Re: [MMUSIC] WGLC on draft-ietf-mmusic-sdp-uks-03

Flemming Andreasen <fandreas@cisco.com> Thu, 07 March 2019 21:06 UTC

Return-Path: <fandreas@cisco.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8F97130F81; Thu, 7 Mar 2019 13:06:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0lP-TaT7Tk3u; Thu, 7 Mar 2019 13:06:33 -0800 (PST)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E9A9A130F5C; Thu, 7 Mar 2019 13:06:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=18994; q=dns/txt; s=iport; t=1551992792; x=1553202392; h=subject:to:cc:references:from:message-id:date: mime-version:in-reply-to; bh=3tcj6RTBH3yjyn12xGeoTKvA9S7j4xVYDKjb/fSOpIs=; b=dChwYXoeQXd9/Ra8grhVFCdEGwxJEskVIM6iRbRKaldW129qWexnS0gc eGRisLJmKSwTUVLuiroXCrgwv6Xb5zb9ORDYf7EMz80FSzgnkw70mweGr 60JSDA9xRxNIlvLoWKgLUs8YXFdYgRvkmN/tm7uHJomdiFNdnwitf+gbB A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0ASAAByh4Fc/40NJK1bCRoBAQEBAQIBAQEBBwIBAQEBgVMDAQEBAQsBgWAvaIEDJ4QJlVSJPIh0hXMUgWcNGAEKhANGAoQ1IjYHDQEBAwEBBwEDAm0cDIVKAQEBAQIBAQEhBEcEBwULCQIOBwMqAgInMAYBDAYCAQGDHgGBaAUID49nmkCBJnwzH4UlhF0FgS8BiGKCSReBQD+BESeCa4MeAQGBJAoBCAQGAQmDIIJXAol0h36GA4wgCYtIhzcGGYsAiDWKMj+SX4FOBSxlcU0jFTuCbBOKeYU+HyEDMIsyDheCJwEB
X-IronPort-AV: E=Sophos;i="5.58,453,1544486400"; d="scan'208,217";a="531587083"
Received: from alln-core-8.cisco.com ([173.36.13.141]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Mar 2019 21:06:12 +0000
Received: from [10.82.171.95] ([10.82.171.95]) by alln-core-8.cisco.com (8.15.2/8.15.2) with ESMTP id x27L6BOF021671; Thu, 7 Mar 2019 21:06:12 GMT
To: Martin Thomson <mt@lowentropy.net>, mmusic <mmusic@ietf.org>
Cc: draft-ietf-mmusic-sdp-uks@ietf.org
References: <ec74675d-c576-f728-0481-c9488fb13beb@cisco.com> <ea61540a-20c7-0c3d-1f7d-4d702d9a5332@cisco.com> <e17042ae-af33-4b86-8a99-086290a1e8c0@www.fastmail.com> <f28a5698-d7bd-b39a-b307-fc8ced708ad3@cisco.com> <69e1ed84-7bae-4258-897b-a6d36716c261@www.fastmail.com>
From: Flemming Andreasen <fandreas@cisco.com>
Message-ID: <718ce899-166c-b793-c7d4-84bb5fcceea5@cisco.com>
Date: Thu, 07 Mar 2019 16:06:11 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.5.3
MIME-Version: 1.0
In-Reply-To: <69e1ed84-7bae-4258-897b-a6d36716c261@www.fastmail.com>
Content-Type: multipart/alternative; boundary="------------19E9950D4CE5573EDC910E56"
Content-Language: en-US
X-Outbound-SMTP-Client: 10.82.171.95, [10.82.171.95]
X-Outbound-Node: alln-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/Jcxx3YJ0h_Cpo-Ts5kY9GBi9f3E>
Subject: Re: [MMUSIC] WGLC on draft-ietf-mmusic-sdp-uks-03
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Mar 2019 21:06:42 -0000


On 3/5/19 10:10 PM, Martin Thomson wrote:
> Hi Flemming,
>
>> "For 3PCC to work with the proposed mechanisms, TLS peers need to be
>> aware of the
>> signaling so that they can correctly generate (and check) the
>> extension.  Peers
>> need access to any identity assertions present in signaling in order to
>> perform
>> the checks in {{external_id_hash}}.  To perform the checks in
>> {{external_session_id}}, a 3PCC system needs to ensure that guarantee
>> that peers
>> use the same SDP `tls-id` attribute value."
>>   I'm still not clear on how this works. RFC 3725 defines four different
>> flows - does the mechanism work with all four of them ? To some extent,
>> this may be a question on SIP Authenticated Identity (RFC 8224) as it
>> is not clear to me how that works with 3PCC. An actual (high-level)
>> call flow illustratings this would be helpful.
> The problem here is that RFC 3725 doesn't really contemplate the sorts of changes that earlier commenters observed happen in practice.  All the flows and recommendations there limit the changes made by the controller to fixups that ensure that offers and answers from the endpoints work effectively.  On that basis, simply following the guidance in RFC 3725 would - absent some mistake - result in a working session.  Presumably, if the controller supports tls-id, then it copies the value faithfully and things work.  That is how I would interpret the guidance in 3725.
>
> But some people observed that 3PCC covers more than the fixups that 3725 recommends, so this text hedges a little.  Would it help if it were expanded thus:
>
> "For 3PCC to work with the proposed mechanisms, TLS peers need to be aware of the
> signaling so that they can correctly generate (and check) the extension.  Peers
> need access to any identity assertions present in signaling in order to perform
> the checks in {{external_id_hash}}.  For a connection to be successfully
> established, a controller needs to forward all fields that contain identity
> assertions, including any fields outside of SDP that are used, such as the SIP
> Identity header field {{?SIP-ID}}.  A controller that follows the best practices
> in RFC 3725 is expected to forward the necessary information contained in SDP,
> such as the WebRTC `identity` attribute, thus ensuring the necessary information
> is present.
>
> "To perform the checks in {{external_session_id}}, a 3PCC system needs to ensure
> that guarantee that peers use the same SDP `tls-id` attribute value.  A
> controller that follows the best practices in RFC 3725 will produce SDP with
> consistent `tls-id` values, but other forms of modification might not.
>
> "It is understood that this technique will prevent the use of 3PCC if peers have
> different views of the involved identities, or the value of SDP `tls-id`
> attributes."
>
The text is clearer, but I still don't follow. If I understand RFC 8224 
correctly, authenticated identity is only defined for SIP requests, 
however all four 3PCC flows in RFC 3725 have the controller generate the 
SIP INVITE, so how do the endpoints exchange authenticated identity 
information ?


>>   The text reads well, but I'm still left with the same question:
>>
>>   Section 3.1, second paragraph says there are two separate sessions (I
>> take that to mean SIP sessions). It then goes on to say
>>
>>   "In the first session, Patsy is presented with the option to
>> communicate with Norma "
>>
>>   If I understand correctly, this means there is a SIP INVITE sent by
>> Mallory to Patsy, however Mallory somehow asserts Norma's identity to
>> Patsy. How is Mallory able to do that if we are using SIP Authenticated
>> Identity ? I'm not sure if the above would be cleare if the flow was
>> expanded to show INVITE and 200-OK.
> Yeah, I really want to avoid adding all the SIP stuff here.  There would be lots of irrelevant messages involved and it distracts from the message.
>
> The key insight here is that SIP identity only certifies a small number of fields and that the rest of the session is open to be modified by the signaling server.  RFC 8225 only covers the identity (sip:norma@example or tel:+12345556789) and the a=fingerprint values, everything else is open to attack.  So if we allow Mallory the ability to modify signaling, there is a lot she can do.  In practice however, this doesn't require much of an attack on the session, other than (maybe) to substitute transport parameters.
>
> >From the perspective of SIP and SIP identity, these are largely legitimate sessions.  The attack on signaling is necessary only to the extent that the attack also depends on 
>
> I've added more text here, realizing that it was a little light.  This is the updated section in full:
>
> "The attack requires that Mallory obtain an identity binding for her own identity
> with the fingerprints presented by Patsy (P).  This false binding is then
> presented to Norma (Signaling1 in the figure).
You mean Signaling2 in the figure (below), right ?


      Norma                   Mallory                   Patsy
      (fp=N)                   ----- (fp=P)
        |                        |                        |
        |                        |<---- Signaling1 ------>|
        |                        |   Norma=N Patsy=P      |
        |<---- Signaling2 ------>|                        |
        |   Norma=N Mallory=P    |                        |
        |                                                 |
        |<=================DTLS (fp=N,P)=================>|
        |                                                 |
      (peer = Mallory!)                         (peer = Norma)

                Figure 1: Example Attack on Identity Bindings


>
> "Patsy could be similarly duped, but in this example, a correct binding between
> Norma's identity and fingerprint (N) is faithfully presented by Mallory.  This
> session (Signaling2 in the figure) can be entirely legitimate.
Signaling1 ?

> "A DTLS session is established directly between Norma and Patsy.  In order for
> this to happen Mallory can substitute transport-level information in both
> sessions to facilitate this, though this is not necessary if Mallory is on the
> network path between Norma and Patsy.
>
> "As a result, Patsy correctly believes that she is communicating with Norma.
I don't follow the above sentence (just like I don't follow the sentence 
I referenced originally, i.e. "In the first session, Patsy is presented 
with the option to communicate with Norma".

If we double-click on "Signaling1", then I believe we start with:

     INVITE(From: Mallory, To: Patsy, Fingerprint:Norma, 
Identity:{From:Mallory, Fingerprint:Norma})

Implicit in the sentence above is an assumption that *Mallory* is 
somehow able to generate an INVITE to Patsy with an Identity header that 
authenticates *Norma* as the originator, i.e.:

     INVITE(From: Norma, To: Patsy, Fingerprint:Norma, 
Identity:{From:Norma, Fingerprint:Norma})

How is that possible ? What am I missing here ?

> However, Norma incorrectly believes she is talking to Mallory."
This part I understand.

> There is one last thing that I realized while writing up those changes, and that is that the text was a little vague about the relationship between the attacks.  I'll send another email with a proposed clarification, because I think that's important enough not to hide.
Ok - thanks

-- Flemming

> _______________________________________________
> mmusic mailing list
> mmusic@ietf.org
> https://www.ietf.org/mailman/listinfo/mmusic
> .
>