Re: [AVTCORE] Last Call: <draft-ietf-avt-srtp-not-mandatory-14.txt> (Securing the RTP Protocol Framework: Why RTP Does Not Mandate a Single Media Security Solution) to Informational RFC

Colin Perkins <csp@csperkins.org> Mon, 09 December 2013 22:59 UTC

Return-Path: <csp@csperkins.org>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04B8A1A8028; Mon, 9 Dec 2013 14:59:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Rlr7R6tShXrr; Mon, 9 Dec 2013 14:59:07 -0800 (PST)
Received: from haggis.mythic-beasts.com (haggis.mythic-beasts.com [IPv6:2a00:1098:0:86:1000:0:2:1]) by ietfa.amsl.com (Postfix) with ESMTP id 9FF821A1F3F; Mon, 9 Dec 2013 14:59:07 -0800 (PST)
Received: from [87.213.41.162] (port=60746 helo=[10.71.0.165]) by haggis.mythic-beasts.com with esmtpsa (TLS1.0:RSA_AES_128_CBC_SHA1:16) (Exim 4.72) (envelope-from <csp@csperkins.org>) id 1Vq9n3-0000e8-52; Mon, 09 Dec 2013 22:59:02 +0000
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\))
From: Colin Perkins <csp@csperkins.org>
In-Reply-To: <BC503965-42C2-4E02-B7C2-70550EBB11C1@cisco.com>
Date: Mon, 09 Dec 2013 23:59:00 +0100
Content-Transfer-Encoding: quoted-printable
Message-Id: <0FA6EC2C-3FAB-4E72-882E-13640108C328@csperkins.org>
References: <20131122220752.31098.83432.idtracker@ietfa.amsl.com> <1286562B-6C43-4ADC-8999-C70CA356F587@cisco.com> <89E376B0-5555-40D8-A59E-0286CABC856C@csperkins.org> <BC503965-42C2-4E02-B7C2-70550EBB11C1@cisco.com>
To: Cullen Jennings <fluffy@cisco.com>
X-Mailer: Apple Mail (2.1510)
X-BlackCat-Spam-Score: -28
X-Mythic-Debug: Threshold = On =
Cc: "ietf@ietf.org" <ietf@ietf.org>, "avt@ietf.org WG" <avt@ietf.org>
Subject: Re: [AVTCORE] Last Call: <draft-ietf-avt-srtp-not-mandatory-14.txt> (Securing the RTP Protocol Framework: Why RTP Does Not Mandate a Single Media Security Solution) to Informational RFC
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Dec 2013 22:59:10 -0000

Cullen,

That is absolutely not the intent of the document. From the Introduction, 2nd paragraph:

   The IETF policy on Strong Security Requirements for IETF Standard
   Protocols [RFC3365] (the so-called "Danvers Doctrine") states that
   "we MUST implement strong security in all protocols to provide for
   the all too frequent day when the protocol comes into widespread use
   in the global Internet".  The security mechanisms defined for use
   with RTP allow these requirements to be met.  However, since RTP is a
   protocol framework that is suitable for a wide variety of use cases,
   there is no single security mechanism that is suitable for every
   scenario.  This memo outlines why this is the case, and discusses how
   users of RTP can meet the requirement for strong security.

You will note that last sentence "This memo...discusses how users of RTP can meet the requirement for strong security". Experience has shown that just saying "use SRTP" is not sufficient: SRTP is not suitable to secure all uses of RTP, and the keying mechanisms needed are wildly different across different use domains. The draft explains in more detail why this is the case, and makes the case that we need -- as you suggest -- drafts explaining how to secure each class of applications using RTP (telephony, WebRTC, IPTV, etc.). It doesn't actually specify security, that it true. Rather is references to draft-ietf-avtcore-rtp-security-options (also in IETF last call) which describes the available security options, and refers to the drafts that do define mandatory-to-implement security for different application domains (e.g., the WebRTC security architecture).

If some part of the draft is unclear about this, and can possibly be interpreted to allow insecure use of RTP, please explain what, and we will fix it. 

Colin


On 9 Dec 2013, at 23:24, Cullen Jennings (fluffy) <fluffy@cisco.com> wrote:
> This document says RTP does not need to specify a security mechanisms and that's OK. Note this document could says you must do A or B depending on the situation but it does not. It just says it is ok not to specify anything.
> 
> My read of the consensus at last plenary was that the IETF had decided it was going to stop doing that. I don't care about if this draft is published as it or not as I think this draft will have zero impact to what is deployed. I do think it is worth us being consistent on what security we expect to have in RFC going forward.
> 
> All I am asking is the IESG be consistent about how they judge consensus on this and if they decide to publish it, provide some guidance on when they think it is fine to not have security and when they think it is not fine. 
> 
> 
> 
> On Dec 6, 2013, at 4:40 AM, Colin Perkins <csp@csperkins.org> wrote:
> 
>> Cullen,
>> 
>> On 5 Dec 2013, at 16:56, Cullen Jennings (fluffy) <fluffy@cisco.com> wrote:
>>> Given the hum in the IETF plenary at the last IETF, I no longer think this document represents IETF consensus. Given the hum in RTCWeb working group, I doubt this represents the consensus of the RAI area either. 
>>> 
>>> I think I would be tempted to resolve this by saying for each different scenario RTP is used in (SIP, RTSP, Mulitcast etc) exactly how it needs to be secured and for scenarios not listed such as new usages, what the requirements are. For something like SIP, having just one way to secure RTP is much better than having many ways. 
>> 
>> 
>> I'm confused about your objection, since this draft states that we need to do exactly as you propose. 
>> 
>> Colin
>> 
>> 
>> 
>> -- 
>> Colin Perkins
>> http://csperkins.org/
>> 
>> 
>> 
> 
> _______________________________________________
> Audio/Video Transport Core Maintenance
> avt@ietf.org
> https://www.ietf.org/mailman/listinfo/avt