Re: [MMUSIC] Review of draft-ietf-mmusic-sdp-bundle-negotiation-32 - Magnus' comments - MID security

Magnus Westerlund <magnus.westerlund@ericsson.com> Mon, 10 October 2016 08:37 UTC

Return-Path: <magnus.westerlund@ericsson.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA6CF1294B4 for <mmusic@ietfa.amsl.com>; Mon, 10 Oct 2016 01:37:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id P0PpaYxr9CI8 for <mmusic@ietfa.amsl.com>; Mon, 10 Oct 2016 01:37:20 -0700 (PDT)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 38BA2129455 for <mmusic@ietf.org>; Mon, 10 Oct 2016 01:37:20 -0700 (PDT)
X-AuditID: c1b4fb3a-aa3ff7000000099a-00-57fb533ecb04
Received: from ESESSHC021.ericsson.se (Unknown_Domain [153.88.183.81]) by (Symantec Mail Security) with SMTP id C9.77.02458.E335BF75; Mon, 10 Oct 2016 10:37:18 +0200 (CEST)
Received: from [127.0.0.1] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.83) with Microsoft SMTP Server id 14.3.319.2; Mon, 10 Oct 2016 10:37:17 +0200
To: Jonathan Lennox <jonathan@vidyo.com>
References: <D41C238A.1095B%christer.holmberg@ericsson.com> <71419d1f-af1d-46e9-401d-81c5df73fc49@ericsson.com> <58510E68-A045-4312-B3B3-3468E83C8EB7@iii.ca> <243c777f-46f9-4053-1588-7e6b58a06c8c@ericsson.com> <FEB4A43F-B38F-43C3-A3D7-345C97AC73DC@vidyo.com>
From: Magnus Westerlund <magnus.westerlund@ericsson.com>
Message-ID: <6dce0cc5-ff98-4099-c81b-35d5550a34bc@ericsson.com>
Date: Mon, 10 Oct 2016 10:37:16 +0200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0
MIME-Version: 1.0
In-Reply-To: <FEB4A43F-B38F-43C3-A3D7-345C97AC73DC@vidyo.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFjrOLMWRmVeSWpSXmKPExsUyM2J7oK5d8O9wg+aXyhYf1v9gtNi/+Dyz xdTlj1ksVmw4wOrA4vH3/QcmjyVLfjJ5XD7/kdGj7dkd9gCWKC6blNSczLLUIn27BK6MjuXV BevdKro3+jcw3rbsYuTkkBAwkWhcc5ypi5GLQ0hgPaPE1DO7WSCc5YwS+7acYuti5OAQFsiX mD6lDqRBREBD4uKzD2wQNV1MEg1X1zGDOMwCMxklVl/rYQSpYhOwkLj5oxGsmVfAXuLfXU2Q MIuAqsSSAzvBSkQFYiSuP3vEBmLzCghKnJz5hAXE5hSwlbi7ZztYnBlozMz55xkhbHmJ5q2z mUFsIQFtiYamDtYJjAKzkLTPQtIyC0nLAkbmVYyixanFxbnpRkZ6qUWZycXF+Xl6eaklmxiB wXtwy2+rHYwHnzseYhTgYFTi4V3Q+itciDWxrLgy9xCjBAezkggvb8DvcCHelMTKqtSi/Pii 0pzU4kOM0hwsSuK8ZivvhwsJpCeWpGanphakFsFkmTg4pRoY59nf1P0llPjzJUdNYOmlFVmi ffx6XxhurdiTGZD2tneWYerqjc9KkhrPFOR8dDg0+2fSnOg5sq+vT14XPPFMneLE3nBrt1Ib LsOGoF9Xiyuvpy89zWCYYnaqx7VpmxH/t+Dpl3Tqr+hzNehYOL3cvohr3eN/M49KMNydlW9x r0JUcsGf/gAbJZbijERDLeai4kQA72nEwVoCAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/D5pobbDMp87aVO6BVwnoq1QYXDk>
Cc: Paul Kyzivat <pkyzivat@alum.mit.edu>, mmusic <mmusic@ietf.org>, Cullen Jennings <fluffy@iii.ca>, Christer Holmberg <christer.holmberg@ericsson.com>
Subject: Re: [MMUSIC] Review of draft-ietf-mmusic-sdp-bundle-negotiation-32 - Magnus' comments - MID security
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Oct 2016 08:37:23 -0000

Den 2016-10-07 kl. 15:32, skrev Jonathan Lennox:
>
>> On Oct 7, 2016, at 4:41 AM, Magnus Westerlund
>> <magnus.westerlund@ericsson.com
>> <mailto:magnus.westerlund@ericsson.com>> wrote:
>>
>> Den 2016-10-06 kl. 23:59, skrev Cullen Jennings:
>>>
>>> I'm not getting the problem here and mandating 6904 is not an easy
>>> thing to do.
>>
>> So, lets be clear on what I have proposed. For bundle in general it is
>> RECOMMENDED to encrypt MIDs in RTP header extensions. I have also
>> proposed that for RTCWeb implementation and use should be mandated. I
>> was not clear in what applies when an WebRTC endpoint talks to a
>> legacy endpoint what is expected here. I guess this is the thorny issue.
>
> RFC 7904 (SDES header extensions) says:
>
>    In RTP sessions where any type of confidentiality protection is
>    enabled for RTCP, the SDES item header extensions MUST also be
>    protected.  This implies that to provide confidentiality, users of
>    the Secure Real-time Transport Protocol (SRTP) need to implement and
>    use encrypted header extensions per [RFC6904 <https://tools.ietf.org/html/rfc6904>].
>
>
> This was after a fair bit of back-and-forth with the security ADs.  MID
> is a 7904 header extension, so I don’t think BUNDLE can override this MUST.
>

Okay, forgot about that requirement. However, I don't think that really 
contradicts what was written. The proposed text recommends use of 
encryption of RTCP. RFC7904 mandates that if RTCP is encrypted then RTP 
header extension must also be encrypted. There should be a reference to 
this requirement in the text below, so I will update the text proposal.


The identfication-tag when included in the RTP MID SDES item, 
independent of transport, RTCP SDES packet or RTP header extension, can 
expose the value to parties beyond the signaling chain. Therefore, the 
identification-tag MUST NOT contain any user related information. 
However, the implementation's method for generating identfication-tags 
combined with hardware configuration can enable fingerprinting of the 
endpoint device and thus its user. As the identification-tag is also 
used to route the media stream to the right application functionality it 
is also important that the value received is the one intended by the 
sender, thus integrity and the authenticity of the source are important 
to prevent denial of service on the application. At least to prevent 
third parties from modifying the identification-tag value.

Due to the security risks associated with the MID values in RTP and RTCP 
it is RECOMMENDED that the MID SDES item is confidentiality protected as 
well as source authenticated. The SDES RTP header extensions [RFC7904] 
requires encryption of the header extension in cases when the RTCP 
encrypts the SDES item. The security mechanisms used SHALL provide 
corresponding levels of security for both RTP header extensions and 
RTCP. Confidentiality mechanisms for RTP/RTCP are discussed in Options 
for Securing RTP Sessions [RFC7201], for example SRTP [RFC3711] with 
SRTCP encryption enabled combined with [RFC6904] can provide the 
necessary security functions.

>
>>> I'm not getting what the issue is here. If mid are random, or are
>>> just a count of n'th m-line in the sdp, what is the problem with
>>> exposing them to people are getting the media?
>>
>> The issue is that these identifiers are going from having only been
>> visiable in the signalling messages to be visible also on the RTP
>> media plane. And without RFC6904 even if one uses SRTP, these values
>> are exposed. This have several different effects as I see it. So if
>> the generation algorithm are not strictly defined, the implementation
>> gets possible to fingerprint. In addition the device gets to be
>> fingerprinted based on the number of streams offered and their
>> identifiers. Thus, it is not only what is actually used that is
>> exposed, but what was originally offered, i.e. the full offer leaks
>> into unencrypted domain on the media plane. Note, this later can't be
>> dealt with any mid id creation rules, it will still leak. Thus devices
>> that have more exotic configurations when it comes to media streams,
>> i.e. number of cameras etc this can still be fingerprinted by passive
>> attacks from third parties.
>>
>> It is the passive attack from third parties that has me worried here.
>> A peer in the signalling has massively more powerful fingerprinting,
>> but that requires one to be in the signalling context, not passively
>> observe traffic that goes past.
>>
>>
>> Cheers
>>
>> Magnus
>>
>>
>>>
>>>
>>>
>>>> On Oct 6, 2016, at 7:39 AM, Magnus Westerlund
>>>> <magnus.westerlund@ericsson.com
>>>> <mailto:magnus.westerlund@ericsson.com>> wrote:
>>>>
>>>> Den 2016-10-06 kl. 14:49, skrev Christer Holmberg:
>>>>>
>>>>> Hi,
>>>>>
>>>>> Magnus suggested usage of RFC 6904 for encryption of the RTP SDES
>>>>> header extension for MID. I guess it would be a SHUOLD?
>>>>>
>>>>> In addition, we would say that a corresponding level of security
>>>>> must be applied to the RTP SDES header extension for MID and to
>>>>> the RTCP SDES MID item.
>>>>>
>>>>> Any opinions?
>>>>
>>>> I think this is fine solution to this issue. I would probably
>>>> formulate the security considerations like this.
>>>>
>>>> The identfication-tag when included in the RTP MID SDES item,
>>>> independent of transport, RTCP SDES packet or RTP header extension,
>>>> can expose the value to parties beyond the signaling chain.
>>>> Therefore, the identification-tag MUST NOT contain any user related
>>>> information. However, the implementation's method for generating
>>>> identfication-tags combined with hardware configuration can enable
>>>> fingerprinting of the endpoint device and thus its user. As the
>>>> identification-tag is also used to route the media stream to the
>>>> right application functionality it is also important that the value
>>>> received is the one intended by the sender, thus integrity and the
>>>> authenticity of the source are important to prevent denial of
>>>> service on the application. At least to prevent third parties from
>>>> modifying the identification-tag value.
>>>>
>>>> Due to the security risks associated with the MID values in RTP and
>>>> RTCP it is strongly RECOMMENDED that the MID SDES item is both
>>>> confidentiality protected as well as source authenticated when
>>>> transported in either RTCP or RTP header extensions. The security
>>>> mechanisms used SHALL provide corresponding levels of security for
>>>> both RTP header extensions and RTCP. Confidentiality mechanisms for
>>>> RTP/RTCP are discussed in Options for Securing RTP Sessions
>>>> [RFC7201], for example SRTP [RFC3711] with SRTCP encryption enabled
>>>> combined with [RFC6904] can provide the necessary security
>>>> functions.
>>>>
>>>>
>>>> Cheers
>>>>
>>>> Magnus Westerlund
>>>>
>>>> ----------------------------------------------------------------------
>>>>
>>>>
>> Services, Media and Network features, Ericsson Research EAB/TXM
>>>> ----------------------------------------------------------------------
>>>>
>>>>
>> Ericsson AB                 | Phone  +46 10 7148287
>>>> Färögatan 6                 | Mobile +46 73 0949079 SE-164 80
>>>> Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
>>>> <mailto:magnus.westerlund@ericsson.com>
>>>> ----------------------------------------------------------------------
>>>>
>>>>
>>>>
>> _______________________________________________
>>>> mmusic mailing list mmusic@ietf.org <mailto:mmusic@ietf.org>
>>>> https://www.ietf.org/mailman/listinfo/mmusic
>>>
>>>
>>
>>
>> --
>>
>> Magnus Westerlund
>>
>> ----------------------------------------------------------------------
>> Services, Media and Network features, Ericsson Research EAB/TXM
>> ----------------------------------------------------------------------
>> Ericsson AB                 | Phone  +46 10 7148287
>> Färögatan 6                 | Mobile +46 73 0949079
>> SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
>> <mailto:magnus.westerlund@ericsson.com>
>> ----------------------------------------------------------------------
>>
>> _______________________________________________
>> mmusic mailing list
>> mmusic@ietf.org <mailto:mmusic@ietf.org>
>> https://www.ietf.org/mailman/listinfo/mmusic
>


-- 

Magnus Westerlund

----------------------------------------------------------------------
Services, Media and Network features, Ericsson Research EAB/TXM
----------------------------------------------------------------------
Ericsson AB                 | Phone  +46 10 7148287
Färögatan 6                 | Mobile +46 73 0949079
SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
----------------------------------------------------------------------