Re: [AVTCORE] Stephen Farrell's Discuss on draft-ietf-avtcore-srtp-aes-gcm-14: (with DISCUSS)

Stephen Farrell <stephen.farrell@cs.tcd.ie> Fri, 06 February 2015 15:05 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: avt@ietfa.amsl.com
Delivered-To: avt@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 06FBA1A1B1B; Fri, 6 Feb 2015 07:05:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id h76LKavAsLCc; Fri, 6 Feb 2015 07:05:42 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A02DB1A1B2B; Fri, 6 Feb 2015 07:05:40 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 2056CBED3; Fri, 6 Feb 2015 15:06:11 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id abSiJ0jNrPoT; Fri, 6 Feb 2015 15:06:09 +0000 (GMT)
Received: from [10.87.48.73] (unknown [86.46.24.69]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 21215BED1; Fri, 6 Feb 2015 15:06:09 +0000 (GMT)
Message-ID: <54D4D840.4080808@cs.tcd.ie>
Date: Fri, 06 Feb 2015 15:05:36 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0
MIME-Version: 1.0
To: Magnus Westerlund <magnus.westerlund@ericsson.com>, David McGrew <mcgrew@cisco.com>
References: <20141029122825.18943.78129.idtracker@ietfa.amsl.com> <3C4AAD4B5304AB44A6BA85173B4675CABC709A18@MSMR-GH1-UEA03.corp.nsa.gov> <545151F9.9050502@cs.tcd.ie> <B1821703-9D09-41C5-AAC1-5EBB9CE2ACC4@cisco.com> <54516572.8020601@cs.tcd.ie> <D825D4F3-26D3-49BE-9E32-0E4FFF89BC40@cisco.com> <5451737B.6060504@cs.tcd.ie> <2D4BE3ED-840A-444C-9D18-09BC3D937D64@cisco.com> <54CA135D.3020304@ericsson.com>
In-Reply-To: <54CA135D.3020304@ericsson.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/avt/vZ_I4GdLIt5YnBelE5JSpfRsDXM>
Cc: "avtcore-chairs@tools.ietf.org" <avtcore-chairs@tools.ietf.org>, "draft-ietf-avtcore-srtp-aes-gcm@tools.ietf.org" <draft-ietf-avtcore-srtp-aes-gcm@tools.ietf.org>, The IESG <iesg@ietf.org>, IETF AVTCore WG <avt@ietf.org>
Subject: Re: [AVTCORE] Stephen Farrell's Discuss on draft-ietf-avtcore-srtp-aes-gcm-14: (with DISCUSS)
X-BeenThere: avt@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Audio/Video Transport Core Maintenance <avt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/avt>, <mailto:avt-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/avt/>
List-Post: <mailto:avt@ietf.org>
List-Help: <mailto:avt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/avt>, <mailto:avt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Feb 2015 15:05:45 -0000

Hi Magnus,

I had hoped the WG would chime in but apparently they do not
care much about this topic.

I'd take that as indicating that it is ok to remove some of
the options since nobody is yelling that they are all needed.

After all - is there really a need to define 10 ways of using
one algorithm (AES) to do pretty much exactly the same thing?

I think 10 options is just damaging to interop even if done for
the best of motives.

S.

On 29/01/15 11:02, Magnus Westerlund wrote:
> Hi Stephen, All,
> 
> (Adding the AVTCORE WG): WG there are feedback requested from you below!
> 
> I am taking over as shepherd for this document and would like to make
> some progress here.
> 
> I would like to make some observations around the discuss.
> https://datatracker.ietf.org/doc/draft-ietf-avtcore-srtp-aes-gcm/ballot/#stephen-farrell
> 
> First, that Stephen appear to grouping AES-GCM and AES-CCM into one
> bucket. From my perspective they are defined as two different ciphers
> for SRTP but within a single document. One can implement either of them
> without any requirement on implementing the other from this document.
> 
> Each of them have MTI requirements on configurations that MUST be
> supported if one support that particular cipher. That is defined as
> strongest for each key length.
> 
>>From the draft:
> 
> Section 13.1:
> 
>    Any implementation of AES-GCM SRTP MUST support both AEAD_AES_128_GCM
>    and AEAD_AES_256_GCM (the versions with 16 octet AEAD authentication
>    tags), and it MAY support the four other variants shown in table 1.
> 
> Section 13.2:
> 
>    Any implementation of AES-CCM SRTP/SRTCP MUST support both
>    AEAD_AES_128_CCM and AEAD_AES_256_CCM (the versions with 16 octet
>    AEAD authentication tags), and MAY support the other four variants.
> 
> I would further also note that to make anything MTI for SRTP independent
> on deployment and usage, then a document must Update the MTI definition
> in RFC 3711, something that hasn't been done yet. So far it is up to the
> umbrella specifications, like WebRTC etc as discussed in SRTP not
> mandatory document (RFC 7202) to define what ciphers that MUST be
> implemented. And if we are updating RFC 3711 the mandatory to implement
> for any SRTP implementation will certainly be a question.
> 
> 
> When it comes to the core of your discuss if these 4 (AES-GCM) + 6
> (AES-CCM) options must be defined. That is difficult question. One which
> is difficult to answer within the context of the WG actually. As David
> has raised in the private discussion so far there will be people that
> will argue anything other than the longest tags and keys are acceptable,
> others will note that using the 16 byte authentication tags do results
> in the authentication data being more than the RTP payload (single audio
> frame) for a number of the audio formats we have. Me personally I think
> I would remove the 12 bytes tag-length from AES-CCM to reduce the number
> of options. But two tag-lengths and two key-lengths do not appear
> excessive.
> 
> WG, the chairs and ADs appreciate feedback on your view here.
> 
> 
> Cheers
> 
> Magnus Westerlund
> 
> ----------------------------------------------------------------------
> Services, Media and Network features, Ericsson Research EAB/TXM
> ----------------------------------------------------------------------
> Ericsson AB                 | Phone  +46 10 7148287
> Färögatan 6                 | Mobile +46 73 0949079
> SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
> ----------------------------------------------------------------------
>