Re: [MMUSIC] Roman Danyliw's Discuss on draft-ietf-mmusic-ice-sip-sdp-37: (with DISCUSS and COMMENT)

Christer Holmberg <christer.holmberg@ericsson.com> Thu, 08 August 2019 15:50 UTC

Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 543FA120169; Thu, 8 Aug 2019 08:50:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.002
X-Spam-Level:
X-Spam-Status: No, score=-2.002 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Q8mhcC46Se1a; Thu, 8 Aug 2019 08:50:50 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10071.outbound.protection.outlook.com [40.107.1.71]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E0CC7120227; Thu, 8 Aug 2019 08:50:43 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ho21eMBT9rBh9RoWltuXQgtz+TxsvkEXTZcQ6pN1T6gN2Irkvj5BAma7wUUCZIFWsWW9bFxGQ2J8nN7NSTqhdbif+UrG8leTK3TRnElgU8H00XtQnfKtO/L/tmz3KHxGkfbkEwBvvH+3Snb6L8cSj/hBYeRnwHiToTRa6IiFveNX7vRcy+M+heWAQy21Y+W2uxZq1SIkYotigUlMvTRCwwvnm7L1jlUqVlE5ZVmSGb0PVOw6dC1JsKUkkm37jKCbNjk4Hh0hz1GNYX4mt937CiIXIXSyipUa4U66GPg1/0XJ1ASuX3DzYcXEMQdH83BrdEzT6qHM2aefbN/+S90FhQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kyP0Qt32+gUHNR6DSJlI/sVc362sbztnO3ADSaxGmm4=; b=AjxEx455GFqjfB+nmb4kIqKLrf94yqXSAOz4ZTkFoEw/oYpYchA0wuDWEtVulUmDvOm7wJndXXNOziVUOGeLP5bZpqkLA4XLvPkP26HcoVrg9ty3Fx4j6JEAtl3lv+zaco8ZsHLtOWQPMJQ0a81bqk5Bs7ghPXNtpSI7+0slttP0oJ4/rnSGyqE7YVyZS+KVsHQHTl8WXC/96vgPR3chlmDqrxm7Gy4+08w7VhvVYLRn844OBgP9uyiUHAm7tZVZCLPylS1p9GE9L6rhQnlOhNhVeNLwnt1G2YF4IHs9cpAAywZUGdktd+0mvKfNBgamAxuyijocKUH7xTRo6xSKRw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kyP0Qt32+gUHNR6DSJlI/sVc362sbztnO3ADSaxGmm4=; b=hv1AbvLzAo4Nh49KKNzjNFq6wRBfGkLb0ofOG0s7+CTc7CFK4J7oqxo+7EI/0zr8LzahOLjws3khV64qCdfkaKKnJj+7QvV1Toay2ZZ7/CXikHohG2h0b27h3/ujjEl6YxsZDXmqMjLAkFp2K4Rt2tQ0nPrGH9A2Rpx0YsWugA0=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3210.eurprd07.prod.outlook.com (10.170.246.13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2157.11; Thu, 8 Aug 2019 15:50:41 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::ec0d:f9d3:7159:ba7]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::ec0d:f9d3:7159:ba7%6]) with mapi id 15.20.2157.015; Thu, 8 Aug 2019 15:50:41 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Adam Roach <adam@nostrum.com>, Roman Danyliw <rdd@cert.org>, The IESG <iesg@ietf.org>
CC: "fandreas@cisco.com" <fandreas@cisco.com>, "mmusic-chairs@ietf.org" <mmusic-chairs@ietf.org>, "mmusic@ietf.org" <mmusic@ietf.org>, "draft-ietf-mmusic-ice-sip-sdp@ietf.org" <draft-ietf-mmusic-ice-sip-sdp@ietf.org>
Thread-Topic: Roman Danyliw's Discuss on draft-ietf-mmusic-ice-sip-sdp-37: (with DISCUSS and COMMENT)
Thread-Index: AQHVS/6ufVUUgufL4kCmQpKJywP7DqbwFEiAgAGIEwA=
Date: Thu, 08 Aug 2019 15:50:41 +0000
Message-ID: <83DA6259-42DE-4A2F-94AB-DE2735FAE743@ericsson.com>
References: <156505852285.2142.10774832459273251927.idtracker@ietfa.amsl.com> <d9877c1a-e36e-7e53-ce72-433f23090687@nostrum.com>
In-Reply-To: <d9877c1a-e36e-7e53-ce72-433f23090687@nostrum.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1b.0.190715
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com;
x-originating-ip: [192.176.1.83]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: d422fc28-5806-42d9-a5b1-08d71c182a7e
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:HE1PR07MB3210;
x-ms-traffictypediagnostic: HE1PR07MB3210:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <HE1PR07MB32100BF6B93F61633BC709CF93D70@HE1PR07MB3210.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 012349AD1C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(366004)(346002)(396003)(136003)(39860400002)(199004)(189003)(14444005)(256004)(58126008)(110136005)(81156014)(81166006)(6436002)(71200400001)(71190400001)(8676002)(66066001)(6506007)(76176011)(2906002)(3846002)(6116002)(25786009)(14454004)(6246003)(36756003)(966005)(316002)(86362001)(26005)(7736002)(186003)(305945005)(53936002)(102836004)(76116006)(446003)(64756008)(66446008)(229853002)(476003)(6512007)(478600001)(8936002)(33656002)(5660300002)(6486002)(99286004)(54906003)(11346002)(6306002)(66476007)(66946007)(4326008)(91956017)(44832011)(2616005)(66556008)(486006); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3210; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: /pPqOlFFJC5Fl3gpwePMOYpQ2iQjyMWK9rRSrqmVCIUtHkMD0mAwQSNXOm5y3JCJXYINisKrxTQRvtmiIbeTFifOR7LiKBPgLd6yUmG2eOsx35gAvGxCOj08xs/zvEZlRD4uEeoG6H/Lr9U2H7rAQwl159HwikXcb3b0mocL/vHpAKXFUYjZc1sbU6GYQ5o7kYBOe5jfChIqssgewYPmFmnZ82OkZMVX5/jDXQVBm6c5ax/ZCjF0axJ2VOXFaM6W3xxXRC+waLNCv3RUp4+Ch5HwPEQXNGT7/mm5xUJH3iI1Gl6m6ktaHuAvLWV/ASFeNu+gSzRAAmBa4y/m/88YR5XfGIjSXdK6SLJTeDURDoR00/m8NeMWnv/Lnj07Z2SIqqUEXyGfn0ZdB0cc0ybvvqj7oe4tv4aIHnVUrj4oos0=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <511EFCF1165C0946B32FFC2E4906FC7B@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: d422fc28-5806-42d9-a5b1-08d71c182a7e
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Aug 2019 15:50:41.2533 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: G7WtfPFC2MoFobD24OMz7gDq+XlHF2N/EVAXfmcYmi3Y9GPO5paHXpoQV5RN6u3Z4toUzym8jnS/86R0PUJgqsbfMNeFck8rN6ZqcPR10Bk=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3210
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/9bY-mHxznx01RLOv9x-UekFfYu4>
Subject: Re: [MMUSIC] Roman Danyliw's Discuss on draft-ietf-mmusic-ice-sip-sdp-37: (with DISCUSS and COMMENT)
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Aug 2019 15:50:54 -0000

Hi Adam,

Thanks for Your input! A few comments from me inline.
    
    >> (1) Section 8.1. Per “These require techniques for message integrity and
    >> encryption for offers and answers, which are satisfied by the TLS mechanism
    >> [RFC3261] when SIP is used”, the guidance is right (use TLS), but this
    >> reference is outdated.  Section 26.2.1 of RFC3261 provides rather old guidance
    >> on the ciphersuite.  Is there a reason why not to use BCP195 for guidance on
    >> versions/ciphersuites?
    >
    > As much as SIP has a convoluted layering story, the separation between 
    > SIP and SDP remains pretty clean (both from a protocol perspective and 
    > organizationally within the IETF). While it's likely the case that RFC 
    > 3261 could use some updating to its security story [1], I don't think it 
    > makes sense to hold up this document on that work. It's really rather 
    > far outside the purview of this document to make changes to the 
    > underlying cipher suite; in fact, I would argue that doing so would be 
    > disallowed in MMUSIC, since it is part of the core protocol work that 
    > clearly falls in SIPCORE's charter.

    I agree. If we need to update the security properties of SIP, let's do it properly in SIPCORE.
    
    ---    

    >> (2) Section 8.2.1, The “voice hammer attack” appears to be an artifact of SDP.
    >> The text explicitly notes that this attack is not “specific to ICE but that ICE
    >> can help provide a remediation” (aside, should “remediation” be “mitigation”).
    >> However, the preceding introductory section (8.2) explicitly says “there are
    >> several attacks possible with ICE”.  These two statements aren’t consistent.
    >
    > It seems that the solution for this would be to promote section 8.2.1 to 
    > its own top-level section inside the security considerations section. 
    > Would that work for you?
    
   I would be ok with that.

   However, I think it would be good to add text to 8.2.1 saying that a "Voice hammer attack" attack can take place even when the 
   attacker is an authenticated user, and then go on describing how ICE can be used to prevent the attack. 


   ---
    
    >> (3) Section 8.2.2.  This section reads like an operational consideration.  The
    >> setup scoped in the parent Section 8.2, “there are several attacks possible
    >> with ICE when the attacker is an authenticated and valid participant in the ICE
    >> exchange”, isn’t discussed here (i.e., how is the presence or absence of an ALG
    >> germane to an attacker who is a participant in the ICE exchange)
    >
    > It seems that the solution for this would be to promote 8.2.2 to its own 
    > top-level section within the document, preceding the Security 
    > Considerations section, possibly with a renaming along the lines of 
    > "Operational Considerations: Interactions with Application Layer 
    > Gateways and SIP". Does that work for you?
    
    I am fine making it its own top-level section. But, do you think it should be a normative section, or an Appendix?

    > I note that making both of these changes leaves section 8.2 empty save 
    > for the introductory text; I propose that we simply remove the section.
    
    I am fine with that.
    
    ---

    >> (4) Section 8.  Is there a reason why the security considerations from RFC8445
    >> are not noted as also applying (e.g., Section 19.1 - .4.
    >
    > Would the addition of text at the top of section 8 that says "Please 
    > note that the security considerations from sections 19.1 through 19.4 of 
    > [RFC8445] also apply to this document." address your concern?
    
    Others have commented on this, and there is a pull request addressing it:

    https://github.com/suhasHere/ice-sip-sdp/pull/18/files

    Please see the last change in the pull request.

    Regards,

    Christer