Re: [MMUSIC] WGLC on draft-ietf-mmusic-dtls-sdp-06.txt

Paul Kyzivat <pkyzivat@alum.mit.edu> Wed, 24 February 2016 22:46 UTC

Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D31A21A0217 for <mmusic@ietfa.amsl.com>; Wed, 24 Feb 2016 14:46:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.635
X-Spam-Level:
X-Spam-Status: No, score=-0.635 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, J_CHICKENPOX_111=0.6, SPF_SOFTFAIL=0.665] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uINV9ddEDQFN for <mmusic@ietfa.amsl.com>; Wed, 24 Feb 2016 14:46:31 -0800 (PST)
Received: from resqmta-ch2-08v.sys.comcast.net (resqmta-ch2-08v.sys.comcast.net [IPv6:2001:558:fe21:29:69:252:207:40]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C1501A00C6 for <mmusic@ietf.org>; Wed, 24 Feb 2016 14:46:31 -0800 (PST)
Received: from resomta-ch2-16v.sys.comcast.net ([69.252.207.112]) by resqmta-ch2-08v.sys.comcast.net with comcast id NNmW1s0042S2Q5R01NmW8K; Wed, 24 Feb 2016 22:46:30 +0000
Received: from Paul-Kyzivats-MacBook-Pro.local ([73.218.51.154]) by resomta-ch2-16v.sys.comcast.net with comcast id NNmV1s00R3KdFy101NmVnN; Wed, 24 Feb 2016 22:46:30 +0000
To: Martin Thomson <martin.thomson@gmail.com>
References: <56B4CDCF.4080100@cisco.com> <56CA320D.9050306@cisco.com> <7594FB04B1934943A5C02806D1A2204B37E389BF@ESESSMB209.ericsson.se> <56CCBE6A.7090709@alum.mit.edu> <7594FB04B1934943A5C02806D1A2204B37E3E3AB@ESESSMB209.ericsson.se> <56CDE4FB.6090002@alum.mit.edu> <7594FB04B1934943A5C02806D1A2204B37E400B7@ESESSMB209.ericsson.se> <56CE145F.5090903@alum.mit.edu> <7594FB04B1934943A5C02806D1A2204B37E4013D@ESESSMB209.ericsson.se> <CABkgnnU2kswQBH=qr6M+wXK8txH4=wA3PLFmTZtZf62KdggNfQ@mail.gmail.com> <56CE24DE.6090300@alum.mit.edu> <CABkgnnUMwweQ0GTsdbvMd9ZJ9vcO5FdMAzZQ-7gW_ukiGyp47A@mail.gmail.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <56CE32C4.3040001@alum.mit.edu>
Date: Wed, 24 Feb 2016 17:46:28 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.6.0
MIME-Version: 1.0
In-Reply-To: <CABkgnnUMwweQ0GTsdbvMd9ZJ9vcO5FdMAzZQ-7gW_ukiGyp47A@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 7bit
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.net; s=q20140121; t=1456353990; bh=fudqQo7879MNbCMV2ypVUaG+5rWMNW6tcrLuMMKjVW8=; h=Received:Received:Subject:To:From:Message-ID:Date:MIME-Version: Content-Type; b=Ez5jQl/DZIhYfIuhT5K95kMGS8TXDzgBvOaVicyTKrwcoJNaz3tR1bOIs56SZZVo3 siAMY2/FequCKnNaev07JOhQeJgUqBHadRphjhUfco7NRzDXK/B8J/Ksax2bXYi6qD MSo9ObIpNvIqGH7TRZ04GisM1cgJA+PUp9fYHpqLj7fo9rS6v0zJ6Z3IPnksvXNiNK XlPseIYFpSuOeZuIbKFdpx32YMMC6xEb4VSClkJblRHtBc0dPmEtwLe5HgwayIQqSZ EpftVK7CwERA7uK8W0uk/WlD3NbBv+5W04JP5Zsm50GSDHQi5XuDlL+HxpGI6hj6iK zhhUpZUGRIPUw==
Archived-At: <http://mailarchive.ietf.org/arch/msg/mmusic/djCRG6XbpisAAfHLasHYSOms-hM>
Cc: Jonathan Lennox <jonathan@vidyo.com>, "mmusic@ietf.org" <mmusic@ietf.org>, Christer Holmberg <christer.holmberg@ericsson.com>
Subject: Re: [MMUSIC] WGLC on draft-ietf-mmusic-dtls-sdp-06.txt
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Feb 2016 22:46:33 -0000

On 2/24/16 5:01 PM, Martin Thomson wrote:
> On 24 February 2016 at 13:47, Paul Kyzivat <pkyzivat@alum.mit.edu> wrote:
>> If we are going to make normative references to multiple fingerprints we
>> need some place authoritative to reference for the details.
>
> I recommend judicious use of copy and paste.  Feel free to steal text
> that I wrote.

First I think it is necessary to decide which document needs this. Then 
the copy/paste can proceed. If it belongs in the body of dtls-sdp then I 
guess it is straightforward to proceed.

If it is in one of the documents that dtls-sdp updates (5763 or 7345) 
then I guess the changes can still be tucked into sdp-dtls.

If it requires something else then it may get more messy.

> FWIW, my reading of 4572 is that it permits multiple fingerprints: one
> for each certificate that might be used.

It doesn't say there *can't* be multiple fingerprints. But I see nothing 
obvious that suggests that is a possibility. There is a lot of usage of 
"the fingerprint" in the text. If it is intended, then ISTM that more 
explanation is needed.

> Its failing is that a) it
> doesn't allow for hash agility, and b) it's unclear, perhaps in the
> extreme.

Yup.

> However, I see this:
>
>     Endpoints MUST support SHA-256 for generating and verifying the
>     fingerprint value associated with the DTLS association.  The use of
>     SHA-256 is preferred.
>
> Which doesn't mention that this requires an update of 4572.

rfc7345 has some similar (not identical) text about this. It is unclear 
to me if that overrides 4572, or supplements it.

Then dtls-sdp updates 7345, removing that text, and replacing it it with 
a reference to itself. Then again similar text is included in section 4.1.

After all those changes I don't know where we stand. But none of those 
places are clear about multiple fingerprints. And I don't know which of 
them ought to be authoritative about that subject.

I don't know what the fix is. I only know there is a problem.

	Thanks,
	Paul

> And this:
>
>     The certificate received during the DTLS handshake MUST match the
>     fingerprint received in the SDP "fingerprint" attribute.
>
> Which should say '*a* fingerprint', to allow for there being multiple.
>
> And this:
>
>     [...]  In addition, the offerer
>     MUST insert an SDP 'setup' attribute according to the procedures in
>     [RFC4145], and an SDP 'fingerprint' attribute according to the
>     procedures in [RFC4572], in the offer.
>
> Which doesn't deal with multiple certificates.
>
> I also see:
>
>     The
>     subjectAltName is not an important component of the certificate
>     verification.
>
> Which is true but insufficient; the text can simply say that the
> certificate is only a receptacle for a public key and authentication
> is tied to an a=fingerprint line in the SDP.
>
> And this:
>
>     This offer includes, as part of the SDP payload, the fingerprint of
>     the certificate that the endpoint wants to use.  The endpoint SHOULD
>
> Which should be plural fingerprint*s*.
>
> The pattern repeats throughout.
>