Re: [AVTCORE] EKT Problems with RTCP

"Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com> Thu, 26 March 2015 12:02 UTC

Return-Path: <tireddy@cisco.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 74EE01B2CA4 for <avt@ietfa.amsl.com>; Thu, 26 Mar 2015 05:02:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level:
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C9Nhjp-97ajR for <avt@ietfa.amsl.com>; Thu, 26 Mar 2015 05:02:13 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABF561B2CA0 for <avt@ietf.org>; Thu, 26 Mar 2015 05:02:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=35986; q=dns/txt; s=iport; t=1427371332; x=1428580932; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=+FwHHCEUrN8hekzO/SaN2beHt/oCtBC1Q4Sx5qVN+SE=; b=Jz9YGewKlckSFzOOUplAeV4HSgqM4wZw705VVUpyG8IcImQBXgbCUC4i 0ougG6b/8g4/x+5ugb72sRGY1EqGtLKFT3Me45yhs0gXOgvcUGi6lkgvr fNhKot38MVqxn+JZBfYiNgIQdzl2PasbVrPqlHgYkcYE4AiZ/E5LXBjzp I=;
X-Files: image001.png : 2991
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DCCQBY9BNV/5xdJa1cgkNDUloEwmuCO4V1AoFcTAEBAQEBAX2EFAEBAQQFAQYZAgYBVwICAgEIBwoEAQEGAQEBAhYBBgcCBRABAwsMFAkIAgQBEQEGAgYNiBQNykgBAQEBAQEBAQEBAQEBAQEBAQEBAQEXBIsdhEUWFwoBBoMRgRYFhhiES4VtgxsBU5osIoNubwGBQ38BAQE
X-IronPort-AV: E=Sophos;i="5.11,471,1422921600"; d="png'150?scan'150,208,217,150";a="135592771"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by alln-iport-7.cisco.com with ESMTP; 26 Mar 2015 12:02:11 +0000
Received: from xhc-aln-x15.cisco.com (xhc-aln-x15.cisco.com [173.36.12.89]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id t2QC2BGb000370 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 26 Mar 2015 12:02:11 GMT
Received: from xmb-rcd-x10.cisco.com ([169.254.15.80]) by xhc-aln-x15.cisco.com ([173.36.12.89]) with mapi id 14.03.0195.001; Thu, 26 Mar 2015 07:02:11 -0500
From: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
To: "Mo Zanaty (mzanaty)" <mzanaty@cisco.com>, "Paul E. Jones" <paulej@packetizer.com>, John Mattsson <john.mattsson@ericsson.com>, "IETF AVTCore WG" <avt@ietf.org>
Thread-Topic: [AVTCORE] EKT Problems with RTCP
Thread-Index: AQHQZWMYVJRe7hrOQ0ODT1ktOeprFJ0qx+SAgAFP2gCAApWccA==
Date: Thu, 26 Mar 2015 12:02:11 +0000
Message-ID: <913383AAA69FF945B8F946018B75898A366D0F31@xmb-rcd-x10.cisco.com>
References: <44464851-92EB-4B19-9A4F-559C0E1A4DE7@ericsson.com> <emae6d6460-9744-4852-ba8b-91b0e0794a40@helsinki> <D136F836.4A4CB%mzanaty@cisco.com>
In-Reply-To: <D136F836.4A4CB%mzanaty@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [173.39.64.106]
Content-Type: multipart/related; boundary="_004_913383AAA69FF945B8F946018B75898A366D0F31xmbrcdx10ciscoc_"; type="multipart/alternative"
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/avt/51av_HMIv9L80T008nlSLd0MrF8>
Subject: Re: [AVTCORE] EKT Problems with RTCP
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Mar 2015 12:02:20 -0000

Trial and error to detect the right key without MKI is discussed in https://tools.ietf.org/html/rfc5764#section-5.2.

-Tiru

From: avt [mailto:avt-bounces@ietf.org] On Behalf Of Mo Zanaty (mzanaty)
Sent: Tuesday, March 24, 2015 9:00 PM
To: Paul E. Jones; John Mattsson; IETF AVTCore WG
Subject: Re: [AVTCORE] EKT Problems with RTCP

I agree with Paul, option 1 seems best. I think it could even be argued that ISN/ISI should be eliminated, and EKT must always be sent separately in SRTP/SRTCP coincident with the SN/index of the rekey point.

Some additional text may be useful to reflect operation in more complex RTP scenarios, such as multiple RTP streams bundled in the same session with sparse RTCP reporting (not full mesh).

Mo

On 3/23/15, 3:27 PM, Paul E. Jones <paulej@packetizer.com<mailto:paulej@packetizer.com>> wrote:

John,

Option 1 strikes me as the simplest solution to the problem you describe with minimal changes in the text.  Option 2 would work, though I'm missing the point of the replay benefit that comes with MKI.  Given the endpoints are randomly generating SRTP master keys, isn't that sufficient?  Perhaps I'm missing something key.

Paul

------ Original Message ------
From: "John Mattsson" <john.mattsson@ericsson.com<mailto:john.mattsson@ericsson.com>>
To: "IETF AVTCore WG" <avt@ietf.org<mailto:avt@ietf.org>>
Sent: 3/23/2015 8:15:48 AM
Subject: [AVTCORE] EKT Problems with RTCP

Hi,

While editing the EKT draft I realized that EKT has major problems with RTCP.

+---+ ------- SRTP ---------> +---+
| S | ------- SRTCP SR -----> | R |
+---+ <------ SRTCP RR ------ +---+

Take the above example. The sender S sends RTP and RTCP to the receiver R. R sends RTCP but not RTP to S.

S re-keying: Irrespectively if S sends EKT in SRTP or SRTCP the occurrence of the key change is signalled with ROC || ISN and R has no way to know when to exactly change key for SRTCP (i.e. how ISN maps to the SRTCP index). R is forced to guess and try authenticating with both the old and the new key.

R re-keying: Here ROC || ISN has no meaning at all and S will have to do trial and error with both the old and the new key.

This is not a robust solution and it needs to be fixed. Two suggestions:

- Option 1
One option is to add another field ISI (Initial SRTCP Index) to the EKT_Plaintext. This would then work similar to ISN. The Plaintext could contain both, or one of them. One alternative is that EKT contains both ISN and ISI. Another alternative is that ISN is used in EKT over SRTP and ISI in EKT over SRTCP, forcing EKT to be used in both SRTP and SRTCP.

- Option 2
The current EKT draft says

"MKI is no longer allowed with EKT (as MKI duplicates some of EKT's functions)".

Its rather EKT that duplicates MKI (RFC 3711) and one simple option would be to simply remove the EKT parts that duplicates MKI and instead mandate use of MKI.

The EKT_Plaintext would then be:
EKT_Plaintext = SRTP_Master_Key || SSRC || ROC || MKI

And the SRT(C)P packets would look like:
+------------+-------------+-----+-----+-----+
| RTP Header | RTP Payload | MKI | TAG | EKT |
+------------+-------------+-----+-----+-----+
+--------------------+-------------+-----+-----+-----+
| RTCP Packet Types  | SRTCP INDEX | MKI | TAG | EKT |
+--------------------+-------------+-----+-----+-----+

This would allow full flexibility in the use of EKT. EKT could be sent in RTP and/or RTCP. Any number of keys could be distributed ahead of time.

If the MKIs are random, this would also make the EKT replay attack (in the case of SSRC collisions) much harder.

MKI could by default be one byte.

For AEAD algorithms MKI is the last field in the SRTP. If AEAD algorithms were mandated for EKT, MKIs with the last bit '0' could be mandated and the short EKT tag would not be needed.


Comments welcome, I would strongly prefer option 2. The more I think about it, the ISN approach duplicates functionality in RFC3711, it is complex, not robust, and vulnerable to replay attacks.


Cheers,
John




JOHN MATTSSON
MSc Engineering Physics, MSc Business Administration and Economics
Ericsson IETF Security Coordinator
Senior Researcher, Security

Ericsson AB
Ericsson Research
Färögatan 6
SE-164 80 Stockholm, Sweden
Phone +46 10 71 43 501
SMS/MMS +46 76 11 53 501
john.mattsson@ericsson.com<mailto:john.mattsson@ericsson.com>
http://www.ericsson.com/