RE: [AVT] RE: Security for draft-ietf-avt-rtp-retransmission
Jose Rey <rey@panasonic.de> Mon, 17 February 2003 15:41 UTC
Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA24216 for <avt-archive@odin.ietf.org>; Mon, 17 Feb 2003 10:41:54 -0500 (EST)
Received: (from mailnull@localhost) by www1.ietf.org (8.11.6/8.11.6) id h1HFl3Z02061 for avt-archive@odin.ietf.org; Mon, 17 Feb 2003 10:47:03 -0500
Received: from www1.ietf.org (localhost.localdomain [127.0.0.1]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h1HFkXp02034; Mon, 17 Feb 2003 10:46:34 -0500
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id h1HFiTp01961 for <avt@optimus.ietf.org>; Mon, 17 Feb 2003 10:44:29 -0500
Received: from mail.pel.panasonic.de (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA24180 for <avt@ietf.org>; Mon, 17 Feb 2003 10:38:48 -0500 (EST)
Received: from atrgreyj (vw1.pel.panasonic.de [10.78.238.55]) by mail.pel.panasonic.de (__________PEL__Mail-Server__________) with SMTP id <0HAG00HREM948W@panasonic.de> for avt@ietf.org; Mon, 17 Feb 2003 16:41:31 +0100 (MET)
Date: Mon, 17 Feb 2003 16:41:29 +0100
From: Jose Rey <rey@panasonic.de>
Subject: RE: [AVT] RE: Security for draft-ietf-avt-rtp-retransmission
In-reply-to: <FPELKLHKCBJLMMMNOGDFIEELFFAA.mcgrew@cisco.com>
To: "David A. Mcgrew" <mcgrew@cisco.com>, "Avt@Ietf. Org" <avt@ietf.org>
Cc: mbaugher@cisco.com, elisabetta.carrara@era.ericsson.se, mats.naslund@era.ericsson.se, karl.norrman@era.ericsson.se, oran@cisco.com
Message-id: <NGBBJIBNJOKHDHFKEOMHAEEJEJAA.rey@panasonic.de>
MIME-version: 1.0
X-MIMEOLE: Produced By Microsoft MimeOLE V5.00.2919.6600
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0)
Content-type: text/plain; charset="iso-8859-1"
Content-transfer-encoding: 8bit
Importance: Normal
X-Priority: 3 (Normal)
X-MSMail-priority: Normal
Content-Transfer-Encoding: 8bit
Sender: avt-admin@ietf.org
Errors-To: avt-admin@ietf.org
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Id: Audio/Video Transport Working Group <avt.ietf.org>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
Content-Transfer-Encoding: 8bit
David, thanks for your comments, please see inline. > -----Original Message----- > From: avt-admin@ietf.org [mailto:avt-admin@ietf.org]On Behalf Of David > A. Mcgrew > Sent: Thursday, February 06, 2003 4:53 PM > To: Jose Rey; Avt@Ietf. Org > Cc: mbaugher@cisco.com; elisabetta.carrara@era.ericsson.se; > mats.naslund@era.ericsson.se; karl.norrman@era.ericsson.se; > oran@cisco.com > Subject: [AVT] RE: Security for draft-ietf-avt-rtp-retransmission > > > José, > > > -----Original Message----- > > From: Jose Rey [mailto:rey@panasonic.de] > > Sent: Thursday, January 23, 2003 8:35 AM > > To: Avt@Ietf. Org > > Cc: mbaugher@cisco.com; elisabetta.carrara@era.ericsson.se; > > mcgrew@cisco.com; mats.naslund@era.ericsson.se; > > karl.norrman@era.ericsson.se; oran@cisco.com > > Subject: Security for draft-ietf-avt-rtp-retransmission > > > > > > Hi all, > > > > we are doing the final edits to the > draft-ietf-avt-rtp-retransmission. > > We have considered all your comments until the date, but there's > > something for which we would like to get some feedback on: security. > > > > A couple of questions: > > > > 1.-As discussed on the list: > > ... > > > -----Original Message----- > > > From: avt-admin@ietf.org [mailto:avt-admin@ietf.org]On > Behalf Of Colin > > > Perkins > > > Sent: Friday, January 10, 2003 4:39 AM > > > To: David.Leon@nokia.com > > > Cc: avt@ietf.org > > > Subject: Re: [AVT] Comments on > > > draft-ietf-avt-rtp-retransmission-04.txt > > > > > ...snip... > > > > > >> - In section 12, how does this draft affect SRTP? Is it > > > possible to use > > > >> the two formats together? > > > > > > > >We'll try to draft something on that. My understanding > is that the > > > >retransmission stream is seen as any other stream by SRTP > > > and there should > > > >thus be no problem. > > > > > > I was not clear if retransmitting packets caused problems for > > > SRTP; maybe > > > one of the SRTP authors can comment on any potential > security issue? > > > > > > > we don't see any problems (except for SRTCP as below in 2) > to use SRTP > > with RTX since the RTP retransmission packets (with a two byte > > retransmission payload header) are seen by SRTP as 'normal' > RTP packets. > > Is our assumption correct? > > I think so. Certainly if the retransmission packets are > treated as a separate > session or separate stream with its own set of SRTP keys, > then there's no > problem. Fine. > The only potential issue that I see is that the > SRTP protection for > the retransmission data will need to get keys (and other > parameters) somehow. > Is the plan to signal the retransmission session/stream at > the same time as the > original stream, but then only use it if it is needed? In > that case, I'd expect > that all the SRTP info for both streams/sessions would be > provided by the > signaling, which seems like it would work well. > This is also my understanding. > > > > 2.-The retransmission payload format needs of the AVPF > profile to enable > > more frequent feedback and to request packets. This profile defines > > (besides the new timing rules) some general-purpose messages such as > > ACKs and NACKs and a new RTCP packet format: the early > feedback packet, > > which just contains 1 SR or RR and 1 SDES with just the CNAME. Now, > > there should be no problem to encrypt/authenticate early packets, > > according to the SRTP draft: > > > > " > > According to [RFC1889] there is a "recommended" packet format for > > compound packets. SRTCP MUST be given packets according to that > > recommendation in the sense that the first part MUST be a sender > > report or a receiver report. However, the encryption > prefix (Section > > 6.1 of [RFC1889]), a random 32-bit quantity intended to > deter known > > plaintext attacks, MUST NOT be used (see below). > > " > > > > > > Also there should be no problem to authenticate/encrypt > ACKs and NACKs > > with SRTCP since they are sent in compound RTCP packets > starting with an > > RR or SR packet. Let us know if you disagree with this point. > > > > > > 3.- if a new profile needs be defined, something like "SAVPF", where > > shall this profile "SAVPF" be specified and registered? > wouldn't it be > > reasonable to do this in the SRTP draft which already registers the > > "SAVP" profile given that the feedback draft would > (presumably) have a > > similar schedule to the SRTP draft? In this way the > question 2. could > > also be anwered there. > > The SRTP draft is in IESG review, so at this point it > wouldn't be appropriate to > drag it back. Yes, I understand. > But if the new profile is uncomplicated, it > shouldn't be hard to > throw together a new draft that references AVPF and SRTP to > make SAVPF. Could > you point me in the right direction as to what differences > between AVP and AVPF > would be important w.r.t. SRTP? > AVPF introduces new feedback messages ACKs/NACKs and application layer messages which, as concluded above, don't represent any problem for SRTP. This is because the RTCP packets used by AVPF-compliant entities also use the "recommended" RTCP packet format as in RTP, thus not being a problem (see point 2 above). The other major change is that the AVPF profile abolishes the 5-second rule; this shouldn't be a problem for SRTP either (?) > > > > 4.- the security section in the retransmission draft > already points out > > the risks of using the same keys across sessions, e.g. > two.-time pads > > and points to the SRTP for solutions. That much is done. > Are we missing > > something else? > > The draft says that "Applications utilising encryption SHOULD > encrypt both the > original and the retransmission stream." IIUC, it might > be better to state > that "If cryptography is used to provide security services on > the original > stream, then the same services, with equivalent cryptographic > strength, SHOULD > be provided on the retransmission stream." Also, I'm > wondering why you would > want a SHOULD and not a MUST here! > Right, thanks for the rewording. I like a MUST instead better. > Correct me if I'm wrong, but here's my mental picture of how > the combined > srtp/retransmission system would work: > > sender side > ----------- > > original rtp source -+------------------> srtp encrypter > (key1) ---> ... > | > +-> rexmit buffer -> srtp encrypter > (key2) ---> ... > > Another approach would be to move the retransmission buffer > to the other side of > the srtp encrypter, and get rid of key2. This would be > workable, since the > original sequence number is provided in the retransmitted > packet. However, this > scheme would not provide message authentication on the > retransmission packet > flow. Another demerit of this scheme is that it would > interact badly with the > SRTP anti-replay window; the recommended size for this window > is 128, and this > scheme might require an even larger one. So I like the first > method (the way I > think that you're doing it) better! > > At any rate, it might be good to describe how you want the > retransmission > mechanism to work with SRTP or other crypto mechanisms, to > avoid confusion down > the road. The 1st possibility as depicted by you is the one we have in mind. Your other "option" could be given as an example of what not to do and why. This would rule out possible questions. > > > > > 5.-It is also pointed out that the Timestamp of the retransmission > > packets is the same as in the original packets. Since this > is random it > > should be no problem for security. Is this assumption correct? > > I think that the non-randomness of the initial timestamp of > the retransmission > stream is not an issue. The unpredictability of the initial > RTP timestamp makes > a DoS attack more difficult for an attacker who is not able > to observe the RTP > flow, but who knows the destination address, destination port > number, and SSRC > of that flow. The same argument could be made for the > avt-rtp-retranmission > mechanism. If the attacker can't see the original flow, she > can't predict the > initial timestamp of the retransmission flow. If she can see > the original flow, > then there is no protection provided by having random > timestamp on either flow. > So there is no disadvantage to the avt-rtp-retransmission > mechanism's re-use of > the initial timestamp. > OK. Now, I got a question: as discussed in previous emails (see the email from Elisabetta), in the case of SSRC-multiplexing the same master key might be used for both streams since the SSRC is unique among the streams. In the original packets the SN is sent in the header, thus accessible. However in the retransmission packets, the retransmission payload header (the two bytes containing the original SN, OSN) is sent encrypted and its location is known: right after the RTP header before the payload. Since both original and retransmission packets have the same TS, an attacker could easily identify an original packet and its retransmission by comparing the TS. Once this is done he could easily see how the cleartext SN is encrypted. Now, I am not a security expert but, intuitively, this is not secure. Is it not a security threat? Does SRTP solve this? thanks, José _______________________________________________ Audio/Video Transport Working Group avt@ietf.org https://www1.ietf.org/mailman/listinfo/avt
- [AVT] Security for draft-ietf-avt-rtp-retransmiss… Jose Rey
- [AVT] Re: Security for draft-ietf-avt-rtp-retrans… Mark Baugher
- RE: [AVT] Re: Security for draft-ietf-avt-rtp-ret… David.Leon
- RE: [AVT] Re: Security for draft-ietf-avt-rtp-ret… Mark Baugher
- [AVT] RE: Security for draft-ietf-avt-rtp-retrans… Elisabetta Carrara (EAB)
- Re: [AVT] Re: Security for draft-ietf-avt-rtp-ret… Colin Perkins
- RE: [AVT] RE: Security for draft-ietf-avt-rtp-ret… Jose Rey
- RE: [AVT] Re: Security for draft-ietf-avt-rtp-ret… David.Leon
- RE: [AVT] Re: Security for draft-ietf-avt-rtp-ret… Stephen Casner
- [AVT] RE: Security for draft-ietf-avt-rtp-retrans… David A. Mcgrew
- RE: [AVT] RE: Security for draft-ietf-avt-rtp-ret… Jose Rey
- RE: [AVT] RE: Security for draft-ietf-avt-rtp-ret… David A. Mcgrew