Re: [Fecframe] Proposed changes to the framework draft - part 2 (security)

"Luby, Michael" <luby@qualcomm.com> Wed, 01 December 2010 18:55 UTC

Return-Path: <luby@qualcomm.com>
X-Original-To: fecframe@core3.amsl.com
Delivered-To: fecframe@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 32AA63A6C64 for <fecframe@core3.amsl.com>; Wed, 1 Dec 2010 10:55:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VLfMM3AsQiMJ for <fecframe@core3.amsl.com>; Wed, 1 Dec 2010 10:55:53 -0800 (PST)
Received: from wolverine02.qualcomm.com (wolverine02.qualcomm.com [199.106.114.251]) by core3.amsl.com (Postfix) with ESMTP id 5092A3A6C60 for <fecframe@ietf.org>; Wed, 1 Dec 2010 10:55:53 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=qualcomm.com; i=luby@qualcomm.com; q=dns/txt; s=qcdkim; t=1291229827; x=1322765827; h=from:to:cc:date:subject:thread-topic:thread-index: message-id:in-reply-to:accept-language:content-language: x-ms-has-attach:x-ms-tnef-correlator:user-agent: acceptlanguage:content-type:content-transfer-encoding: mime-version; z=From:=20"Luby,=20Michael"=20<luby@qualcomm.com>|To:=20Gr eg=20Shepherd=20<gjshep@gmail.com>,=20"Ali=20C.=20Begen =20(abegen)"=0D=0A=09<abegen@cisco.com>|CC:=20"fecframe@i etf.org"=20<fecframe@ietf.org>|Date:=20Wed,=201=20Dec=202 010=2010:57:03=20-0800|Subject:=20Re:=20[Fecframe]=20Prop osed=20changes=20to=20the=20framework=20draft=20-=20part =202=0D=0A=20(security)|Thread-Topic:=20[Fecframe]=20Prop osed=20changes=20to=20the=20framework=20draft=20-=20part =202=0D=0A=20(security)|Thread-Index:=20AcuRgEDAPGhr7mjtS YScar5uilqbUwACUm7a|Message-ID:=20<C91BDA7F.707B%luby@qua lcomm.com>|In-Reply-To:=20<AANLkTinmksy8cb_GjueK9=3DZ3YMb 9MSkX5xvqCvy1LNRh@mail.gmail.com>|Accept-Language:=20en-U S|Content-Language:=20en-US|X-MS-Has-Attach: |X-MS-TNEF-Correlator:|user-agent:=20Microsoft-Entourage/ 13.7.0.100913|acceptlanguage:=20en-US|Content-Type:=20tex t/plain=3B=20charset=3D"us-ascii" |Content-Transfer-Encoding:=20quoted-printable |MIME-Version:=201.0; bh=5r6KRbtzKSo9hPqkH990spo0Vg1RUb57OeUONP9lR00=; b=I+fLANgZg7k+p/QLH3cfC4jLz/rf86CnwtdgCcvaYOKAh/Vkc4fln1Z5 dQusP5WM6PdgIkzGLgq4QCMQ4+uw0pOqCistnP9UW+g2vc/wQRYWa+ogH GJ23XWhBWDljh0gTMRf+PTZ3bWODmKGUf4TGXZj2WMtgZqpJ1Q2J4wIiy 4=;
X-IronPort-AV: E=McAfee;i="5400,1158,6184"; a="64864747"
Received: from ironmsg04-r.qualcomm.com ([172.30.46.18]) by wolverine02.qualcomm.com with ESMTP; 01 Dec 2010 10:57:07 -0800
X-IronPort-AV: E=Sophos;i="4.59,283,1288594800"; d="scan'208";a="14322490"
Received: from nasanexhub04.qualcomm.com (HELO nasanexhub04.na.qualcomm.com) ([129.46.134.222]) by Ironmsg04-R.qualcomm.com with ESMTP/TLS/RC4-MD5; 01 Dec 2010 10:57:07 -0800
Received: from nasclexhc01.na.qualcomm.com (10.227.147.14) by nasanexhub04.na.qualcomm.com (129.46.134.222) with Microsoft SMTP Server (TLS) id 8.3.83.0; Wed, 1 Dec 2010 10:57:06 -0800
Received: from NASCLEXMB02.na.qualcomm.com ([10.227.144.113]) by nasclexhc01.na.qualcomm.com ([10.227.147.14]) with mapi; Wed, 1 Dec 2010 10:57:06 -0800
From: "Luby, Michael" <luby@qualcomm.com>
To: Greg Shepherd <gjshep@gmail.com>, "Ali C. Begen (abegen)" <abegen@cisco.com>
Date: Wed, 01 Dec 2010 10:57:03 -0800
Thread-Topic: [Fecframe] Proposed changes to the framework draft - part 2 (security)
Thread-Index: AcuRgEDAPGhr7mjtSYScar5uilqbUwACUm7a
Message-ID: <C91BDA7F.707B%luby@qualcomm.com>
In-Reply-To: <AANLkTinmksy8cb_GjueK9=Z3YMb9MSkX5xvqCvy1LNRh@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-Entourage/13.7.0.100913
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "fecframe@ietf.org" <fecframe@ietf.org>
Subject: Re: [Fecframe] Proposed changes to the framework draft - part 2 (security)
X-BeenThere: fecframe@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Discussion of FEC Framework <fecframe.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/fecframe>, <mailto:fecframe-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/fecframe>
List-Post: <mailto:fecframe@ietf.org>
List-Help: <mailto:fecframe-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fecframe>, <mailto:fecframe-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Dec 2010 18:55:55 -0000

I skimmed the new security section and it looks ok to me.  I noticed that
there are some recommendations to use some of the security measures based on
some of the work in the RMT wg, and on TESLA, etc. One thing that is quite
different in streaming than in object delivery (focus of RMT) is that the
startup delay at the client (and the end-to-end-delay) is a crucial concern
for streaming, whereas it is not so much for object delivery.  I haven't
checked and presumably there aren't issues, but perhaps it should be
discussed in the security section (and checked against some of the proposed
solution) that, if possible, any security added should impact the potential
startup delay (and the end-to-end delay) of the client as little as
possible?  Startup delay is the time from when a user decides to watch a
stream till it shows up on the screen.


On 12/1/10 9:50 AM, "Greg Shepherd" <gjshep@gmail.com> wrote:

> Thanks Vincent and Ali!
> 
> So far we've had no feedback on the list for these changes. Please
> read and respond ASAP - even if you approve please send your approval
> to the list. We are so close to finishing up this WG.. let's not
> stumble now.
> 
> Thanks,
> Greg
> 
> On Wed, Dec 1, 2010 at 9:29 AM, Ali C. Begen (abegen) <abegen@cisco.com>
> wrote:
>> This is the 2nd part for the changes we need to make in the framework draft.
>> This part is related to the security issues. Please refer to the tracker to
>> see the comments from the IESG.
>> 
>> https://datatracker.ietf.org/doc/draft-ietf-fecframe-framework/ballot/
>> 
>> I would like to thank Vincent for providing this brand new security section.
>> I just added a few minor points into the text.
>> 
>> If there are any objections, please speak up. If you are OK with these
>> changes, please also speak up so that we can show WG consensus.
>> 
>> Thanks,
>> -acbegen
>> 
>> 
>> 
>> 
>> 9.  Security Considerations
>> 
>>   First of all, it must be clear that the application of FEC protection
>>   to a stream does not provide any kind of security.  On the opposite,
>>   the FEC Framework itself could be subject to attacks, or could pose
>>   new security risks.  The goals of this section are to state the
>>   problem, discuss the risks and identify solutions when feasible.  It
>>   also defines a mandatory to implement (but not mandatory to use)
>>   security scheme.
>> 
>> 9.1.  Problem Statement
>> 
>>   A content delivery system is potentially subject to many attacks.
>>   Some of them target the network (e.g., to compromise the routing
>>   infrastructure by compromising the congestion control component),
>>   others can target the Content Delivery Protocol (CDP) (e.g., to
>>   compromise its normal behavior), and finally some attacks target the
>>   content itself.
>> 
>>   More specifically, these attacks can have several goals:
>> 
>>   o  They can try to give access to a confidential content (e.g., in
>>      case of a non-free content).
>> 
>>   o  They can try to corrupt the source and/or repair flows (e.g., to
>>      prevent a receiver from using them).
>> 
>>   o  They can try to compromise the receiver's behavior (e.g., by
>>      making the decoding of an object computationally expensive).
>> 
>>   o  They can try to compromise the network's behavior (e.g., by
>>      causing congestion within the network).
>> 
>>   These attacks can be launched either against the source and/or repair
>>   flows (e.g., by sending forged FEC source and/or repair packets) or
>>   against the FEC parameters that are sent either in-band (e.g., in the
>>   Repair FEC Payload ID, or in the Explicit Source FEC Payload ID) or
>>   out-of-band (e.g., in a session description).
>> 
>> 9.2.  Attacks Against the Data Flows
>> 
>> 9.2.1.  Access to Confidential Content
>> 
>>   Access control to the source flow being transmitted is typically
>>   provided by means of encryption.  This encryption can be done by the
>>   content provider itself, or within the application (for instance by
>>   using the Secure Real-time Transport Protocol (SRTP) [RFC3711]), or
>>   at the network layer, on a per-packet basis when IPsec/ESP is used
>>   [RFC4303].  If confidentiality is a concern, it is RECOMMENDED that
>>   one of these solutions is used.  Even if we mention these attacks
>>   here, they are neither related to nor facilitated by the use of FEC.
>> 
>>   Note that when encryption is applied, this encryption MUST either be
>>   applied before the FEC protection, or, if done after the FEC
>>   protection, then this encryption MUST be applied on both the FEC
>>   source packets and repair packets.  Otherwise, if encryption were to
>>   be performed only on the FEC source packets after FEC encoding, then
>>   a non-authorized receiver could be able to recover the source data
>>   after decoding the repair packets provided that a sufficient number
>>   of such packets were available.
>> 
>> 9.2.2.  Content Corruption
>> 
>>   Protection against corruptions (e.g., after sending forged FEC
>>   source/repair packets) is achieved by means of a content integrity
>>   verification/source authentication scheme.  This service is usually
>>   provided at the packet level.  In this case, after removing all the
>>   forged packets, the source flow might sometimes be recovered.
>>   Several techniques can provide this content integrity/source
>>   authentication service:
>> 
>>   o  At the application layer, SRTP [RFC3711] provides several
>>      solutions to check the integrity and authenticate the source of
>>      RTP and RTCP messages, among other services.  For instance,
>>      associated to the Timed Efficient Stream Loss-Tolerant
>>      Authentication (TESLA) [RFC4383], SRTP is an attractive solution
>>      that is robust to losses, provides a true authentication/integrity
>>      service, and does not create any prohibitive processing load or
>>      transmission overhead.  Yet, checking a packet requires a small
>>      delay (a second or more) after its reception with TESLA.  Other
>>      building blocks can be used within SRTP to provide content
>>      integrity/authentication services.
>> 
>>   o  At the network layer, IPsec/ESP [RFC4303] offers (among other
>>      services) an integrity verification mechanism that can be used to
>>      provide authentication/content integrity services.
>> 
>>   It is up to the developer and the person in charge of deployment, who
>>   knows the security requirements and features of the target
>>   application area, to define which solution is the most appropriate.
>>   Nonetheless it is RECOMMENDED that at least one of these techniques
>>   is used.
>> 
>>   Note that when integrity protection is applied, it is RECOMMENDED
>>   that it takes place on both FEC source and repair packets.  The
>>   motivation is to avoid corrupted packets to be considered during
>>   decoding, which would often lead to a decoding failure or result in a
>>   corrupted decoded source flow.
>> 
>> 9.3.  Attacks Against the FEC Parameters
>> 
>>   Attacks on these FEC parameters can prevent the decoding of the
>>   associated object.  For instance, modifying the finite field size of
>>   a Reed-Solomon FEC scheme (when applicable) will lead a receiver to
>>   consider a different FEC code.
>> 
>>   It is therefore RECOMMENDED that security measures are taken to
>>   guarantee the FEC Framework Configuration Information integrity.
>>   When the FEC Framework Configuration Information is sent out-of-band,
>>   e.g., in a session description, it SHOULD be protected, for instance
>>   by digitally signing it.
>> 
>>   Attacks are also possible against some FEC parameters included in the
>>   Explicit Source FEC Payload ID and Repair FEC Payload ID.  For
>>   instance, modifying the Source Block Number of an FEC source or
>>   repair packet will lead a receiver to assign this packet to a wrong
>>   block.
>> 
>>   It is therefore RECOMMENDED that security measures are taken to
>>   guarantee the Explicit Source FEC Payload ID and Repair FEC Payload
>>   ID integrity.  To that purpose, one of the packet-level source
>>   authentication/content integrity techniques of Section 9.2.2 can be
>>   used.
>> 
>> 9.4.  When Several Source Flows are to be Protected Together
>> 
>>   When several source flows, with different security requirements, need
>>   to be FEC protected jointly, within a single FEC Framework instance,
>>   then each flow MAY be processed appropriately, before the protection.
>>   For instance, source Flows that require access control MAY be
>>   encrypted before they are FEC protected.
>> 
>>   There are also situations where the only insecure domain is the one
>>   over which the FEC Framework operates.  In that case, this situation
>>   MAY be addressed at the network layer, using IPsec/ESP (see
>>   Section 9.5), even if only a subset of the source flows have strict
>>   security requirements.
>> 
>>   Since the use of FEC Framework should not add any additional threat,
>>   it is RECOMMENDED that the FEC Framework aggregate flow be in line
>>   with the maximum security requirements of the individual source
>>   flows.  For instance, if denial-of-service (DoS) protection is
>>   required, an integrity protection SHOULD be provided below the FEC
>>   Framework, using IPsec/ESP.
>> 
>>   Generally speaking, whenever feasible, it is RECOMMENDED to avoid FEC
>>   protecting flows with totally different security requirements.
>>   Otherwise, an important processing would be added to protect the
>>   source flows that do not need it.
>> 
>> 9.5.  Baseline Secure FEC Framework Operation
>> 
>>   This section describes a baseline mode of secure FEC Framework
>>   operation based on the application of the IPsec security protocol.
>>   This approach is documented here to provide a reference of an
>>   interoperable secure mode of operation.  However, other approaches,
>>   including other forms of IPsec application, MAY be used or specified
>>   in the future.
>> 
>>   Two related documents are of interest.  First, Section 5.1 of
>>   [RFC5775] defines a baseline secure ALC operation for sender-to-group
>>   transmissions, assuming the presence of a single sender and a source-
>>   specific multicast (SSM) or SSM-like operation.  The proposed
>>   solution, based on IPsec/ESP, can be used to provide a baseline FEC
>>   Framework secure operation, for the downstream source flow.
>> 
>>   Second, Section 7.1 of [RFC5740] defines a baseline secure NORM
>>   operation, for sender-to-group transmissions as well as unicast
>>   feedbacks from receivers.  Here, it is also assumed there is a single
>>   sender.  The proposed solution is also based on IPsec/ESP.  However,
>>   the difference with respect to the first document relies on the
>>   management of IPsec Security Associations (SA) and corresponding
>>   Security Policy Database (SPD) entries, since NORM requires a second
>>   set of SA and SPD to be defined to protect unicast feedbacks from
>>   receivers.
>> 
>>   The FEC Framework has been defined in such a way to be independent
>>   from the application that generates source flows.  Some applications
>>   might use purely unidirectional flows, while other applications might
>>   also use unicast feedbacks from the receivers.  For instance, this is
>>   the case when considering RTP/RTCP based source flows.  Depending on
>>   the specific situation, it is RECOMMENDED that the baseline secure
>>   FEC Framework operation inherits from [RFC5775] in case of purely
>>   unidirectional sender-to-group flows, or [RFC5740] in case both
>>   sender-to-group and unicast feedbacks flows are needed.
>> 
>>   Note that the IPsec/ESP requirements profiles outlined in [RFC5775]
>>   and [RFC5740] are commonly available on many potential hosts.  They
>>   can form the basis of a secure mode of operation.  One potential
>>   limitation, however, is the need for privileged user authorization.
>>   However, automated key management implementations are typically
>>   configured with the privileges necessary to affect system IPsec
>>   configuration.
>> 
>> 
>> _______________________________________________
>> Fecframe mailing list
>> Fecframe@ietf.org
>> https://www.ietf.org/mailman/listinfo/fecframe
>> 
> _______________________________________________
> Fecframe mailing list
> Fecframe@ietf.org
> https://www.ietf.org/mailman/listinfo/fecframe