Re: [dispatch] Updated PERC Charter proposal

"Roni Even" <ron.even.tlv@gmail.com> Sat, 23 May 2015 07:27 UTC

Return-Path: <ron.even.tlv@gmail.com>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 590691A92B7 for <dispatch@ietfa.amsl.com>; Sat, 23 May 2015 00:27:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ouU2-EdEpdpo for <dispatch@ietfa.amsl.com>; Sat, 23 May 2015 00:27:56 -0700 (PDT)
Received: from mail-wi0-x232.google.com (mail-wi0-x232.google.com [IPv6:2a00:1450:400c:c05::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 76FF61A92B8 for <dispatch@ietf.org>; Sat, 23 May 2015 00:27:55 -0700 (PDT)
Received: by wicmx19 with SMTP id mx19so7143788wic.0 for <dispatch@ietf.org>; Sat, 23 May 2015 00:27:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:cc:references:in-reply-to:subject:date:message-id :mime-version:content-type:thread-index:content-language; bh=M+PtMMe7bUhLSxsmvXD5RlIsqVFsGCWacHQOeiJ0T0A=; b=KFzg0oSWNSlGZQjrze3ktMW4Z5aEHKdvtuaPZAs+Md9nkfUqFH2b6SvktnJNCpRmrW GCK5x7hvHBRqts85xS2it/IlL+mnbaSHcSuLhQHRhLLmrZ+gn2lSAh3gAKODAIQvGPKw 7uTOZ0/Z0qG1rBXEG6cgcp/J5jRx3Rj3humaItwlUJ8UtUxtFxIysal20jfjkKmcs72j tP7ucsCfsuaBDw3ykDm1n5i2ERxi5LVoZGPQ9PJGqsO0jjLbQmCLBG8Zoe7yuxOjcboQ qOlGDGNHmnvkIjmCPixXLboStv88gew72Ox2bqSpK0pRGYOILSXKyBu2Ae+JIX8JUuVS qGgQ==
X-Received: by 10.194.11.73 with SMTP id o9mr22302854wjb.116.1432366074176; Sat, 23 May 2015 00:27:54 -0700 (PDT)
Received: from RoniE ([109.65.144.138]) by mx.google.com with ESMTPSA id be3sm1693707wib.21.2015.05.23.00.27.50 (version=TLSv1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Sat, 23 May 2015 00:27:52 -0700 (PDT)
From: Roni Even <ron.even.tlv@gmail.com>
To: 'Mary Barnes' <mary.ietf.barnes@gmail.com>, 'DISPATCH' <dispatch@ietf.org>
References: <CAHBDyN6BeyL-wh_=t7jN+tfhTTnZK0uTBra-F7MR11x9eFkGpg@mail.gmail.com>
In-Reply-To: <CAHBDyN6BeyL-wh_=t7jN+tfhTTnZK0uTBra-F7MR11x9eFkGpg@mail.gmail.com>
Date: Sat, 23 May 2015 10:27:41 +0300
Message-ID: <03a201d09529$f606e870$e214b950$@gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_03A3_01D09543.1B55CE20"
X-Mailer: Microsoft Outlook 14.0
Thread-Index: AQMeczP7p56zGI9386mjnB7ayVQMqZrtax9A
Content-Language: en-us
Archived-At: <http://mailarchive.ietf.org/arch/msg/dispatch/8K4zmEocS7qbeFfuJtS4fovcCBo>
Cc: 'Ben Campbell' <ben@nostrum.com>, 'Barry Leiba' <barryleiba@computer.org>
Subject: Re: [dispatch] Updated PERC Charter proposal
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 May 2015 07:27:59 -0000

Hi,

The charter looks good to me,

 

One comment about the milestone, the first milestone is for architecture while the first bullet in the work to be done also mentions the RTP topologies, so I assume that the first milestone also includes new RTP topologies or will the RTP topologies to be used will only be topologies from draft-ietf-avtcore-rtp-topologies-update-07 <https://tools.ietf.org/html/draft-ietf-avtcore-rtp-topologies-update-07>  ?

 

Roni Even

 

From: dispatch [mailto:dispatch-bounces@ietf.org] On Behalf Of Mary Barnes
Sent: 22 May, 2015 6:52 PM
To: DISPATCH
Cc: Barry Leiba; Ben Campbell
Subject: [dispatch] Updated PERC Charter proposal

 

Hi all,

 

Below, please find an updated charter for PERC.  Magnus has updated the charter to incorporate feedback from the DISPATCH WG mailing list discussions and we've made a round of editorial changes.  It should be ready for Ben to submit to the IESG for consideration as a new WG.  So, please review and provide any final comments no later than 18:00 GMT on Monday, May 25th (and yeah, I know it's a US holiday but folks in the US have the rest of today to review and there really should be no surprises;) 

 

Regards,

Mary

DISPATCH WG co-chair

 

 

=========================================================================

 

 

 

Name: Privacy Enhanced RTP Conferencing (PERC)

Area: ART

Chairs: TBD

Mailing List: <using  <mailto:dispatch@ietf.org> dispatch@ietf.org for now> 

 

Motivation for new WG

RTP-based real-time multi-party interactive media conferencing is in widespread use today. Many of the deployments use one or more centrally located media distribution devices that perform selective forwarding of mixed-media streams received from the participating endpoints. The media transport protocol commonly used is RTP (RFC3550). There are various signaling systems used to establish these multi-party conferences.

These conferences require security to ensure that the RTP media and related metadata of the conference is kept private and only available to the set of invited participants and other devices trusted by those participants with their media.  At the same time, multi-party media conferences need source authentication and integrity checks to protect against modifications, insertions, and replay attacks.  Media distribution devices supporting these conferences may also perform RTP header changes, and they often consume and create RTCP messages for efficient media handling.

 

To date, deployment models for these multi-party media distribution devices do not enable the devices to perform their functions without having keys to decrypt the participants’ media, primarily using Secure RTP (RFC3711) to provide session security. 

This trust model has limitations and prevents or hampers deployment of secure RTP conferencing in a multitude of cases, including outsourcing, legal requirements on confidentiality, and utilization of virtualized servers. Thus, a new architectural model and related specifications are needed, with a focused effort from the RTP and Security communities.

WG Objectives

This WG will work on a solution that enables centralized SRTP-based conferencing, where the central device distributing the media is not required to be trusted with the keys to decrypt the participants’ media. The media must be kept confidential and authenticated between an originating endpoint and the explicitly allowed receiving endpoints or other devices.  Further, it is desired that a solution still provides replay protection, so that the media distribution devices can’t replay previous parts of the media.

The solution must also provide security for each hop between endpoints and multi-party media distribution devices and between multi-party media distribution devices. The RTCP messages and RTP header extensions required for the media distribution device to perform the selective media forwarding may require both source authentication and integrity as well as confidentiality. The solution may also consider providing end-to-end security for a subset of the RTCP messages or RTP header extensions.

 

The solution should be implementable by both SIP (RFC3261) and WebRTC ( <https://datatracker.ietf.org/doc/draft-ietf-rtcweb-overview/> draft-ietf-rtcweb-overview) endpoints. How telepresence endpoints using the protocols defined in the CLUE working group could utilize the defined security solution needs to be considered. However, it is acknowledged that limitations may exist, resulting in restricted functionality or need for additional adaptations of the CLUE protocols. 

 

This working group will perform the following work:

1.    Define a general architecture and RTP topology(s) that enables end-to-end media security for multi-party RTP conferencing.

2.    Define the trust model and describe the resulting security properties.

3.  Document models considered for integrating the solution with WebRTC, SIP and CLUE establishment of conferencing sessions.

4.    Specify any necessary extensions to SRTP.

5.   Define needed Key Management Functions that distribute the keys. The system needs to be able to bind the media to the sender of the media’s identity and/or the identity of the conference. 

Collaboration

If there is identification of missing protocols or functionalities, such work can be requested to be done in another working group with a suitable charter or by requests for chartering it in this WG or another WG. Potential items that might require work in other WGs are DTLS extensions (TLS WG) and RTP header extensions (AVTEXT WG). This work requires strong collaboration with the security area. We will notify AVTCore, CLUE, MMUSIC, RTCWEB, SIPREC, W3C WebRTC, and other related groups about this work. 

Non-Goals

The PERC working group is not chartered to extend any signaling system used to establish the RTP-based conferences. It will, however, need to consider in its architecture how the solution may integrate with these systems, and document such consideration for WebRTC, SIP, and CLUE. The specification of how a particular system integrates the security solution will happen outside of this working group, in suitable venues. 

 

The WG will not consider non-real-time usage, multicast-based media distribution, or Security descriptions-based keying (RFC4568).

 

Goals and Milestones

 

TBD  Submit architecture or framework specification to IESG (Standards Track)

 

TBD Submit documentation of how to integrate solution in SIP, WebRTC and CLUE to IESG (Informational)

TBD  Submit SRTP protocol extension specification to IESG (Standards Track)

 

TBD  Submit Key-management protocol specification to IESG (Standards Track)

 

Input to the WG

 

Proposals already existing relating to this charter proposal:

 

 <https://datatracker.ietf.org/doc/draft-jones-avtcore-private-media-reqts/> https://datatracker.ietf.org/doc/draft-jones-avtcore-private-media-reqts/
 <https://datatracker.ietf.org/doc/draft-jones-avtcore-private-media-framework/> https://datatracker.ietf.org/doc/draft-jones-avtcore-private-media-framework/
 <https://datatracker.ietf.org/doc/draft-cheng-avtcore-srtp-cloud/> https://datatracker.ietf.org/doc/draft-cheng-avtcore-srtp-cloud/