Re: [MMUSIC] Review of draft-ietf-mmusic-sdp-bundle-negotiation-32 - Magnus' comments - MID security

Magnus Westerlund <magnus.westerlund@ericsson.com> Fri, 07 October 2016 08:42 UTC

Return-Path: <magnus.westerlund@ericsson.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 749B1129536 for <mmusic@ietfa.amsl.com>; Fri, 7 Oct 2016 01:42:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ql1bFakUPmbb for <mmusic@ietfa.amsl.com>; Fri, 7 Oct 2016 01:41:58 -0700 (PDT)
Received: from sessmg23.ericsson.net (sessmg23.ericsson.net [193.180.251.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 69565129497 for <mmusic@ietf.org>; Fri, 7 Oct 2016 01:41:58 -0700 (PDT)
X-AuditID: c1b4fb2d-1c7ff700000009f7-c1-57f75fd3fcce
Received: from ESESSHC003.ericsson.se (Unknown_Domain [153.88.183.27]) by (Symantec Mail Security) with SMTP id 53.58.02551.3DF57F75; Fri, 7 Oct 2016 10:41:56 +0200 (CEST)
Received: from [127.0.0.1] (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.29) with Microsoft SMTP Server id 14.3.319.2; Fri, 7 Oct 2016 10:41:55 +0200
To: Cullen Jennings <fluffy@iii.ca>
References: <D41C238A.1095B%christer.holmberg@ericsson.com> <71419d1f-af1d-46e9-401d-81c5df73fc49@ericsson.com> <58510E68-A045-4312-B3B3-3468E83C8EB7@iii.ca>
From: Magnus Westerlund <magnus.westerlund@ericsson.com>
Message-ID: <243c777f-46f9-4053-1588-7e6b58a06c8c@ericsson.com>
Date: Fri, 07 Oct 2016 10:41:52 +0200
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0
MIME-Version: 1.0
In-Reply-To: <58510E68-A045-4312-B3B3-3468E83C8EB7@iii.ca>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrLLMWRmVeSWpSXmKPExsUyM2K7tO6V+O/hBnevalh8WP+D0WLq8scs Fis2HGB1YPb4+/4Dk8eSJT+ZPC6f/8gYwBzFZZOSmpNZllqkb5fAlXH8+SLGgk8aFecPdLM3 MPYpdjFyckgImEjs6//E2MXIxSEksJ5R4tqT3YwgCSGBZYwSxy6ndzFycAgL5EtMn1IHEhYR UJY4t+MuM0T9QkaJnxMms4I4zALNjBJ7Z+9iBaliE7CQuPmjkQ3E5hWwl5jb1cAKMohFQEXi TlMNSFhUIEbi+rNHUCWCEidnPmEBKeEUsJJYcFcQJMwMNGXm/POMELa8RPPW2cwQp2lLNDR1 sE5gFJiFpHsWkpZZSFoWMDKvYhQtTi0uzk03MtZLLcpMLi7Oz9PLSy3ZxAgM1INbfuvuYFz9 2vEQowAHoxIP74OIb+FCrIllxZW5hxglOJiVRHhbY7+HC/GmJFZWpRblxxeV5qQWH2KU5mBR Euc1W3k/XEggPbEkNTs1tSC1CCbLxMEp1cCYtdTu8Pt9P7dcjuJ0dmEqst12vJiRS0AheE64 ++Pbn/49UnmicEW5+H2a7bk1KwQeW7gqc2/dM7P+s2rG1bSZk45PPsXz5eWG1oZPwT0X5+Wq Rr+6bSmXeSxv/j2N8F+TV61qSEjUKoxJfX0+WTPTqyzu5TN+1z+P//j6h2qstV/Ivo778k4D JZbijERDLeai4kQAndDLllACAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/MrR12RspZ2pQmEBkzylZVpMaOCQ>
Cc: "mmusic@ietf.org" <mmusic@ietf.org>, Paul Kyzivat <pkyzivat@alum.mit.edu>, Christer Holmberg <christer.holmberg@ericsson.com>
Subject: Re: [MMUSIC] Review of draft-ietf-mmusic-sdp-bundle-negotiation-32 - Magnus' comments - MID security
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Oct 2016 08:42:00 -0000

Den 2016-10-06 kl. 23:59, skrev Cullen Jennings:
>
> I'm not getting the problem here and mandating 6904 is not an easy
> thing to do.

So, lets be clear on what I have proposed. For bundle in general it is 
RECOMMENDED to encrypt MIDs in RTP header extensions. I have also 
proposed that for RTCWeb implementation and use should be mandated. I 
was not clear in what applies when an WebRTC endpoint talks to a legacy 
endpoint what is expected here. I guess this is the thorny issue.

>
> I'm not getting what the issue is here. If mid are random, or are
> just a count of n'th m-line in the sdp, what is the problem with
> exposing them to people are getting the media?

The issue is that these identifiers are going from having only been 
visiable in the signalling messages to be visible also on the RTP media 
plane. And without RFC6904 even if one uses SRTP, these values are 
exposed. This have several different effects as I see it. So if the 
generation algorithm are not strictly defined, the implementation gets 
possible to fingerprint. In addition the device gets to be fingerprinted 
based on the number of streams offered and their identifiers. Thus, it 
is not only what is actually used that is exposed, but what was 
originally offered, i.e. the full offer leaks into unencrypted domain on 
the media plane. Note, this later can't be dealt with any mid id 
creation rules, it will still leak. Thus devices that have more exotic 
configurations when it comes to media streams, i.e. number of cameras 
etc this can still be fingerprinted by passive attacks from third parties.

It is the passive attack from third parties that has me worried here. A 
peer in the signalling has massively more powerful fingerprinting, but 
that requires one to be in the signalling context, not passively observe 
traffic that goes past.


Cheers

Magnus


>
>
>
>> On Oct 6, 2016, at 7:39 AM, Magnus Westerlund
>> <magnus.westerlund@ericsson.com> wrote:
>>
>> Den 2016-10-06 kl. 14:49, skrev Christer Holmberg:
>>>
>>> Hi,
>>>
>>> Magnus suggested usage of RFC 6904 for encryption of the RTP SDES
>>> header extension for MID. I guess it would be a SHUOLD?
>>>
>>> In addition, we would say that a corresponding level of security
>>> must be applied to the RTP SDES header extension for MID and to
>>> the RTCP SDES MID item.
>>>
>>> Any opinions?
>>
>> I think this is fine solution to this issue. I would probably
>> formulate the security considerations like this.
>>
>> The identfication-tag when included in the RTP MID SDES item,
>> independent of transport, RTCP SDES packet or RTP header extension,
>> can expose the value to parties beyond the signaling chain.
>> Therefore, the identification-tag MUST NOT contain any user related
>> information. However, the implementation's method for generating
>> identfication-tags combined with hardware configuration can enable
>> fingerprinting of the endpoint device and thus its user. As the
>> identification-tag is also used to route the media stream to the
>> right application functionality it is also important that the value
>> received is the one intended by the sender, thus integrity and the
>> authenticity of the source are important to prevent denial of
>> service on the application. At least to prevent third parties from
>> modifying the identification-tag value.
>>
>> Due to the security risks associated with the MID values in RTP and
>> RTCP it is strongly RECOMMENDED that the MID SDES item is both
>> confidentiality protected as well as source authenticated when
>> transported in either RTCP or RTP header extensions. The security
>> mechanisms used SHALL provide corresponding levels of security for
>> both RTP header extensions and RTCP. Confidentiality mechanisms for
>> RTP/RTCP are discussed in Options for Securing RTP Sessions
>> [RFC7201], for example SRTP [RFC3711] with SRTCP encryption enabled
>> combined with [RFC6904] can provide the necessary security
>> functions.
>>
>>
>> Cheers
>>
>> Magnus Westerlund
>>
>> ----------------------------------------------------------------------
>>
>>
Services, Media and Network features, Ericsson Research EAB/TXM
>> ----------------------------------------------------------------------
>>
>>
Ericsson AB                 | Phone  +46 10 7148287
>> Färögatan 6                 | Mobile +46 73 0949079 SE-164 80
>> Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
>> ----------------------------------------------------------------------
>>
>>
>>
_______________________________________________
>> mmusic mailing list mmusic@ietf.org
>> https://www.ietf.org/mailman/listinfo/mmusic
>
>


-- 

Magnus Westerlund

----------------------------------------------------------------------
Services, Media and Network features, Ericsson Research EAB/TXM
----------------------------------------------------------------------
Ericsson AB                 | Phone  +46 10 7148287
Färögatan 6                 | Mobile +46 73 0949079
SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
----------------------------------------------------------------------