnan.
2011-11-17
03 (System) State changed to Waiting for AD Go-Ahead from In Last Call.
2011-11-11
03 Amanda Baber Upon approval of this document, IANA will register the following in the
"att-field (media level only)" registry at
http://www.iana.org/assignments/sdp-parameters

msrp-cema [RFC-to-be]
2011-11-08
03 Samuel Weiler Request for Last Call review by SECDIR is assigned to Nicolas Williams
2011-11-08
03 Samuel Weiler Request for Last Call review by SECDIR is assigned to Nicolas Williams
2011-11-03
03 Jean Mahoney Request for Last Call review by GENART is assigned to Suresh Krishnan
2011-11-03
03 Jean Mahoney Request for Last Call review by GENART is assigned to Suresh Krishnan
2011-11-03
03 Amy Vezza Last call sent
2011-11-03
03 Amy Vezza
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: …
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (Connection Establishment for Media Anchoring (CEMA) for the Message Session Relay Protocol (MSRP)) to Proposed Standard


The IESG has received a request from the SIP for Instant Messaging and
Presence Leveraging Extensions WG (simple) to consider the following
document:
- 'Connection Establishment for Media Anchoring (CEMA) for the Message
  Session Relay Protocol (MSRP)'
  as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2011-11-17. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document defines a Message Session Relay Protocol (MSRP)
  extension, Connection Establishment for Media Anchoring (CEMA).
  Support of the extension is optional.  The extension allows
  middleboxes to anchor the MSRP connection, without the need for
  middleboxes to modify the MSRP messages, and thus also enables a
  secure end-to-end MSRP communication in networks where such
  middleboxes are deployed.  The document also defines a Session
  Description Protocol (SDP) attribute, 'msrp-cema', that MSRP
  endpoints use to indicate support of the CEMA extension.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-simple-msrp-cema/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-simple-msrp-cema/


No IPR declarations have been submitted directly on this I-D.


2011-11-03
03 Gonzalo Camarillo Last Call was requested
2011-11-03
03 (System) Ballot writeup text was added
2011-11-03
03 (System) Last call text was added
2011-11-03
03 Gonzalo Camarillo State changed to Last Call Requested from Publication Requested.
2011-11-03
03 Gonzalo Camarillo Last Call text changed
2011-10-18
03 Cindy Morgan
PROTO writeup for
http://tools.ietf.org/id/draft-ietf-simple-msrp-cema-03.txt: "Connection
Establishment for Media Anchoring (CEMA) for the Message Session Relay
Protocol (MSRP)"


  (1.a)  Who is the Document Shepherd for …
PROTO writeup for
http://tools.ietf.org/id/draft-ietf-simple-msrp-cema-03.txt: "Connection
Establishment for Media Anchoring (CEMA) for the Message Session Relay
Protocol (MSRP)"


  (1.a)  Who is the Document Shepherd for this document?  Has the
        Document Shepherd personally reviewed this version of the
        document and, in particular, does he or she believe this
        version is ready for forwarding to the IESG for publication?

The document shepherd for this document is Hisham Khartabil.

The document has been reviewed and is ready for forwarding to IESG for
publication.


  (1.b)  Has the document had adequate review both from key WG members
        and from key non-WG members?  Does the Document Shepherd have
        any concerns about the depth or breadth of the reviews that
        have been performed?

The document has quite a bit of review in the SIMPLE work group. While it
replaced draft-ietf-simple-msrp-sessmatch which had quite a bit of
controversy in the working group, this draft had more general agreement.
Miguel Garcia performed an SDP expert review in his capacity as an MMUSIC
chair.

The Document Shepherd does not have concerns about the depth or breadth of
the reviews.


  (1.c)  Does the Document Shepherd have concerns that the document
        needs more review from a particular or broader perspective,
        e.g., security, operational complexity, someone familiar with
        AAA, internationalization, or XML?

The document should undergo the usual Gen-ART and secdir reviews. But
otherwise the Document Shepherd does not have concerns over the level and
breadth of review for this document.


  (1.d)  Does the Document Shepherd have any specific concerns or
        issues with this document that the Responsible Area Director
        and/or the IESG should be aware of?  For example, perhaps he
        or she is uncomfortable with certain parts of the document, or
        has concerns whether there really is a need for it.  In any
        event, if the WG has discussed those issues and has indicated
        that it still wishes to advance the document, detail those
        concerns here.  Has an IPR disclosure related to this document
        been filed?  If so, please include a reference to the
        disclosure and summarize the WG discussion and conclusion on
        this issue.

The IESG should be aware that this draft assumes and non-normatively
recommends certain behaviors for middleboxes that anchor both signaling and
media. Such middlebox behavior is common, but not standardized. This concern
was brought up in the working group, but the consensus was that if a
middlebox deviates from the described behaviors, the resulting damage is no
worse than it would be if this draft was not supported.


  (1.e)  How solid is the WG consensus behind this document?  Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it?

The goal of the draft that this one replaced
(draft-ietf-simple-msrp-sessmatch) was controversial in the SIMPLE work
group. The authors of RFC4975 and 4976 initially objected to the
modification of the protocol to make it more friendly to non-standardized
middleboxes such as SBCs. However, those objections were generally secondary
to security related objections that the older draft interfered with some TLS
use cases. The working group has a consensus that the security issues do not
apply to the current draft.

In summary, draft-ietf-simple-msrp-cema-03 still extends the MSRP protocol
to make it more friendly to middleboxes such as SBCs. The work group
believes it does no incremental harm when compared with the case of using
MSRP as defined in RFC4975 in the presence of such middleboxes--which would
either result in communication failure, or the failure to anchor media at
the middlebox.


  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
        discontent?  If so, please summarize the areas of conflict in
        separate email messages to the Responsible Area Director.  (It
        should be in a separate email because this questionnaire is
        entered into the ID Tracker.)

Nobody has threatened an appeal or otherwise indicated extreme discontent
with draft-ietf-simple-msrp-cema-03.


  (1.g)  Has the Document Shepherd personally verified that the
        document satisfies all ID nits?  (See
        http://www.ietf.org/ID-Checklist.html and
        http://tools.ietf.org/tools/idnits/.)  Boilerplate checks are
        not enough; this check needs to be thorough.  Has the document
        met all formal review criteria it needs to, such as the MIB
        Doctor, media type, and URI type reviews?  If the document
        does not already indicate its intended status at the top of
        the first page, please indicate the intended status here.


The Document Shepherd believes that the document contains all needed
information.


  (1.h)  Has the document split its references into normative and
        informative?  Are there normative references to documents that
        are not ready for advancement or are otherwise in an unclear
        state?  If such normative references exist, what is the
        strategy for their completion?  Are there normative references
        that are downward references, as described in [RFC3967]?  If
        so, list these downward references to support the Area
        Director in the Last Call procedure for them [RFC3967].

The draft contains both normative and informative references. There are no
downwards references.


  (1.i)  Has the Document Shepherd verified that the document's IANA
        Considerations section exists and is consistent with the body
        of the document?  If the document specifies protocol
        extensions, are reservations requested in appropriate IANA
        registries?  Are the IANA registries clearly identified?  If
        the document creates a new registry, does it define the
        proposed initial contents of the registry and an allocation
        procedure for future registrations?  Does it suggest a
        reasonable name for the new registry?  See [RFC2434].  If the
        document describes an Expert Review process, has the Document
        Shepherd conferred with the Responsible Area Director so that
        the IESG can appoint the needed Expert during IESG Evaluation?

The Document Shepherd believes that the IANA Consideration contains the
appropriate information, and is consistent with the rest of the document.


  (1.j)  Has the Document Shepherd verified that sections of the
        document that are written in a formal language, such as XML
        code, BNF rules, MIB definitions, etc., validate correctly in
        an automated checker?

The only snippet is:

  attribute          /= msrp-cema-attr
  ;attribute defined in RFC 4566
  msrp-cema-attr    = "msrp-cema"


This has not been validated in an automated checker. One would have to
import the entire RFC4566 definition to make sense of it.

  (1.k)  The IESG approval announcement includes a Document
        Announcement Write-Up.  Please provide such a Document
        Announcement Write-Up.  Recent examples can be found in the
        "Action" announcements for approved documents.  The approval
        announcement contains the following sections:

        Technical Summary
            Relevant content can frequently be found in the abstract
            and/or introduction of the document.  If not, this may be
            an indication that there are deficiencies in the abstract
            or introduction.

RFC4976 describes how to use MSRP over special purpose MSRP relays, in order
to traverse NATs and firewalls, and to allow network policy enforcement.
However, many networks use other middleboxes for this purpose for other
SIP-signaled media, and would like to use the same middleboxes for MSRP.
This draft describes an extension to MSRP to make it easier for them to do
so.


        Working Group Summary
            Was there anything in the WG process that is worth noting?
            For example, was there controversy about particular points
            or were there decisions where the consensus was
            particularly rough?

[Note that this section is identical to the response to section (1.e)

The goal of the draft that this one replaced
(draft-ietf-simple-msrp-sessmatch) was controversial in the SIMPLE work
group. The authors of RFC4975 and 4976 initially objected to the
modification of the protocol to make it more friendly to non-standardized
middleboxes such as SBCs. However, those objections were generally secondary
to security related objections that the older draft interfered with some TLS
use cases. The working group has a consensus that the security issues do not
apply to the current draft.

In summary, draft-ietf-simple-msrp-cema-03 still extends the MSRP protocol
to make it more friendly to middleboxes such as SBCs. The work group
believes it does no incremental harm when compared with the case of using
MSRP as defined in RFC4975 in the presence of such middleboxes--which would
either result in communication failure, or the failure to anchor media at
the middlebox.


        Document Quality
            Are there existing implementations of the protocol?  Have a
            significant number of vendors indicated their plan to
            implement the specification?  Are there any reviewers that
            merit special mention as having done a thorough review,
            e.g., one that resulted in important changes or a
            conclusion that the document had no substantive issues?  If
            there was a MIB Doctor, Media Type, or other Expert Review,
            what was its course (briefly)?  In the case of a Media Type
            Review, on what date was the request posted?

Multiple participants have implemented or indicated an intent to implement
it.

        Personnel
            Who is the Document Shepherd for this document?  Who is the
            Responsible Area Director?  If the document requires IANA
            experts(s), insert 'The IANA Expert(s) for the registries
            in this document are .'

The document shepherd for this document is Hisham Khartabil.

The responsible Area Director is Gonzalo Camarillo.

The IANA Expert(s) for the registries in this document are .
2011-10-18
03 Cindy Morgan Draft added in state Publication Requested
2011-10-18
03 Cindy Morgan [Note]: 'Hisham Khartabil (hisham.khartabil@gmail.com) is the document shepherd.' added
2011-10-18
03 Cindy Morgan Earlier history may be found in the Comment Log for draft-ietf-simple-msrp-sessmatch
2011-10-05
03 (System) New version available: draft-ietf-simple-msrp-cema-03.txt
2011-09-14
02 (System) New version available: draft-ietf-simple-msrp-cema-02.txt
2011-08-29
01 (System) New version available: draft-ietf-simple-msrp-cema-01.txt
2011-08-26
00 (System) New version available: draft-ietf-simple-msrp-cema-00.txt