Re: [AVTCORE] New Version Notification for draft-ietf-avtcore-srtp-encrypted-header-ext-00.txt

Jonathan Lennox <jonathan@vidyo.com> Tue, 07 June 2011 16:41 UTC

Return-Path: <jonathan@vidyo.com>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7567711E81D6 for <avt@ietfa.amsl.com>; Tue, 7 Jun 2011 09:41:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YxJFyUJyGZDv for <avt@ietfa.amsl.com>; Tue, 7 Jun 2011 09:41:35 -0700 (PDT)
Received: from mx1.myoutlookonline.com (mx1.myoutlookonline.com [64.95.72.238]) by ietfa.amsl.com (Postfix) with ESMTP id A292611E81D5 for <avt@ietf.org>; Tue, 7 Jun 2011 09:41:35 -0700 (PDT)
Received: from st21.mx1.myoutlookonline.com (localhost [127.0.0.1]) by mx1.myoutlookonline.com (Postfix) with ESMTP id 0327E554577 for <avt@ietf.org>; Tue, 7 Jun 2011 12:41:35 -0400 (EDT)
X-Virus-Scanned: by SpamTitan at mail.lan
Received: from HUB025.mail.lan (unknown [10.110.2.1]) by mx1.myoutlookonline.com (Postfix) with ESMTP id 7FA06553669 for <avt@ietf.org>; Tue, 7 Jun 2011 12:40:17 -0400 (EDT)
Received: from BE235.mail.lan ([10.110.32.235]) by HUB025.mail.lan ([10.110.17.25]) with mapi; Tue, 7 Jun 2011 12:39:04 -0400
From: Jonathan Lennox <jonathan@vidyo.com>
To: "avt@ietf.org" <avt@ietf.org>
Date: Tue, 07 Jun 2011 12:40:16 -0400
Thread-Topic: New Version Notification for draft-ietf-avtcore-srtp-encrypted-header-ext-00.txt
Thread-Index: AcwlMZRXouhvRM62TbSL5uJJaxcjqA==
Message-ID: <D37353E7-FEE4-4126-BF47-6AFEA942130E@vidyo.com>
References: <20110607084413.16038.95268.idtracker@ietfa.amsl.com>
In-Reply-To: <20110607084413.16038.95268.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [AVTCORE] New Version Notification for draft-ietf-avtcore-srtp-encrypted-header-ext-00.txt
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 07 Jun 2011 16:41:36 -0000

Hi, all --

The header extension encryption draft is now published as a WG document.

There are no technical changes from the final individual submission, but I wanted to call people's attention to two issues I've introduced discussion about in this version of the draft.

1.  We've seen additional discussion on the list recently (in the context of the Suite B work) about the draft defining AES-GCM for SRTP.  I'm not terribly familiar with AES-GCM, so it's not clear to me how its encryption transforms (or other AEAD transforms) should apply to the encrypted header extension mechanism.

Since both encrypted header extensions and AES-GCM SRTP are AVTCORE working group items, I think it's important that we understand how these pieces fit together.  I'd need guidance from someone who understands AES-GCM better.

2.  The two-byte form of header extensions (with "defined by profile" field 0x100x) allows zero-length header extension elements, and also can use the low four bits of the "defined by profile" field as an extra extension field.  The mechanism in this draft doesn't provide protection for either of these cases.  I don't think this is a problem -- in either case, switching to a one-byte header extension element that carries the relevant information is perfectly possible, and would also allow transport over the 0xBEDE one-byte form of header extensions -- but I wanted to get working group consensus that this is okay.

Comments on other aspects of the draft are also welcome, of course. 

On Jun 7, 2011, at 4:44 AM, <internet-drafts@ietf.org> wrote:

> A new version of I-D, draft-ietf-avtcore-srtp-encrypted-header-ext-00.txt has been successfully submitted by Jonathan Lennox and posted to the IETF repository.
> 
> Filename:	 draft-ietf-avtcore-srtp-encrypted-header-ext
> Revision:	 00
> Title:		 Encryption of Header Extensions in the Secure Real-Time Transport Protocol (SRTP)
> Creation date:	 2011-06-01
> WG ID:		 avtcore
> Number of pages: 9
> 
> Abstract:
>   The Secure Real-Time Transport Protocol (SRTP) provides
>   authentication, but not encryption, of the headers of Real-Time
>   Transport Protocol (RTP) packets.  However, RTP header extensions may
>   carry sensitive information for which participants in multimedia
>   sessions want confidentiality.  This document provides a mechanism,
>   extending the mechanisms of SRTP, to selectively encrypt RTP header
>   extensions in SRTP.
> 
> 
> 
> 
> The IETF Secretariat

--
Jonathan Lennox
jonathan@vidyo.com