Re: [AVTCORE] Re-send:Comments on draft-ietf-avtcore-aria-srtp-06.txt

Eric Rescorla <ekr@rtfm.com> Thu, 11 September 2014 20:30 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EAA871A0126 for <avt@ietfa.amsl.com>; Thu, 11 Sep 2014 13:30:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.377
X-Spam-Level:
X-Spam-Status: No, score=-1.377 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, J_CHICKENPOX_26=0.6, RCVD_IN_DNSWL_LOW=-0.7] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hw2wJAn27T4T for <avt@ietfa.amsl.com>; Thu, 11 Sep 2014 13:30:47 -0700 (PDT)
Received: from mail-we0-f182.google.com (mail-we0-f182.google.com [74.125.82.182]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BAE0A1A0135 for <avt@ietf.org>; Thu, 11 Sep 2014 13:30:46 -0700 (PDT)
Received: by mail-we0-f182.google.com with SMTP id k48so5155209wev.27 for <avt@ietf.org>; Thu, 11 Sep 2014 13:30:45 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=8JEF+XDoGxDQfNLQoG0lVmeT4qow2dUB/hcJTulohsQ=; b=Q/YvN6v4piylRme40BA+1DhIYP6hQN+pXOtCDFxh3kEJNWIZwbzLsWxk1vN6CzbO78 jTyHLvKUGdDG3qMXWa4fXdf06RQbqrfvlyi+XG2db8xhY+SYpQcwHufmlHOU+gosrH1z Q35UtoV/TYgd1bhdO7lItzhvFlpt1NNq6zEw3pJz6C+xVQfx1m6RSeDhGBNk5JzFvkLQ R7TfnfpDHfsT2fwOgrq7YiaIc8u1LDCp9qOmZpMgerILINA2PgCitVSGzz8EGk1BAFNj Hi4ULuNkDS9Oq2bOVo4E3CX5NjU/bkUwn5q1Sl4kIPV4oAuzL+/9XaHZJFBiz5tPP43l 6WgQ==
X-Gm-Message-State: ALoCoQlABhl4EfX7PVd3rtxBtmrrBS9FNoGA7DWqxdMuJkY9AtvXexFophIkgkHMmdLXp2PSvel8
X-Received: by 10.194.185.81 with SMTP id fa17mr4957797wjc.114.1410467445357; Thu, 11 Sep 2014 13:30:45 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.216.146.194 with HTTP; Thu, 11 Sep 2014 13:30:05 -0700 (PDT)
In-Reply-To: <03a701cfcaa8$354a9330$9fdfb990$@gmail.com>
References: <CABcZeBOWA4zAF-gXvz4F9uav3_HGK=_bvt0dqUSzmtq-Bcx-CA@mail.gmail.com> <038701cfca61$f9169940$eb43cbc0$@gmail.com> <CABcZeBO6rvaBC6p-uj5tzrT4bMgLob097UwDY5DrbOTpw6vRKg@mail.gmail.com> <03a701cfcaa8$354a9330$9fdfb990$@gmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Thu, 11 Sep 2014 13:30:05 -0700
Message-ID: <CABcZeBO7fwdUZEujb=dGONY-8DpVJESS1baYS5OFzkQGpPMsWg@mail.gmail.com>
To: Roni Even <ron.even.tlv@gmail.com>
Content-Type: multipart/alternative; boundary="047d7bae49560c5a110502d00b6e"
Archived-At: http://mailarchive.ietf.org/arch/msg/avt/8eHi0Oxlp7k4vlc1vwtt-11DDpo
Cc: "avt@ietf.org" <avt@ietf.org>, IESG <iesg@ietf.org>
Subject: Re: [AVTCORE] Re-send:Comments on draft-ietf-avtcore-aria-srtp-06.txt
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Sep 2014 20:30:49 -0000

Hi Roni,

It seems to me that allocating code points in a Proposed Standard document
is
an endorsement.

I realize that this seemed to many like a sensible procedure in 2010, but
I would suggest that attitudes towards cipher proliferation have changed
and we should assess this draft in light of that.

Best,
-Ekr


On Sun, Sep 7, 2014 at 7:29 AM, Roni Even <ron.even.tlv@gmail.com> wrote:

> Hi Eric,
> This document does not endorse the use of ARIA for SRTP, the usage is
> based on what the implementers will implement and the IETF have no control
> over it and does not endorse any usage here . The document registers the
> IANA code points based on RFC4568 and RFC 5226. According to RFC5226 you
> can use a non IETF document (specification required ) for the SRTP
> Protection Profile registration but need a standard track RFC for the Security
> Descriptions.Doing this work at the IETF allowed for a review of the
> usage of ARIA in SRTP instead of asking the authors to go directly to IANA
> which will lead them back to the requirement for standard track RFC.  To
> the best of my knowledge RFC 4568 and RFC 5226 do not say which security
> descriptions and which protection profile can be registers just what is
> required to registers ones. (this is not ARIA that is being standardize).I
> do not voice here my opinion about if it should be done. Just pointing out
> that this work was done based on the current procedures. If we have other
> procedures we can work accordingly in the future.  BTW: this approach was
> discussed in 2010 with Robert Sparks (RAI AD advisor to AVT WG) and Sean
> Turner (security AD at the time) when the work on ARIA started at the IETF)
> based on the ARIA authors question to the ADs (not on the mailing list).
> The work also included ARIA as informational RFC and the support for ARIA
> in TLS and CMS. The the conclusion was that because if the IANA
> registration requirements there should be a standard track RFC for the SRTP
> code points registration and it should be an AVT document (individual draft
> initially)Roni Even.
>
>
>
>
>
> *From:* Eric Rescorla [mailto:ekr@rtfm.com]
> *Sent:* 07 September, 2014 3:42 PM
> *To:* Roni Even
> *Cc:* avt@ietf.org; IESG
> *Subject:* Re: [AVTCORE] Re-send:Comments on
> draft-ietf-avtcore-aria-srtp-06.txt
>
>
>
>
>
>
>
> On Sat, Sep 6, 2014 at 11:07 PM, Roni Even <ron.even.tlv@gmail.com> wrote:
>
> Hi Eric,
>
> This document registers the IANA codepoints for Security Descriptions,
> DTLS-SRTP, and MIKEY. The registration procedure requires standard track
> document. ARIA itself in RFC5794 is informational.
>
>
>
> I'm not sure that that changes the situation. The question is whether the
>
> IETF should be endorsing the use of ARIA for SRTP, right?
>
>
>
>
>
>
>
> The WG agreed to have a milestone for this work.
>
>
>
> Understood. However, I don't think that precludes deciding otherwise
>
> at this point.
>
>
>
> -Ekr
>
>
>
>
>
> *From:* avt [mailto:avt-bounces@ietf.org] *On Behalf Of *Eric Rescorla
> *Sent:* 07 September, 2014 1:47 AM
> *To:* avt@ietf.org; IESG
> *Subject:* [AVTCORE] Re-send:Comments on
> draft-ietf-avtcore-aria-srtp-06.txt
>
>
>
> [Now with a right address]
>
>
>
> I just took a look at draft-ietf-avtcore-aria-srtp-06.txt and I'm trying
> to figure
>
> out why it's being advanced, especially as Standards Track. I have two
>
> concerns:
>
>
>
> 1. The arguments for specifying ARIA at all seem to be fairly weak. I
>
> went back to the mail archives and found my question about this from
>
> 2012, where I asked why we needed ARIA given that we have already
>
> standardized one KISA algorithm (SEED).
>
>
>
> http://www.ietf.org/mail-archive/web/avt/current/msg15603.htm
>
>
>
> The answer, apparently, is that the Korean government wants it:
>
> http://www.ietf.org/mail-archive/web/avt/current/msg15632.html
>
>
>
>  Both SEED and ARIA were established as KS(Korean Standard) by the
>
>  Ministry of Knowledge Economy of Korea.  But SEED and ARIA have
>
>  different application areas each other.  While SEED is mainly used
>
>  for for electronic commerce and financial service, ARIA is for
>
>  government use and public purpose.  As the governmental area is
>
>  growing recently, we need to standardize SRTP-ARIA even though
>
>  SRTP-SEED is already defined in RFC 5669.
>
>
>
> Substantively, standardizing a cipher just because a national government
>
> wants to use it doesn't seem like a really great idea.
>
>
>
> I just went back through the mailing list and was unable to find any
>
> messages that argued for standardizing ARIA other than those that
>
> appear to be by the authors. Procedurally, this doesn't really seem
>
> like the level of support that we should be looking for, especially
>
> for a standards track document.
>
>
>
>
>
> 2. If we are to specify ARIA, we shouldn't be specifying the combinatoric
>
> explosion of all the key lengths and cipher modes. Rather, we should
>
> specify GCM with one authentication tag and one or two key sizes.
>
> In response to my comments above, the authors argued that they were
>
> looking for parity with AES, but this isn't a good reason, since AES is
>
> the algorithm we are actually encouraging people to use (and even there
>
> it would be better to have fewer modes). In TLS we are trying to move
>
> away from non-AEAD ciphers and SRTP should probably do the same.
>
>
>
> -Ekr
>
>
>