Re: [Perc] Last Call: <draft-ietf-perc-private-media-framework-08.txt> (A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing) to Proposed Standard

Bernard Aboba <bernard.aboba@gmail.com> Thu, 14 February 2019 01:01 UTC

Return-Path: <bernard.aboba@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1F721310C9; Wed, 13 Feb 2019 17:01:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H6AZOEJhdKPC; Wed, 13 Feb 2019 17:01:10 -0800 (PST)
Received: from mail-pl1-x629.google.com (mail-pl1-x629.google.com [IPv6:2607:f8b0:4864:20::629]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F69F1310C3; Wed, 13 Feb 2019 17:01:10 -0800 (PST)
Received: by mail-pl1-x629.google.com with SMTP id bj4so2128910plb.7; Wed, 13 Feb 2019 17:01:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=09Bv5s2n0qqOVWdv64eG97x84L/tL4+rbHanJci2xlQ=; b=EqDGfy6Tkwepdv6sqIiLlzME3CWtZB4lXT8d0JpmOMWmQ6x5qg5GQ1Rnu0yVrTM+eu JIqlnGipqcHZhh5Y/3e6GLeANSAvTAhExpkdYfW92ki+3VD0ioKJzweG+3RNZmepTjnZ 95tsEp6P0dbgN4YmEAgYULSi/SF7O0F4me3dOGyJmgXXmyPID9/pCM4+wXNNRN0/+m+I D7fgQGarqCVUagy187gAgHKLxL9OIjyw0Kn3ZpgVc4aQStf9Rl/PBydaGmbwn96/ImBZ Dl1PbN32Ts6E1Tqw7rYKvkwD+Zwh2gJS/q2xGgoQ4p2+XTWu1YnCwhZOc8kXAKSLJpBJ frRA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=09Bv5s2n0qqOVWdv64eG97x84L/tL4+rbHanJci2xlQ=; b=MD4PX1eVGvciSXU5zF7zYNmoCDDb2Fozfay6YPy5IklvB3ucCDTI3HJwLZyjH3vmWg 2Gr14+QY7jDhdEStJZBt5FCu0QJDtCZLqk1Mgh3vDLIYcqyp6paLNBaIVeU+080S2cHl UhvI5WnEqbgMOgDujp6pKoPV6b2+xM1k8wrupohod1UVf14GJqWl8CmzSE+k+2Xb1FiX p240GM4hjjjsEp+kT7TcBxgUh2Bz8Wv/WIG0FF1CZJUoekkRSFzr2Deyoi7690VV0G1h grvuAB5RtnMhF9H2mT3BBxKnoUtr+7nhXiJItAR4VW41zrlIJJU+12YFaSls8R60uZPb P+kQ==
X-Gm-Message-State: AHQUAuZ5ivkXC1J5aH9bMT4/9+JMvpxnarruu84RWEPdk0gCVYW9QAO9 0FcQoc92X1c0XvUgtx4dUAk=
X-Google-Smtp-Source: AHgI3IYu/pmqPWoPBPWPOxFt0Irbwo1LqrlWFP/KsIgFYQ9EOfsOV7Zc3oWT+QAp7bzgZBWALssCVA==
X-Received: by 2002:a17:902:28c1:: with SMTP id f59mr1181277plb.37.1550106068391; Wed, 13 Feb 2019 17:01:08 -0800 (PST)
Received: from ?IPv6:2600:380:803a:a3ec:b49c:4ae:1adf:ceac? ([2600:380:803a:a3ec:b49c:4ae:1adf:ceac]) by smtp.gmail.com with ESMTPSA id 24sm721902pfr.75.2019.02.13.17.01.06 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 13 Feb 2019 17:01:07 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail-C0EDDB55-0EB5-402F-A05E-C04FC9A0BEB3"
Mime-Version: 1.0 (1.0)
Subject: Re: [Perc] Last Call: <draft-ietf-perc-private-media-framework-08.txt> (A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing) to Proposed Standard
From: Bernard Aboba <bernard.aboba@gmail.com>
X-Mailer: iPhone Mail (16D57)
In-Reply-To: <2807c153-60ba-a741-f0ad-72c98d8d77bb@gmail.com>
Date: Wed, 13 Feb 2019 17:01:05 -0800
Cc: Nils Ohlmeier <nohlmeier@mozilla.com>, Emil Ivov <emcho@jitsi.org>, IETF discussion list <ietf@ietf.org>, Emad Omara <emadomara@google.com>, perc@ietf.org, "hta@google.com" <hta@google.com>, Alexandre GOUAILLARD <alex.gouaillard@cosmosoftware.io>, Lorenzo Miniero <lorenzo@meetecho.com>
Content-Transfer-Encoding: 7bit
Message-Id: <753988DB-FC9A-4E8F-B495-347AD943B6C8@gmail.com>
References: <154889546931.10496.2408974719921724953.idtracker@ietfa.amsl.com> <CAOW+2dtxnSYOPPWxodN633O=dPOQaUnu7eYvgUYkPYRt6iWbaw@mail.gmail.com> <CAPvvaaK_VUXvy2=1TBGfBWWYxiBdXBzuR=Y-rnAdJyg=M8OfQQ@mail.gmail.com> <5486C91C-48EA-4AA1-85EE-05A0B01C1E70@meetecho.com> <C6FEAEB9-CF8E-48AF-B03F-1406FF9CB303@cosmosoftware.io> <CAOW+2ducgj400pk3xPFAkRYxnYvqwhMsE9rOO0u9PgLpniaaRA@mail.gmail.com> <CAPvvaaLYFeNkZ4Pfdh4pa2btNW6EGZBnAOvXzVZ9egU8V-gBNQ@mail.gmail.com> <CAOW+2dvom822NgjF7OAa2A8YDeqZ+mbCqA=fUcq-Y49oFyGpsA@mail.gmail.com> <CAPvvaa+EzwgMXB_t7ZVTBgZH2y4=neUm1RymUNKnMV-6zyGPaQ@mail.gmail.com> <a74a8239-27dc-5704-096b-05cc5e02bd18@gmail.com> <543375ED-9A4F-452C-AE51-9499DAD5CEE0@gmail.com> <80a1f634-0888-c5e2-f6be-729d4cca3b28@cosmosoftware.io> <06d91175-b071-49fe-01cc-4a1323ad85f7@gmail.com> <91A16283-A392-4217-97E1-B04A5C8AD245@mozilla.com> <CAPvvaaJDo6vYj00NMVQEKHnrMHr1EoQydTsZ+7WtdEgyoy_GAQ@mail.gmail.com> <1F1100AC-B9D2-4650-8663-A6D380721688@mozilla.com> <2807c153-60ba-a741-f0ad-72c98d8d77bb@gmail.com>
To: Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/ghVk7pZ2ay1pchyAKHCfhgkOstQ>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2019 01:01:14 -0000

On Feb 13, 2019, at 3:47 PM, Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com> wrote:
> All SFUs I am aware of performs SSRC rewriting, it is much more than implementation convenience.
> 
[BA] In particular, reusing an SSRC for the “dominant speaker” (which can change)  is a common practice with switching of audio and video going together. 
> Also note that we have solved this in one of our deployments using PERC lite allowing ssrc rewriting and app key management, using a different ssrc for the OHB payload used for inner encryption and the outer/HBH rtp packet. The inner/OHB ssrc(=participant Id) is then assigned by the key management server together with the encryption key for each participant so it can be used for mapping ssrcs to participants and allows verifying the origin of a packet end to end.
> 
[BA] This solves the key identification issue, and can also be used to notify participants that the origin has changed if that is a concern.  This potential solution was pointed out during the discussion as I recall.

Far more serious than splicing attacks is access to cleartext media which thanks to ML can be used to create realistic “fake news”.  PERC does not address that threat, but schemes with stricter trust models might.