Re: [AVT] RFC 3711 and RTCP
Mark Baugher <mbaugher@cisco.com> Thu, 25 November 2004 00:30 UTC
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA20674 for <avt-archive@ietf.org>; Wed, 24 Nov 2004 19:30:43 -0500 (EST)
Received: from megatron.ietf.org ([132.151.6.71]) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1CX7b1-0002ZV-Vs for avt-archive@ietf.org; Wed, 24 Nov 2004 19:34:53 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1CX7Sx-0001Qx-Jp; Wed, 24 Nov 2004 19:26:31 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1CX7MP-0008M1-LW for avt@megatron.ietf.org; Wed, 24 Nov 2004 19:19:45 -0500
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA19756 for <avt@ietf.org>; Wed, 24 Nov 2004 19:19:42 -0500 (EST)
Received: from sj-iport-2-in.cisco.com ([171.71.176.71] helo=sj-iport-2.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1CX7QN-0002JW-8K for avt@ietf.org; Wed, 24 Nov 2004 19:23:51 -0500
Received: from sj-core-1.cisco.com (171.71.177.237) by sj-iport-2.cisco.com with ESMTP; 24 Nov 2004 16:22:42 -0800
Received: from imail.cisco.com (imail.cisco.com [128.107.200.91]) by sj-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id iAP0It9N014106; Wed, 24 Nov 2004 16:18:56 -0800 (PST)
Received: from [192.168.0.10] (sjc-vpn4-24.cisco.com [10.21.80.24]) by imail.cisco.com (8.12.11/8.12.10) with ESMTP id iAP0J30J005141; Wed, 24 Nov 2004 16:19:03 -0800
In-Reply-To: <BGEKJNNFCPJKLLMMDMELIEKNFLAA.alan.d.clark@telchemy.com>
References: <BGEKJNNFCPJKLLMMDMELIEKNFLAA.alan.d.clark@telchemy.com>
Mime-Version: 1.0 (Apple Message framework v619)
Content-Type: text/plain; charset="US-ASCII"; delsp="yes"; format="flowed"
Message-Id: <7D052489-3E77-11D9-A16E-000A95DC10F2@cisco.com>
Content-Transfer-Encoding: 7bit
From: Mark Baugher <mbaugher@cisco.com>
Subject: Re: [AVT] RFC 3711 and RTCP
Date: Wed, 24 Nov 2004 16:18:10 -0800
To: Alan Clark <alan.d.clark@telchemy.com>
X-Mailer: Apple Mail (2.619)
IIM-SIG: v:"1"; h:"imail.cisco.com"; d:"cisco.com"; z:"home"; m:"krs"; t:"1101341944.197133"; x:"432200"; a:"rsa-sha1"; b:"nofws:13179"; e:"Iw=="; n:"sQYarK2E51MdcTiUqeif3F7cWdxIfoCiXhdfb9vD5ee/j0jXL15gbFxF2pXIw" "eAblu0N6XAgK7k+wrbr7bQDJaCDqOmzqpRUBjIRQAXQ7NzadpmR3pUL6wxaRU" "tW+c43sl9jC50Qg1sXHpPjt8Y+Y16ioyQAQAdSunM4YhevURc="; s:"AGpjmXJOgkwHCTyrxLneLyeQtsr4EFwzqVTXZDx7JTZ7TIt2s77mToo7BzZQE" "DQQ/m5bsdhTeoRkLN5AzMLm5Om70WHskjh5kEH0HnHOs5mfxKOlD0HuvRshE4" "LoVT6j83s5rhVJ2W2zzv0I1nSAsGZ1/Rnd6ZA8OZxiQO5DDVY="; c:"From: Mark Baugher <mbaugher@cisco.com>"; c:"Subject: Re: [AVT] RFC 3711 and RTCP"; c:"Date: Wed, 24 Nov 2004 16:18:10 -0800"
IIM-VERIFY: s:"y"; v:"y"; r:"60"; h:"imail.cisco.com"; c:"message from imail.cisco.com verified; "
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 3a331e4a192f4d33f18e6f8376287cf6
Content-Transfer-Encoding: 7bit
Cc: Colin Perkins <csp@csperkins.org>, Joerg Ott <jo@tzi.uni-bremen.de>, IETF AVT WG <avt@ietf.org>, Jon Peterson <jon.peterson@neustar.biz>, "'mankin@psg.com'" <mankin@psg.com>
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Audio/Video Transport Working Group <avt.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
Sender: avt-bounces@ietf.org
Errors-To: avt-bounces@ietf.org
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 4cbeb0f20efb229aa93fae1468d20275
Content-Transfer-Encoding: 7bit
Alan As Dave Oran has pointed out, the definition that you want is not supported in the signaling, at present. The current definition of http://www.ietf.org/internet-drafts/draft-ietf-mmusic-sdescriptions -07.txt treats SRTCP encryption as either on or off and does not address the problem of setting the E bit in SRTCP packets. This is a bug that we need to fix. MMUSIC has finished last call on draft-ietf-mmusic-sdescriptions-07.txt, and the transport ADs have reviewed it. We'll be making some changes at Jon Peterson's request and post another version in about a week. This is an opportunity to address the E bit, but the MMUSIC chairs or transport ADs may want another WG last call. Off the top of my head, I would offer something like the following. "As the default behavior when UNENCRYPTED_SRTCP is signaled, all SRTCP packets MUST have the E bit set to zero and MUST NOT be encrypted. Otherwise, all SRTP packets MUST have the E bit set to one and MUST be encrypted by default. Individual applications MAY override these default behaviors in their specifications. In a session where SRTCP packets are encrypted, therefore, applications that use RFC 3611 MAY set the E bit to 0 for XR packets as recommended by RFC 3611." Mark On Nov 24, 2004, at 2:33 PM, Alan Clark wrote: > > > Mark > > We tried to flag this in RFC3611 with the following text in the > "security > considerations" section > > Any encryption or filtering of XR report blocks entails a loss of > monitoring information to third parties. For example, a network > that > establishes a tunnel to encrypt VoIP Report Blocks denies that > information to the service providers traversed by the tunnel. The > service providers cannot then monitor or respond to the quality of > the VoIP calls that they carry, potentially creating problems for > the > network's users. As a default, XR packets should not be encrypted > or > filtered. > > Could we potentially interpret this as being the definition of what to > selectively encrypt in the case of the RFC3611 specification? > > Regards > > Alan > > > -----Original Message----- > From: Mark Baugher [mailto:mbaugher@cisco.com] > Sent: Wednesday, November 24, 2004 2:42 PM > To: Alan Clark > Cc: Oren Peleg; Cullen Jennings; avt@ietf.org; David R Oran; Michael A. > Ramalho > Subject: Re: [AVT] RFC 3711 and RTCP > > > So, when the sender and receiver agree to encrypt SRTCP, this would > mean > only that some SRTCP messages would be encrypted and the sender would > decide which ones to encrypt? My personal opinion is that this is not > secure because it is unpredictable to the receiver, which may have a > policy that all messages related to its session be encrypted. > > I can think of a few potential approaches to this problem. > > 1. Let individual SRTCP messages or a bundle of SRTCP messages > be signaled to be unencrypted when SRTCP encryption is used. > > 2. Make a blanket policy that the sender determine what > to selectively encrypt, as you suggest. > > 3. Define the policy of what to selectively encrypt in > the particular specification. In other words, a document could > re-define the signaling of SRTCP encryption according to its > needs. The specification of foo, therefore, could define a new > parameter such as foo_ENCRYPTED_SRTCP to be used in place of > ENCRYPTED_SRTCP. The foo document would define what gets > encrypted and what does not get encrypted as per its needs. > > I commented on #2 already. I don't like #1 because of its signaling > complexity. I like #3 because it limits the complexity to the > specific needs of an application. #1 would be more efficient than > #3 if lots of applications had their own specific needs for > selective encryption of SRTCP message. But I don't think this is > the case. > > Mark > > On Nov 24, 2004, at 10:58 AM, Alan Clark wrote: > >> >> If the use of encryption in SRTCP is signalled by an explicit (E) bit >> in the >> SRTCP header then perhaps the sender could autonomously decide whether >> it >> wants to encrypt? Presumably since the sender is in the best position >> to >> decide if the data is sensitive then this would be ok - and the >> receiver is >> able to just look at the E bit and hence recognize that decryption is >> needed. >> >> Alan >> >> -----Original Message----- >> From: avt-bounces@ietf.org [mailto:avt-bounces@ietf.org]On Behalf Of >> Mark Baugher >> Sent: Wednesday, November 24, 2004 1:33 PM >> To: David R Oran >> Cc: Cullen Jennings; Oren Peleg; Michael A. Ramalho; Alan Clark; >> avt@ietf.org >> Subject: Re: [AVT] RFC 3711 and RTCP >> >> >> >> On Nov 24, 2004, at 10:05 AM, David R Oran wrote: >> >>> >>> On Nov 24, 2004, at 12:23 PM, Alan Clark wrote: >>> >>>> >>>> Michael >>>> >>>> I don't see why this would be a problem unless you included SDES and >>>> (SR or >>>> RR or XR) in the same RTCP packet. SRTP (at least the protocol) is >>>> apparently able to decided on a packet by packet basis whether to >>>> encrypt >>>> RTCP - hopefully SRTP implementations also permit this. >>>> >>> Sure, they can do this. But remember offer-answer. How does a >>> receiver >>> communicate such a granular policy to the transmitter? Right now if >>> can say whether to auth or auth+encrypt RTP, and auth or auth+encrypt >>> RTCP. There's no way to say auth+encrypt SDES but only auth SR/XR >>> etc. >> >> Seems to me that this is a problem with SDP security descriptions. >> That problem might be there because we forgot about the E bit. This >> seems very messy for the reason you mention above - granularity. I >> don't think that we want to negotiate the encryption policy for each >> type SDP message, which is a problem with something like the E bit. >> >> Mark >>> >>> >>>> Logically I'd send SDES on its own at the start of a call to provide >>>> some >>>> user info, but would not send SR/RR/XR until at least 8-10 seconds >>>> into the >>>> call as I need some time to gather statistics to report. >>> That's not exactly what the RTP specs say. RTCP timers don't have >>> this >>> kind of policy today. In fact, there are porposals on the table to >>> use >>> RTCP for early feedback to assess reception quality on some initial >>> packets - e.g. the RTP-noop proposal. In any event that has no >>> bearing >>> on the present discussion. >>> >>>> After the >>>> start-of-call exchange there would appear to be minimal need to >>>> include >>>> SDES. I'm sure we could construct some scenarios in which you "may" >>>> need to >>>> include SDES with SR/RR/XR however the vast majority of cases would >>>> either >>>> need only a single initial exchange or may not need SDES at all. >>>> >>> Any time you change SSRC you potentially need to send SDES. >>> That said, I still don't see what bearing this has on the discussion >>> about whether we need the complexity of encrypting some RTCP packets >>> and not others for a single session. >>> >>> It's a tradeoff between extra complexity+less privacy versus allowing >>> snoopers to gather RTCP stats. >>> >>> Dave. >>> >>>> Regards >>>> >>>> Alan >>>> >>>> >>>> >>>> -----Original Message----- >>>> From: Michael A. Ramalho [mailto:mramalho@cisco.com] >>>> Sent: Wednesday, November 24, 2004 9:39 AM >>>> To: Alan Clark >>>> Cc: Oren Peleg; avt@ietf.org >>>> Subject: RE: [AVT] RFC 3711 and RTCP >>>> >>>> >>>> At 07:54 AM 11/24/2004 -0500, Alan Clark wrote: >>>>> Hi Oren >>>>> >>>>> Yes - encryption is intended to provide privacy however this >>>>> relates >>>>> primarily to the voice payloads and to information within RTCP that >>>>> may be >>>>> associated with individual users (e.g. SDES). >>>>> >>>>> SR, RR and XR contain only peformance statistics and there is no >>>>> privacy >>>>> consideration that I can think of related to this type of data. >>>>> >>>>> The message is - encrypt RTP, optionally encrypt RTCP SDES but >>>>> don't >>>> encrypt >>>>> RTCP SR/RR/XR >>>> >>>> Hi Alan, >>>> >>>> I am wondering about implementations utilizing your advise >>>> "optionally >>>> encrypt >>>> RTCP SDES but don't encrypt RTCP SR/RR/XR". >>>> >>>> Is there an easy way to tell SRTP to encrypt RTCP SDES, but not RTCP >>>> SR/RR/XR? It seems that all the RTCP blocks would otherwise be >>>> highly >>>> related to each other. For example (quote out of RFC 3611): >>>> >>>> "XR packets supplement the existing RTCP packets, and may be stacked >>>> with >>>> other RTCP packets to form compound RTCP packets [9, Section 6]." >>>> >>>> Thus, RFC3611 explicitly admits the possibility of (but does not >>>> mandate) >>>> the piggybacking all the RTCP-XR block types. >>>> >>>> RTCP implementations would have to know the SRTP encryption rules to >>>> make sure they don't perform piggybacking with SDES ... but could >>>> allow >>>> (the more bandwidth efficient) piggybacking on the other RTCP-XR >>>> blocks. >>>> >>>> This RTCP/SRTP interaction/dependency seems to add a burden to both >>>> RTCP and SRTP implementations ... let alone the expressiveness >>>> required >>>> to signal your advise in existing SDP/SRTP mechanisms. >>>> >>>> Are you aware of any implementations that have actually followed >>>> your >>>> advise above? I rather go into this one with our eyes open ... >>>> developers >>>> highly dislike this cross-functional entity dependency (RTCP & SRTP >>>> along >>>> with expressing it in SDP/SRTP mechanisms). >>>> >>>> Regards, >>>> >>>> Michael Ramalho >>>> >>>> >>>> >>>>> Regards >>>>> >>>>> Alan >>>>> >>>>> -----Original Message----- >>>>> From: Oren Peleg [mailto:OrenP@audiocodes.com] >>>>> Sent: Wednesday, November 24, 2004 7:50 AM >>>>> To: Alan Clark; avt@ietf.org >>>>> Subject: RE: [AVT] RFC 3711 and RTCP >>>>> >>>>> >>>>> >>>>> Isnt encryption is to prevent monitoring from the first place? >>>>> >>>>> -----Original Message----- >>>>> From: avt-bounces@ietf.org [mailto:avt-bounces@ietf.org] On Behalf >>>>> Of >>>>> Alan Clark >>>>> Sent: Tuesday, November 23, 2004 5:42 PM >>>>> To: avt@ietf.org >>>>> Subject: [AVT] RFC 3711 and RTCP >>>>> >>>>> >>>>>> From the flurry of discussion on RFC3711 it looks as if there is >>>>> considerable interest in SRTP implementation. I'd like to add a >>>>> request >>>>> to >>>>> SRTP implementors with regard to manageability. >>>>> >>>>> RTCP SR, RR and more particularly XR (e.g. VoIP Metrics report >>>>> block) >>>>> contain useful information for network monitoring, and are often >>>>> used by >>>>> probes and analyzers to support problem diagnosis. RFC3711 allows >>>>> the >>>>> selective encryption of RTCP payloads and hence I would strongly >>>>> recomment >>>>> that RFC3711 implementors DO NOT encrypt RTCP SR, RR and XR >>>>> payloads >>>>> as >>>>> this >>>>> adversely impacts manageability. >>>>> >>>>> Regards >>>>> >>>>> Alan Clark >>>>> Telchemy >>>>> >>>>> >>>>> _______________________________________________ >>>>> Audio/Video Transport Working Group >>>>> avt@ietf.org >>>>> https://www1.ietf.org/mailman/listinfo/avt >>>>> >>>>> ******************************************************************* >>>>> * >>>>> * >>>>> ****** >>>> * >>>>> ******************************** >>>>> This email and any files transmitted with it are confidential >>>>> material. >>>>> They are intended solely for the use of the designated individual >>>>> or >>>>> entity >>>>> to whom they are addressed. >>>>> If the reader of this message is not the intended recipient, >>>>> you are hereby notified that any dissemination,use, >>>>> distribution or copying of this communication is strictly >>>>> prohibited >>>>> and >>>> may >>>>> be unlawful. >>>>> >>>>> If you have received this email in error please notify >>>>> postmaster@audiocodes.com and permanently delete the e-mail and >>>>> files. >>>>> >>>>> >>>>> ******************************************************************* >>>>> * >>>>> * >>>>> ****** >>>> * >>>>> ******************************* >>>>> >>>>> >>>>> _______________________________________________ >>>>> Audio/Video Transport Working Group >>>>> avt@ietf.org >>>>> https://www1.ietf.org/mailman/listinfo/avt >>>> >>>> >>>> _______________________________________________ >>>> Audio/Video Transport Working Group >>>> avt@ietf.org >>>> https://www1.ietf.org/mailman/listinfo/avt >>>> >>> David R. Oran >>> Cisco Fellow >>> Cisco Systems >>> 7 Ladyslipper Lane >>> Acton, MA 01720 USA >>> Tel: +1 978 264 2048 >>> Email: oran@cisco.com >>> >>> >>> _______________________________________________ >>> Audio/Video Transport Working Group >>> avt@ietf.org >>> https://www1.ietf.org/mailman/listinfo/avt >>> >> >> >> _______________________________________________ >> Audio/Video Transport Working Group >> avt@ietf.org >> https://www1.ietf.org/mailman/listinfo/avt >> > _______________________________________________ Audio/Video Transport Working Group avt@ietf.org https://www1.ietf.org/mailman/listinfo/avt
- RE: [AVT] RFC 3711 and RTCP Alan Clark
- RE: [AVT] RFC 3711 and RTCP Oren Peleg
- RE: [AVT] RFC 3711 and RTCP Alan Clark
- RE: [AVT] RFC 3711 and RTCP Michael A. Ramalho
- Re: [AVT] RFC 3711 and RTCP Mark Baugher
- RE: [AVT] RFC 3711 and RTCP Alan Clark
- Re: [AVT] RFC 3711 and RTCP David R Oran
- Re: [AVT] RFC 3711 and RTCP Mark Baugher
- Re: [AVT] RFC 3711 and RTCP Mark Baugher
- RE: [AVT] RFC 3711 and RTCP Alan Clark
- Re: [AVT] RFC 3711 and RTCP Mark Baugher
- RE: [AVT] RFC 3711 and RTCP Romascanu, Dan (Dan)
- Re: [AVT] RFC 3711 and RTCP Mark Baugher
- RE: [AVT] RFC 3711 and RTCP Alan Clark
- RE: [MMUSIC] RE: [AVT] RFC 3711 and RTCP Romascanu, Dan (Dan)
- Re: [MMUSIC] RE: [AVT] RFC 3711 and RTCP Mark Baugher
- RE: [MMUSIC] RE: [AVT] RFC 3711 and RTCP Alan Clark
- RE: [MMUSIC] RE: [AVT] RFC 3711 and RTCP Romascanu, Dan (Dan)
- Re: [MMUSIC] RE: [AVT] RFC 3711 and RTCP Michael A. Ramalho
- Re: [MMUSIC] RE: [AVT] RFC 3711 and RTCP Mark Baugher