Re: [Cellar] Roman Danyliw's Discuss on draft-ietf-cellar-matroska-18: (with DISCUSS and COMMENT)

Roman Danyliw <rdd@cert.org> Mon, 14 August 2023 15:50 UTC

Return-Path: <rdd@cert.org>
X-Original-To: cellar@ietfa.amsl.com
Delivered-To: cellar@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 22967C151997; Mon, 14 Aug 2023 08:50:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QJkGtPnQq7Du; Mon, 14 Aug 2023 08:50:09 -0700 (PDT)
Received: from USG02-BN3-obe.outbound.protection.office365.us (mail-bn3usg02on0107.outbound.protection.office365.us [23.103.208.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CE8DFC1516E1; Mon, 14 Aug 2023 08:50:08 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=GdaM/XvnmGL+87Z2gCe+45H9Hxdc+pI/H/HbG6UoO2Eo5cGS2LAV1DszWtXHFXE4b25+RSgMVD7ewX/wUpM2gyqCV9UL4/HcIUSDS8YiIJCWryi3fOjkY3Q0yXxM6MqZ175pXGU9XGcCIdW9AxIbe/zF+np3cSZ6xK6XNeb/fvl+oDVXr0v0+j/8cwl+LIpCZ/CVh7ITOYFnJ+NrZVVeXQsfBAgVSUbZJNcNcBnHklcOYvZt/ANiOmV/z1Zriax57W2CfPzslwKjCNLOhGLY4aopxsqybcfu7uL0G/exjsn39TAot6Paz6yxcTEs28M9+0ObprYOKfhjSMW9jiEDtQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=tkVbPwpl14VxEkICz1d9rY1sB7tZCkR0qH12h9iXoUo=; b=DPGuDLJ7vjD4fNx9Fc/Ag0Y/52w79ZPJckZ1wOVXEMZymHDUemS0VriaJ5/w0fr+XgcPUxdMwfz46HaGTMpaRxU2djmY8/m4OPMF+AJxjjmWSwxwJFaABJosj+oGrETPW1VFpFrGva7zjfEW62KTptLYfJDfodaTdL3z2KGG5T5bJ/KxYILc5jEI5BVuhkTB2/iY7RlWfkq5xLF/Xdc922MpBlr/POXMX4Fq5fL54n87M3gxQP56MD7aCfMwiDAzT3Ctxt31q5uucof7z1qmX/ic+lbEuGIgTIpiN7jfFjr589F+ehgDm5Vl0GRHe5I9rEj7fopXA9l/bcEesDKGfQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cert.org; dmarc=pass action=none header.from=cert.org; dkim=pass header.d=cert.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tkVbPwpl14VxEkICz1d9rY1sB7tZCkR0qH12h9iXoUo=; b=PbJrkyiNCUiw5iDaqWKoTRpmSUaY6dNE5O/jjEEAKHeQsteU3Rbfc5QDKqzSpehTuFY68T7QeeAD1P3aqgkFTSCD3KDzVuJN5Oh/WMHR7M9ugFqkyiD+Ckg/aEwavbdtpDZP7KMU81wc3cLd71goerz2hYUSF5ev1Vzx5fcwzx8=
Received: from BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:168::11) by BN2P110MB1138.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:16a::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6652.33; Mon, 14 Aug 2023 15:50:06 +0000
Received: from BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM ([fe80::2bb4:7f24:a90f:44d9]) by BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM ([fe80::2bb4:7f24:a90f:44d9%7]) with mapi id 15.20.6652.033; Mon, 14 Aug 2023 15:50:05 +0000
From: Roman Danyliw <rdd@cert.org>
To: Steve Lhomme <slhomme@matroska.org>
CC: The IESG <iesg@ietf.org>, "draft-ietf-cellar-matroska@ietf.org" <draft-ietf-cellar-matroska@ietf.org>, "cellar-chairs@ietf.org" <cellar-chairs@ietf.org>, Codec Encoding for LossLess Archiving and Realtime transmission <cellar@ietf.org>, Michael Richardson <mcr+ietf@sandelman.ca>
Thread-Topic: [Cellar] Roman Danyliw's Discuss on draft-ietf-cellar-matroska-18: (with DISCUSS and COMMENT)
Thread-Index: AQHZvnbnNdFbOQb7V0OgCnLynzWAvq/SSU4AgAlUWQCACwz2gIADZiHA
Date: Mon, 14 Aug 2023 15:50:05 +0000
Message-ID: <BN2P110MB1107EEEA5CF45203C5DF14EADC17A@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM>
References: <169023457125.6621.17494431568319622884@ietfa.amsl.com> <3C91722A-7BF5-481B-AC7E-0D8ADC8A5F2B@matroska.org> <994BBF57-8B9C-4D3F-8F36-895025543131@matroska.org> <FAB318CA-9E8F-4664-AC67-8EB29E8D1587@matroska.org>
In-Reply-To: <FAB318CA-9E8F-4664-AC67-8EB29E8D1587@matroska.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cert.org;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BN2P110MB1107:EE_|BN2P110MB1138:EE_
x-ms-office365-filtering-correlation-id: 27f39478-0611-4977-f13c-08db9cde214a
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230028)(396003)(39830400003)(366004)(136003)(451199021)(186006)(1800799006)(66476007)(26005)(6506007)(53546011)(966005)(9686003)(38070700005)(82960400001)(86362001)(33656002)(41320700001)(166002)(122000001)(38100700002)(55016003)(83380400001)(508600001)(66946007)(71200400001)(6916009)(52536014)(54906003)(8936002)(41300700001)(5660300002)(8676002)(66446008)(7696005)(64756008)(76116006)(4326008)(2906002)(66556008); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: H8dwdgIlE3VzY+fkPr+OWCQPe+t9NhBTG64Y2lvEO2F/dqAXcJTH2JAWRt82pvQDDlsLLMxEV/OJBWCONfwUV7IjdLw2Lq0u4tBM2y++84ooOcXBzFvfVaCoxWqemj3b7DgDWKxY+xai8eFwbiqGjBJRfzvMXULnpz3kOf7GLq88/i+arbzZnp3iGCUHRzciWkhRIAcRMLXKJeZpF36XQ2FPC1aPtaS4+b8t+KkEk2JullQDWf0wxI+2UMPsrmPBCLaM0c6w3qyTN/EU9zMmTNo/K2sMNSMiZf51Ah7wlHlWRI3XJ+sEH8170QJI7jYrMx3dk/e5oVm7quh+kkq7GiHDKvHp8AWiFWQa1uWv0AU13OMwrMp6OwSDjmCN97uWgAsEevw8HoN+ipaxpcqDI23CVYJ2UhFq9RfgnovfJpM=
Content-Type: multipart/alternative; boundary="_000_BN2P110MB1107EEEA5CF45203C5DF14EADC17ABN2P110MB1107NAMP_"
MIME-Version: 1.0
X-OriginatorOrg: cert.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 27f39478-0611-4977-f13c-08db9cde214a
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Aug 2023 15:50:05.8035 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 95a9dce2-04f2-4043-995d-1ec3861911c6
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN2P110MB1138
Archived-At: <https://mailarchive.ietf.org/arch/msg/cellar/xgKb_xGNk1TV74klQzQsUCAuaHE>
Subject: Re: [Cellar] Roman Danyliw's Discuss on draft-ietf-cellar-matroska-18: (with DISCUSS and COMMENT)
X-BeenThere: cellar@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Codec Encoding for LossLess Archiving and Realtime transmission <cellar.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cellar>, <mailto:cellar-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cellar/>
List-Post: <mailto:cellar@ietf.org>
List-Help: <mailto:cellar-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cellar>, <mailto:cellar-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Aug 2023 15:50:13 -0000

Hi Steve!

Thanks for all your iteration on the document to respond to my feedback.  I just cleared my ballot per the new merged text in -19.

Thanks,
Roman

From: Steve Lhomme <slhomme@matroska.org>
Sent: Saturday, August 12, 2023 7:55 AM
To: Roman Danyliw <rdd@cert.org>
Cc: The IESG <iesg@ietf.org>; draft-ietf-cellar-matroska@ietf.org; cellar-chairs@ietf.org; Codec Encoding for LossLess Archiving and Realtime transmission <cellar@ietf.org>; Michael Richardson <mcr+ietf@sandelman.ca>
Subject: Re: [Cellar] Roman Danyliw's Discuss on draft-ietf-cellar-matroska-18: (with DISCUSS and COMMENT)

Hi everyone,

The Pull Request has been merged with all the changes, plus additional wording fixes.
This is now in version 19 of the draft: https://datatracker.ietf.org/doc/draft-ietf-cellar-matroska/19/

Steve


On 5 Aug 2023, at 13:09, Steve Lhomme <slhomme@matroska.org<mailto:slhomme@matroska.org>> wrote:

Hi Roman,


On 30 Jul 2023, at 14:41, Steve Lhomme <slhomme@matroska.org<mailto:slhomme@matroska.org>> wrote:

[Per -16]

** Section 5.1.4.1.31.10.  ContentEncKeyID Element.
    definition:  For public key algorithms this is the ID of the public
     key the the data was encrypted with.

The descriptive text is suggesting that the ID to a public key if public key
algorithms are described.  However, Table 26 only lists symmetric algorithms.
How is this key ID used?

I didn’t receive a response to this feedback.  Even recognizing that the
security solution is out-of-scope, this text is inconsistent with existing text
as described above.  Is the public key solution a KEK?

I had to lookup what a KEK is. I think the important naming here is ContentEncKeyID. It does not say it’s public or just a generic key. We could just remove the word “public” from the text.


There is related text in Section 14 which references public keys which should
be harmonized.  Specifically:

  For encryption systems sharing public/private keys, the creation of
  the keys and the exchange of keys are not covered by this document.
  They have to be handled by the system using Matroska.

A bit more on this. I did my own research and found out about Key IDs in the Encrypted Media Extension [1]. As the name suggests, it’s not an actual key but an ID the host app has to interpret.
However for asymmetric encryption algorithms, ie that use a public key, it may usually be preferred to share the public key rather than an ID. For symmetric algorithms the key must not be in the file, that’s why it’s using an ID that both sides must understand.

None of the algorithms in ContentEncAlgo are asymmetric ones. So for now we don’t support asymmetric encryption. If that ever happens we’ll need to define where the public key goes. IMO it could be ContentEncKeyID if the key is not in the file. And it should be a different element if the key is in the file.

** Section 5.1.4.1.31.*.  AES and associated modes (CTR and CBC) are named.
What is the key size?  Is it AES-128 (?) or -256. [WebM-Enc] references in
Section 14 suggests it is 128.  Please be explicit.

Please explicitly say that some of the algorithms described in Table 26 support
different modes of operations and key sizes.  The specification of these
parameters is required for a complete solution, but is out of scope of this
document and left to the propriety implementations using them or subsequent
profiles of this document.

Isn’t the key stored in ContentEncKeyID ? If so the size of the key is the size of the data in the element. It doesn’t need to be written somewhere else.
So if your system only supports AES-256 but ContentEncKeyID only has 16 octets (128 bits) then you don’t support it.

The WebM spec also doesn’t mention it but it’s implied by the elements necessary to support their encryption system.

OK, now I understand we do not put any actual key in the Matroska files. So we can’t deduce the key size from our element.

I added your text suggestion in the Pull Request [2]

[1] https://www.w3.org/TR/encrypted-media/
[2] https://github.com/ietf-wg-cellar/matroska-specification/pull/797