RTP Control Protocol (RTCP) Extended Report (XR) Block for Discard Count Metric Reporting
draft-ietf-xrblock-rtcp-xr-discard-15
Yes
(Gonzalo Camarillo)
(Richard Barnes)
No Objection
(Adrian Farrel)
(Barry Leiba)
(Jari Arkko)
(Joel Jaeggli)
(Martin Stiemerling)
(Pete Resnick)
(Stewart Bryant)
(Ted Lemon)
Note: This ballot was opened for revision 14 and is now closed.
Gonzalo Camarillo Former IESG member
Yes
Yes
(for -14)
Unknown
Richard Barnes Former IESG member
Yes
Yes
(for -14)
Unknown
Spencer Dawkins Former IESG member
Yes
Yes
(2013-06-21 for -14)
Unknown
My apologies for updating this comment after looking at similar text in the -jt draft. You can ignore my previous comment on -discard. In this text, 4. SDP Signaling [RFC3611] defines the use of SDP (Session Description Protocol) [RFC4566] for signaling the use of XR blocks. However XR blocks MAY be used without prior signaling (see section 5 of RFC3611). This text is saying, to me: - You can signal the use of XR blocks in SDP, - or not - but if you do signal the use of XR blocks in SDP, here's how you would do that for discards Is there any guidance you can give about which choice an implementer should lean toward?
Adrian Farrel Former IESG member
No Objection
No Objection
(for -14)
Unknown
Barry Leiba Former IESG member
No Objection
No Objection
(for -14)
Unknown
Benoît Claise Former IESG member
No Objection
No Objection
(2013-06-24 for -14)
Unknown
- Block type (BT): 8 bits A Discard Count Metric Report Block is identified by the constant PDC. [Note to RFC Editor: please replace PDC with the IANA provided RTCP XR block type for this block.] Figure 1 needs to be changed as well, not only the text. - Section 1.4 This metric is believed to be applicable to a large class of RTP applications which use a jitter buffer. Isn't a de-jitter buffer? See https://tools.ietf.org/html/rfc5481#section-3.2
Jari Arkko Former IESG member
No Objection
No Objection
(for -14)
Unknown
Joel Jaeggli Former IESG member
No Objection
No Objection
(for -14)
Unknown
Martin Stiemerling Former IESG member
No Objection
No Objection
(for -14)
Unknown
Pete Resnick Former IESG member
No Objection
No Objection
(for -14)
Unknown
Sean Turner Former IESG member
No Objection
No Objection
(2013-06-26 for -14)
Unknown
Had the same thought Stephen did.
Stephen Farrell Former IESG member
No Objection
No Objection
(2013-06-25 for -14)
Unknown
Sam Hartman's secdir review [1] of xr-discard-rle-metrics raised a good question that's probably better asked here, or here as well. I'm not asking for any change in this or any specific xrblock document, but I would ask that the WG do consider this. Sam said: "Has the WG analyzed implications of providing feedback to an attacker on what specific SRTP packets are discarded? In the past we've run into trouble with security systems that were too verbose in error reporting. As an example, in certain public-key crypto constructions knowing whether a packet produced a decoding error vs a signature error after decryption can provide an attacker generating forged packets valuable information to attack the system. It's quite possible that SRTP doesn't have problems in this regard. I just want to confirm that the analysis has been done." I think that's a good question because knowing at what stage in a security protocol a message was barfed or getting timing statistics can expose information about how some crypto operation went wrong, and that can be exploited via statistical techniques with a sufficiently large number of messages. See for example the lucky-13 attacks against certain cryptographic modes in TLS [2] or perhaps the "original" of the species, the Bleichenbacher attack. [3] I suspect the best thing to do might be for the wg to try grab a security person and ponder this for a bit, if that's not already been done. I'm happy to try help find a co-ponderer if you want:-) Maybe we can ambush one in a hallway in Berlin. [1] http://www.ietf.org/mail-archive/web/secdir/current/msg04048.html [2] http://www.isg.rhul.ac.uk/tls/Lucky13.html [3] https://en.wikipedia.org/wiki/Adaptive_chosen-ciphertext_attack
Stewart Bryant Former IESG member
No Objection
No Objection
(for -14)
Unknown
Ted Lemon Former IESG member
No Objection
No Objection
(for -14)
Unknown