Re: [AVTCORE] Comments on draft-ietf-avt-srtp-aes-gcm-01

David McGrew <mcgrew@cisco.com> Wed, 19 October 2011 22:14 UTC

Return-Path: <mcgrew@cisco.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1056911E80B0 for <avt@ietfa.amsl.com>; Wed, 19 Oct 2011 15:14:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -104.599
X-Spam-Level:
X-Spam-Status: No, score=-104.599 tagged_above=-999 required=5 tests=[AWL=2.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ba-2jP4rfBFI for <avt@ietfa.amsl.com>; Wed, 19 Oct 2011 15:14:49 -0700 (PDT)
Received: from mtv-iport-2.cisco.com (mtv-iport-2.cisco.com [173.36.130.13]) by ietfa.amsl.com (Postfix) with ESMTP id 42CC711E8098 for <avt@ietf.org>; Wed, 19 Oct 2011 15:14:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=mcgrew@cisco.com; l=8896; q=dns/txt; s=iport; t=1319062489; x=1320272089; h=cc:message-id:from:to:in-reply-to:mime-version:subject: date:references; bh=CvACvu58SHQuA1OFG4kNod/03c8oHEe2fc3R8aQQkbk=; b=L2m8sLC/UyZDaiw4xek30LE35P5se0MtGE15hRV4odVBLKz0VUKg6KS7 7d903AfKipa+JPXtRFc9rRINQ/cMk7BTWlb1WJfA7UnSA9S0XQTRC5RSw h2tBXwgBLYzNBDQGgJsgCNOSFmqV9VFz+kiW5LKDQ0xxJKsJQJUQIGNIf g=;
X-Files: smime.p7s : 3497
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: Av0EAL1Ln06rRDoG/2dsb2JhbABEqQKBBYFuAQEBAQIBEgFmBQsFBg44AlUGJBGHXpdgAZ5PhzphBIgCi3yRdw
X-IronPort-AV: E=Sophos; i="4.69,374,1315180800"; d="p7s'?scan'208"; a="8976120"
Received: from mtv-core-1.cisco.com ([171.68.58.6]) by mtv-iport-2.cisco.com with ESMTP; 19 Oct 2011 22:14:49 +0000
Received: from stealth-10-32-254-214.cisco.com (stealth-10-32-254-214.cisco.com [10.32.254.214]) by mtv-core-1.cisco.com (8.14.3/8.14.3) with ESMTP id p9JMEmFq022419; Wed, 19 Oct 2011 22:14:48 GMT
Message-Id: <F16201AC-B14E-49A9-8AD5-D21EAB3AA6AB@cisco.com>
From: David McGrew <mcgrew@cisco.com>
To: Qin Wu <bill.wu@huawei.com>
In-Reply-To: <E0259356234E413093E94734F9DA36BC@china.huawei.com>
Content-Type: multipart/signed; boundary="Apple-Mail-278--694612237"; micalg="sha1"; protocol="application/pkcs7-signature"
Mime-Version: 1.0 (Apple Message framework v936)
X-Priority: 3
Date: Wed, 19 Oct 2011 15:14:47 -0700
References: <4FD125153A070D45BC87645D3B88028802BB7BC639@IMCMBX3.MITRE.ORG> <E0259356234E413093E94734F9DA36BC@china.huawei.com>
X-Mailer: Apple Mail (2.936)
Cc: avt@ietf.org
Subject: Re: [AVTCORE] Comments on draft-ietf-avt-srtp-aes-gcm-01
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2011 22:14:50 -0000

Hi Qin,

thanks for your comments,

On Sep 22, 2011, at 5:11 AM, Qin Wu wrote:

> Hi,
> This draft is well written. I would like to see this work moving  
> forward.
> Here are my minor comments to this document:
>
> 1. Section 1, Second Paragraph
>
>  [Qin]: It looks SRTP (together with SRTCP) utilizes AES as the  
> default cipher.
>  However in some case(e.g., in ITU-T H.235.8), Public key  
> cryptography be used with SRTP to provide end to end confidential and
>  authentication. So is it fair to assume in SRTP, both sender and  
> receiver only use symmetric cryptography? what if asymmetric  
> cryptography?
>

only symmetric crypto is in scope for SRTP.  To establish SRTP  
sessions using public keys, the best standard to use is DTLS-SRTP (RFC  
5764).  ZRTP is similar (but not a standard).   Alternatively, one can  
use public key cryptography to protect signaling (which should be done  
anyway ;-) and then pass the SRTP keys through it.


> 2. Section 1.1 Second Bullet
>
> [Qin]: It is not clear why four instantiations is required for each  
> participant in the session,
> I think it is better at least to  have  a reference  to put here.
>
> 3. Section 1.2.1, First Paragraph
>
>   [Qin]: Is the AEAD authentication tag is authentication tag
>   defined in SRTP/SRTCP packet? If not, how they are different? If  
> yes,
>   it is better to be clear about this in the draft.

In the text " Rationale. Some applications use the Authentication Tag  
" I will add "SRTP Authentication Tag" to make that clear.

>
> 4. Section 1.2.1, Second Pragraph
>
> [Qin]: Should it say the optional SRTP Authentication Tag is NOT  
> Recommended to be present
> to be consistent with the figure in section 1.2.5.

These terms are defined to be equivalent in RFC 2119.  But if you  
think it is clearer, we could change "SHOULD NOT be present" to "is  
NOT RECOMMENDED and SHOULD NOT be present".   That is fine with me.

>
> 5. Section 1.2.5
>
>  [Qin]: Should it also say authentication tag is not reccommended in  
> the note to the figure?
>

Sure.

> 6.Section 2.1 Four Paragraph
>
> [Qin]: How the number of invocations is calcualted for SRTP/SRTCP  
> respectively?

Here an invocation means of the AEAD encrypt or decrypt function.  It  
is equivalent to the number of packets that are being protected.

>
> 7. Section 2.2, Table 1
>
> [Qin]: You also need to support the algorithm specified in  
> [RFC5282],Should it say
> A detailed description of the AES-GCM family can be found in
>   [RFC5116][RFC5282]?

Good point.

>
> 8. Section 2.2 Last Paragraph
>
> [Qin]: You didn't mentioned IV is formed from invocation counter in  
> the section
> 1.2.2, rather than you point out "The packet counter is closely  
> related to the invocation field",
> what is missing?
>
> [Qin]:It is not clear to me how the invocation counter is related to  
> each instantiation of AES-GCM?
> 	

Good point.

> 9.Section 3
>
> [Qin]: I can not understand this formulation and table. how do you  
> get this formulation and table?
> what's the rationale behind?
>

The table entries are computed using the formula in the paragraph  
above.  To limit the success probability to 2^-30 when using an 8- 
octet tag, for instance, one must limit the number of tries that an  
attacker has to 2^32.   Here a "try" is when the attacker gets the  
SRT[C]P receiver to accept a maliciously chosen packet, e.g. as part  
of a forgery attempt.

> 10.Section 4
>
> [Qin]:It looks not complete since you didn't specify the SRTP  
> transform parameters fro each profile.
>

Yes, good point.

thanks again,

David

> Regards!
> -Qin