Re: [clue] Eric Rescorla's No Objection on draft-ietf-clue-signaling-14: (with COMMENT)

Eric Rescorla <ekr@rtfm.com> Sun, 25 November 2018 13:15 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: clue@ietfa.amsl.com
Delivered-To: clue@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A460A12D7F8 for <clue@ietfa.amsl.com>; Sun, 25 Nov 2018 05:15:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.358
X-Spam-Level:
X-Spam-Status: No, score=-3.358 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-1.459, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id juJHR46fDPeJ for <clue@ietfa.amsl.com>; Sun, 25 Nov 2018 05:15:17 -0800 (PST)
Received: from mail-lj1-x233.google.com (mail-lj1-x233.google.com [IPv6:2a00:1450:4864:20::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0BE791288EB for <clue@ietf.org>; Sun, 25 Nov 2018 05:15:17 -0800 (PST)
Received: by mail-lj1-x233.google.com with SMTP id v15-v6so14095903ljh.13 for <clue@ietf.org>; Sun, 25 Nov 2018 05:15:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=OHE8MZlcMklEh2Xb9nbzXuXzUGjqZ+lWLO5sobXTlR0=; b=gycV5Goh5anRSqvTBU8Wf5A8Oq1os1r0VbNwyFzkh/5Gqw4mYqi/fbaZEArK8qDAF5 nLkSGao48FoXAM7NQds1TCHE1LE0jMjilZc8l4iS3NZGP3dfKghQp4930N0oMkkw5dvI sCUwHS3hpqGPAZ1i27BTparkOBNVcrpoOTaQYOVh//El7l29Q/m8LHTeRSsDX1l5Hf6e KqauYddNyp9hTVqswm0gQJqhxYeJ8+nakkDKNNQATZta2zFd2w0jlpazBlwwRBfJaStk +Xhv/4fSeDlSzC3rB0kM7nQh4O5PhXl+s6cisqNnNDYhHKMMB5iai1+Z84ipff9D8wqw ZA+A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=OHE8MZlcMklEh2Xb9nbzXuXzUGjqZ+lWLO5sobXTlR0=; b=CtjlhYJRm6t2x+WlPSVgoyHUVqEI/wzb5kpAfX+acZZfQTP3k76WYzpj4rrtfx7kOb Hdc3y/rI53Lggxo9UKfu/c2Sg1oaX9PMJRYMmdmxgqQKBAucgyUZoXwp3W6xYKhlNL1v Le31tBZ6JBrDhxo0CDVIdP5JX4loPaWSFpb+Agsc2mxsIFAZ+phllgFHcqq9kiThs4NH 7IxKel1cvIBG7/VjABdBjYoRZZkIbV143wb5IGKby3HVIQscYrOm2t5ZWK+Yc/uvP6A0 gwCnZhnLhvRz1aaJOiR+y3YUVlePTpQLohp6NuZTPj27RIB59BRl/2oKIqc/JcuLUHq5 AetQ==
X-Gm-Message-State: AGRZ1gJ0efmyALzVrxxFcsor1DDNyD7wDjFdzdXUNLG3yGClY2WoB315 KRbF4MCq7wZsCUZWUjiA82gQ9ubTB3t0xPDf6DOrJQ==
X-Google-Smtp-Source: AFSGD/UZEljZ90J+SniBbs7veaah8VHjLGu4CfI3Vq6ZlfjAxGtyjBP2h//u49wA4tEqmH8TIKeOw0PbXWpSSAKp1B4=
X-Received: by 2002:a2e:1551:: with SMTP id 17-v6mr14399876ljv.68.1543151715212; Sun, 25 Nov 2018 05:15:15 -0800 (PST)
MIME-Version: 1.0
References: <154268892146.26648.17870778354406192041.idtracker@ietfa.amsl.com> <6E58094ECC8D8344914996DAD28F1CCD18C762DF@DGGEMM506-MBX.china.huawei.com> <CABcZeBMcQxZuRUFx=tz==C5eCc8zNBrxkKaZfBa+gYnyaV3FOQ@mail.gmail.com> <6E58094ECC8D8344914996DAD28F1CCD18C7B5DE@DGGEMM506-MBS.china.huawei.com>
In-Reply-To: <6E58094ECC8D8344914996DAD28F1CCD18C7B5DE@DGGEMM506-MBS.china.huawei.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sun, 25 Nov 2018 05:14:36 -0800
Message-ID: <CABcZeBOPPojS2zsR6uZCagcs7yBBmtMW9rcyPw_gEK44u7GH1w@mail.gmail.com>
To: Roni Even <roni.even@huawei.com>
Cc: IESG <iesg@ietf.org>, Daniel Burnett <danielcburnett@gmail.com>, clue@ietf.org, roni.even@mail01.huawei.com, clue-chairs@ietf.org, draft-ietf-clue-signaling@ietf.org
Content-Type: multipart/alternative; boundary="000000000000d1f706057b7d01e7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/clue/IZ88oQnz1lrGOA7afE17bTYzvKA>
Subject: Re: [clue] Eric Rescorla's No Objection on draft-ietf-clue-signaling-14: (with COMMENT)
X-BeenThere: clue@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: CLUE - ControLling mUltiple streams for TElepresence <clue.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/clue>, <mailto:clue-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/clue/>
List-Post: <mailto:clue@ietf.org>
List-Help: <mailto:clue-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/clue>, <mailto:clue-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 25 Nov 2018 13:15:20 -0000

On Sat, Nov 24, 2018 at 9:41 PM Roni Even (A) <roni.even@huawei.com> wrote:

> Hi,
>
> The point that is made that in general CLUE is similar to no CLUE RTP
> media calls. The difference is that since the EP may open more than one RTP
> video channel there is a greater risk of sending more media to the victim.
>

Yes, but in order to have a useful countermeasure, that needs to be
mandatory, and yours is not.

-Ekr


RFC7201 discuss the options to secure the media and this holds for this
> case too.
>



>
> Roni
>
>
>
> *From:* Eric Rescorla [mailto:ekr@rtfm.com]
> *Sent:* Thursday, November 22, 2018 5:27 PM
> *To:* Roni Even (A)
> *Cc:* IESG; Daniel Burnett; clue@ietf.org; roni.even@mail01.huawei.com;
> clue-chairs@ietf.org; draft-ietf-clue-signaling@ietf.org
> *Subject:* Re: Eric Rescorla's No Objection on
> draft-ietf-clue-signaling-14: (with COMMENT)
>
>
>
> The problem is that this is in the context of amplification attacks
>
>
>
>    Beyond the need to secure the constituent protocols, the use of CLUE
>    does impose additional security concerns.  One area of increased risk
>    involves the potential for a malicious party to subvert a CLUE-
>    capable device to attack a third party by driving large volumes of
>    media (particularly video) traffic at them by establishing a
>    connection to the CLUE-capable device and directing the media to the
>    victim.  While this is a risk for all media devices, a CLUE-capable
>    device may allow the attacker to configure multiple media streams to
>    be sent, significantly increasing the volume of traffic directed at
>    the victim.
>
>    This attack can be prevented by ensuring that the media recipient
>    intends to receive the media packets.  As such all CLUE-capable
>    devices MUST support key negotiation and receiver intent assurance
>    via DTLS-SRTP [RFC5763] on CLUE-controlled RTP "m=" lines.
>
>
>
> And so if you don't require DTLS-SRTP or ICE than in fact there is no
> amplification
>
> attack defense.
>
>
>
> -Ekr
>
>
>
>
>
> On Thu, Nov 22, 2018 at 3:24 AM Roni Even (A) <roni.even@huawei.com>
> wrote:
>
> Hi,
> RTP payloads do not require usage of SRTP see RFC7201 and RFC7202
> Roni Even
>
> -----Original Message-----
> From: Eric Rescorla [mailto:ekr@rtfm.com]
> Sent: Tuesday, November 20, 2018 6:42 AM
> To: The IESG
> Cc: Daniel C. Burnett; clue@ietf.org; roni.even@mail01.huawei.com; Roni
> Even; clue-chairs@ietf.org; draft-ietf-clue-signaling@ietf.org
> Subject: Eric Rescorla's No Objection on draft-ietf-clue-signaling-14:
> (with COMMENT)
>
> Eric Rescorla has entered the following ballot position for
> draft-ietf-clue-signaling-14: No Objection
>
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
>
>
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
>
>
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-clue-signaling/
>
>
>
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
>
> Rich version of this review at:
> https://mozphab-ietf.devsvcdev.mozaws.net/D4099
>
>
>
> COMMENTS
> S 12.
> >      via DTLS-SRTP [RFC5763] on CLUE-controlled RTP "m=" lines.  All
> CLUE-
> >      controlled RTP "m" lines must be secured and implemented using
> >      mechanisms such as SRTP [RFC3711].  CLUE implementations MAY choose
> >      not to require the use of SRTP to secure legacy
> (non-CLUE-controlled)
> >      media for backwards compatibility with older SIP clients that are
> >      incapable of supporting it.
>
> It seems like you need more than support, you also need to require the use
> of DTLS-SRTP, no?
>
>