Dan Wing skrev 2011-04-15 17:26: > Observation: tunneled packets have two elements actively > deciding checksum=0 is okay. Those elements are the > tunnel encap and tunnel decap. > > Question: Should non-tunneled UDP flows, *established with > explicit signaling*, also be allowed to decide that checksum=0 > is okay? For example, an RTP-over-UDP flow established > with RTSP or SIP signaling. Some RTP traffic includes its > own checksum at the application layer (e.g., SRTP authentication) > and gains little or no benefit to a UDP checksum. Near as I > can discern, SIP-signaled flows meet all of the constraints > discussed in > http://tools.ietf.org/html/draft-ietf-6man-udpzero-02#section-5.1
Dan, I agree that SRTP would be safe to use without checksum also in v6. However, using non-secured RTP without checksums are "a very bad idea" (TM). Also, if you are an end-point generating RTP flows then the UDP checksum overhead is generally not that big of an issue compared to all media processing. I think the only node that where this could make any significant difference are in a transport translator, which only relays an incoming packets to a number of other unicast addresses. I do however, see a need for a number of additional mechanisms, at least signalling if one wants do do this for RTP with SRTP integrity protection enabled. SIP/SDP signalling and maybe also an additional ICE STUN check to verify the capability prior to using it to avoid loss due to middleboxes that doesn't handle zero UDP checksum with v6. My general fear is that the usage of zero checksum for IPv6 is done without thinking and that it is similar in behavior to IPv4 which it clearly is not, but I guess that is difficult to ensure. Soo frankly, is it really worth it for RTP? I guess what you say comes down to if we should ensure that the text is generalized enough that it doesn't only apply to tunnel applications. To me the new specification text before the bullet list appears ok. If only give tunnels as an example. The bullet list also appears ok from a non-tunnel application perspective. So it is likely only the title and some of the introduction text that needs to be ensured that it doesn't only speak of tunneling. I think the authors should ensure this as it appears to be minor modifications and clearly we didn't mean this to only be applicable to one type of applications, but all that meets the considerations. Cheers Magnus Westerlund ---------------------------------------------------------------------- Multimedia Technologies, Ericsson Research EAB/TVM ---------------------------------------------------------------------- Ericsson AB | Phone +46 10 7148287 Färögatan 6 | Mobile +46 73 0949079 SE-164 80 Stockholm, Sweden| mailto: magnus.westerl...@ericsson.com ---------------------------------------------------------------------- -------------------------------------------------------------------- IETF IPv6 working group mailing list ipv6@ietf.org Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------