Re: [AVTCORE] [dispatch] New proposal do declare SDP Security Descriptions (RFC4568) Historic
Ted Hardie <ted.ietf@gmail.com> Mon, 12 July 2021 13:02 UTC
Return-Path: <ted.ietf@gmail.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDC483A1714; Mon, 12 Jul 2021 06:02:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.196
X-Spam-Level:
X-Spam-Status: No, score=-0.196 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i2O4j3TQNFv7; Mon, 12 Jul 2021 06:02:37 -0700 (PDT)
Received: from mail-oi1-x233.google.com (mail-oi1-x233.google.com [IPv6:2607:f8b0:4864:20::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 53B503A173E; Mon, 12 Jul 2021 06:02:19 -0700 (PDT)
Received: by mail-oi1-x233.google.com with SMTP id x70so13501095oif.11; Mon, 12 Jul 2021 06:02:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=JKQPYvrO0t4MzxTtE2afA2WgvDSMRQfo3W5VStGHn18=; b=XizxLu/k6wWB3LkTuL27HLqXx+vVJAMybCwtfnpiPM//GgXa9cRGJoZTUDiFeDmLZ2 lUK6xBDkfy+qYGGNoSTwmT1uM/w7D2ZQJFMFnRKP+Xq9fkRGBby0OW/JRPAHoMKeJgVW NrK9bSAiYVnyo+IbEXbJAhQ73KTjfz9bi0VMyYS6NlBjx/TnMsyw/NyyMlR+nKPk7GXn Cizh+OjH1ev4kqYVZM+1j4c8xYIrjB2n+ia7J3RbldtfeH5tsHjWLIs4gi2HbhfdsKgJ tYhpXkMAiR0DWF6QKkP5mf9tgYUmFMEm7obOdQK8As8hmaLPTXkyAY4gxbW+HyMUyzq6 Kx1Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=JKQPYvrO0t4MzxTtE2afA2WgvDSMRQfo3W5VStGHn18=; b=IqN3Zo7fcwZLpTtGqU9e3iJz++FvKH+pdDs6gIx7CHfc0eUCvIe1inHttknpVgs+iO IHR2Gm/oNV5PmiDnlfI1G+x+TvM3hBeTIm0LvAwWF3XX0mWP7n5dkywlYpCHG6UYZz4Z Y8FI4gYaX1qGCTBOzAUW2BLqEik/G2ib9InmfbIDuWBh5Q1JOGuYjLaxltv4+bZDa9f1 bsTKcn7WHZaFVKmD89Ic1OmNi4TGI3mFttsXbNLk3eKjzRXn6/5bghWQWn3yH3z/ZnNm Re7iiPtrKKtz1V8hMLuegj9l9zg5e/eAlkxGGM232wvmiks9kUfMTyCGTZx5ZwbEtf2h zOmQ==
X-Gm-Message-State: AOAM531q/YGA04JGq/U/6G1gFXxkfcD7bTn4BwQ050BNGbHPPIU/VtxO fRhgPVZ9275j9jSXwLvFVqPaa4+EdxXPttYVS/9SengxvaimPg==
X-Google-Smtp-Source: ABdhPJy/KfOwoqycVCgmjfOvTMo80NjqyaZ0u8fLoXl1uT3Irz5WQ60HSQOWrGSyX2SHHSYitEZVxAYqXklFAeB0zLc=
X-Received: by 2002:aca:acc5:: with SMTP id v188mr10192145oie.167.1626094937688; Mon, 12 Jul 2021 06:02:17 -0700 (PDT)
MIME-Version: 1.0
References: <d74c3c65ee2466c6c26fed5a907bf7048161aba6.camel@ericsson.com>
In-Reply-To: <d74c3c65ee2466c6c26fed5a907bf7048161aba6.camel@ericsson.com>
From: Ted Hardie <ted.ietf@gmail.com>
Date: Mon, 12 Jul 2021 14:01:51 +0100
Message-ID: <CA+9kkMDnuV1YfFkRGPXirKQMo51CTZt_wDW4A_Xa8MrfLo9xoA@mail.gmail.com>
To: "dispatch@ietf.org" <dispatch@ietf.org>
Cc: "mmusic@ietf.org" <mmusic@ietf.org>, "avt@ietf.org" <avt@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000021cc6c05c6ecbbdb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/avt/GK8h78P2a64T0sa2pxzpBm-UqGs>
Subject: Re: [AVTCORE] [dispatch] New proposal do declare SDP Security Descriptions (RFC4568) Historic
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jul 2021 13:02:49 -0000
Hi Magnus, This seems like a reasonable work item for MMUSIC to me (and a reasonable goal as well). regards Ted On Mon, Jul 12, 2021 at 1:15 PM Magnus Westerlund <magnus.westerlund= 40ericsson.com@dmarc.ietf.org> wrote: > Hi, > > John and I have a draft that proposes that RFC 4568 (*Session Description > Protocol (SDP) Security Descriptions for Media Streams)* should be > declared Historic. As the draft explains the security level SDP Security > Description provide is not on the level on could expected by an IETF in > force proposed standard and there exist alternatives. > > We currently point this draft to Dispatch as we are a bit uncertain if > this should be handled in MMUSIC WG or somewhere else? > Therefore we proposes that this draft is discussed on the dispatch list > until dispatched. > > Cheers > > Magnus Westerlund > > > Name: draft-mattsson-dispatch-sdes-dont-dont-dont > Revision: 00 > Title: SDP Security Descriptions is NOT RECOMMENDED and Historic > Document date: 2021-07-12 > Group: Individual Submission > Pages: 8 > URL: > https://www.ietf.org/archive/id/draft-mattsson-dispatch-sdes-dont-dont-dont-00.txt > Status: > https://datatracker.ietf.org/doc/draft-mattsson-dispatch-sdes-dont-dont-dont/ > Htmlized: > https://datatracker.ietf.org/doc/html/draft-mattsson-dispatch-sdes-dont-dont-dont > > > Abstract: > Key exchange without forward secrecy enables pervasive monitoring. > Massive pervasive monitoring attacks relying on key exchange without > forward secrecy have been reported, and many more have likely > happened without ever being reported. If key exchange without > Diffie-Hellman is used, access to long-term keys enable passive > attackers to compromise past and future sessions. Entities can get > access to long-term key material in different ways: physical attacks, > hacking, social engineering attacks, espionage, or by simply > demanding access to keying material with or without a court order. > Session Description Protocol (SDP) Security Descriptions (RFC 4568) > does not offer PFS and has a large number of additional significant > security weaknesses. This document specifies that use of the SDP > Security Descriptions is NOT RECOMMENDED. New deployments SHOULD > forbid support of SDP Security Descriptions. > > This document reclassifies RFC 4568 (SDP Security Descriptions) to > Historic Status and also obsoletes RFC 4568. > > This document updates RFC 7201 (Options for Securing RTP Sessions) to > note that SDP Security Descriptions SHOULD NOT be used. > _______________________________________________ > dispatch mailing list > dispatch@ietf.org > https://www.ietf.org/mailman/listinfo/dispatch >
- [AVTCORE] New proposal do declare SDP Security De… Magnus Westerlund
- Re: [AVTCORE] [dispatch] New proposal do declare … Ted Hardie