Re: [Perc] Last Call: <draft-ietf-perc-private-media-framework-08.txt> (A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing) to Proposed Standard

Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com> Thu, 14 February 2019 23:37 UTC

Return-Path: <sergio.garcia.murillo@gmail.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9F56131096; Thu, 14 Feb 2019 15:37:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id v880eJEsDOMo; Thu, 14 Feb 2019 15:37:07 -0800 (PST)
Received: from mail-wm1-x336.google.com (mail-wm1-x336.google.com [IPv6:2a00:1450:4864:20::336]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F014B128B36; Thu, 14 Feb 2019 15:37:06 -0800 (PST)
Received: by mail-wm1-x336.google.com with SMTP id t200so7847880wmt.0; Thu, 14 Feb 2019 15:37:06 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-transfer-encoding:content-language; bh=IdZZUzEiaLi1TloCKWdp5AwhQSFJDHGVlUOt4NVtKn4=; b=CpXQQiicB1StjcwpppPzLr9tOaIwpfKF4kU7jH7oARq5+s2GCwPjC5HIUc8d9y+yAR eXfP6v5dshLxSgzmubY94fjSZBDEo8aE1FYORt3ik/pfnBemu4BWOGcVPVPyg72ixBlz E8vL0Nt/JMQuOPgclBsLTr6aKP9+NajSpM3QImTDSZ3fHF0RvL8PaY1a8AgyV5ww1rTy ikrS8lmkzusr4ZRqqYPrbs90lYZR7vcaOa/YPVX9atCDy75pgdgoYgFVwPBi4NLiEy9D YzxovIg3oQr278nKgs1kLPpgtQ3hGN0+37drfqkRfwlUxP0rjcaMPW5RCn9ZB8OTQ93B PeGQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=IdZZUzEiaLi1TloCKWdp5AwhQSFJDHGVlUOt4NVtKn4=; b=miz38y1o9LPVUVT5oAw5Yc7IOhyh4Y4SBfm3RXtqFn9XPP+Q+KylB7xykMJNUusHKn /BH99bYSYRDnGFPESPxaWrleaVtyUNrf1F5tR1JpJWI0CvkSabGsazPeH3UBicLqQTCL Wr5qg1TifoN0P4f0Aem6eWkyPbcxY/AfG+bOqj8rHOpljYi446B2dr9C9XH98GN1vMW6 qtMx1EwnQDAQliDf8+Eb0enYobheotHGcrtISI3KbNfYkm+UChDy/fwOKvo9XVd6XikG dh0QcvBBME9Gs/Qzjbou0lSew5W2WsDn4vgTIPEjE8g/gOX14lqzEYL+mHbHvwTQt+ay OGEA==
X-Gm-Message-State: AHQUAubs6h/fdmcOTzYvK/EEv6mafqjuRJb7Ovu/UluL7Y5v/1SzMfs4 qgsoPZlUShuT8K250mYhc0U=
X-Google-Smtp-Source: AHgI3IZb0TKz2iAfHvt2cCe7YijhJm9ydr4+lbaEjXtk4xMqtW2PSo+LQR+3O5Jp2xWGNf2nyg70Bw==
X-Received: by 2002:a1c:e18a:: with SMTP id y132mr4764232wmg.48.1550187425211; Thu, 14 Feb 2019 15:37:05 -0800 (PST)
Received: from [192.168.0.11] (79.108.125.160.dyn.user.ono.com. [79.108.125.160]) by smtp.googlemail.com with ESMTPSA id o12sm10745012wre.0.2019.02.14.15.37.04 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 14 Feb 2019 15:37:04 -0800 (PST)
Subject: Re: [Perc] Last Call: <draft-ietf-perc-private-media-framework-08.txt> (A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing) to Proposed Standard
To: Cullen Jennings <fluffy@iii.ca>
Cc: Nils Ohlmeier <nohlmeier@mozilla.com>, Emil Ivov <emcho@jitsi.org>, IETF Crazy <ietf@ietf.org>, Emad Omara <emadomara@google.com>, perc@ietf.org, Harald Alvestrand <hta@google.com>, Alexandre GOUAILLARD <alex.gouaillard@cosmosoftware.io>, Lorenzo Miniero <lorenzo@meetecho.com>, Bernard Aboba <bernard.aboba@gmail.com>
References: <154889546931.10496.2408974719921724953.idtracker@ietfa.amsl.com> <5486C91C-48EA-4AA1-85EE-05A0B01C1E70@meetecho.com> <C6FEAEB9-CF8E-48AF-B03F-1406FF9CB303@cosmosoftware.io> <CAOW+2ducgj400pk3xPFAkRYxnYvqwhMsE9rOO0u9PgLpniaaRA@mail.gmail.com> <CAPvvaaLYFeNkZ4Pfdh4pa2btNW6EGZBnAOvXzVZ9egU8V-gBNQ@mail.gmail.com> <CAOW+2dvom822NgjF7OAa2A8YDeqZ+mbCqA=fUcq-Y49oFyGpsA@mail.gmail.com> <CAPvvaa+EzwgMXB_t7ZVTBgZH2y4=neUm1RymUNKnMV-6zyGPaQ@mail.gmail.com> <a74a8239-27dc-5704-096b-05cc5e02bd18@gmail.com> <543375ED-9A4F-452C-AE51-9499DAD5CEE0@gmail.com> <80a1f634-0888-c5e2-f6be-729d4cca3b28@cosmosoftware.io> <06d91175-b071-49fe-01cc-4a1323ad85f7@gmail.com> <91A16283-A392-4217-97E1-B04A5C8AD245@mozilla.com> <CAPvvaaJDo6vYj00NMVQEKHnrMHr1EoQydTsZ+7WtdEgyoy_GAQ@mail.gmail.com> <1F1100AC-B9D2-4650-8663-A6D380721688@mozilla.com> <8136dee9-74c9-8ac1-3cb8-f18f08b1ff3b@gmail.com> <FFB5A169-46FD-4AD2-BE12-EFA145BFE73E@iii.ca>
From: Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>
Message-ID: <82b41362-73b4-8784-f25d-cdf23f0b5d4d@gmail.com>
Date: Fri, 15 Feb 2019 00:41:50 +0100
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.5.0
MIME-Version: 1.0
In-Reply-To: <FFB5A169-46FD-4AD2-BE12-EFA145BFE73E@iii.ca>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf/nnGwfZGG3Ox0lVGmmGcSCw_3n1c>
X-Mailman-Approved-At: Sun, 17 Feb 2019 19:46:41 -0800
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Feb 2019 23:37:09 -0000

On 15/02/2019 0:10, Cullen Jennings wrote:
>
>
>> On Feb 13, 2019, at 5:03 PM, Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com> wrote:
>>
>> On 13/02/2019 23:48, Nils Ohlmeier wrote:
>>> While implementation convenience was part of the discussion it was raised a few times that the people in favor of allowing SSRC mutability never provided any written description of why mutating the SSRC is not a problem as pointed out by the design team.
>>>
>> Moreover, in the (maybe not so) near future of ssrc-less signaling (at least in webrtc), where the MID extensions are HBH, how would ssrc rewriting even be a potential risk?
>>
>> Has this group analyzed the implications and new attacks that this may cause?
>>
>> Best regards
>>
>> Sergio
>
> I know you understand this stuff too well to really believe what you just wrote so it comes across as feeling like FUD. You know that most WebRTC does not use any SSRC in the signaling at all and the WebRTC security dose not change if the ssrc are signaled or not.
>
> Has it been analyzed? YES OF COURSE IT HAS - the whole of webrtc security drafts and security section of of the related WebRTC drafts are written based on the security being ssrc-less signaling.

I was not referring to WebRTC security, which obviously has been 
addressed. I was referring to the impact on the splicing attack 
mentioned as the main reason to forbid ssrc rewriting in PERC.

Best regards

Sergio