Re: [MMUSIC] WGLC on draft-ietf-mmusic-sdp-uks-03

Flemming Andreasen <fandreas@cisco.com> Sun, 21 April 2019 22:07 UTC

Return-Path: <fandreas@cisco.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ABD981201C3; Sun, 21 Apr 2019 15:07:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.501
X-Spam-Level:
X-Spam-Status: No, score=-14.501 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5qFIr54X16Jw; Sun, 21 Apr 2019 15:07:42 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79774120175; Sun, 21 Apr 2019 15:07:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=14949; q=dns/txt; s=iport; t=1555884462; x=1557094062; h=subject:to:cc:references:from:message-id:date: mime-version:in-reply-to; bh=ss6luDAV00BoblMFCCdU8kMTeaZaOYKKdfdyg3P8jQo=; b=mchbQZg6hzRbHpOD4OhC2G3/zrCgDDJiZhPMmAPqNpomgvlwuWSqQY+U 9ai1cz0ZjcqRx8u8sgZ+8l4VsXE900upt/IG9r6ECgvS/OslNMeS2ldoY DQmBtkgxFo1+B4DoylAsyZty0GMw4svKGSy6Ezti9JWX/TupbOQpsG8p2 U=;
X-IronPort-AV: E=Sophos;i="5.60,379,1549929600"; d="scan'208,217";a="265186271"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 21 Apr 2019 22:07:40 +0000
Received: from [10.118.10.21] (rtp-fandreas-2-8814.cisco.com [10.118.10.21]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTP id x3LM7dL1012344; Sun, 21 Apr 2019 22:07:40 GMT
To: Martin Thomson <mt@lowentropy.net>, Bo Burman <bo.burman@ericsson.com>, mmusic <mmusic@ietf.org>, Jon Peterson <jon.peterson@neustar.biz>, Cullen Jennings <fluffy@cisco.com>, 'Eric Rescorla' <ekr@rtfm.com>
Cc: "draft-ietf-mmusic-sdp-uks@ietf.org" <draft-ietf-mmusic-sdp-uks@ietf.org>
References: <ec74675d-c576-f728-0481-c9488fb13beb@cisco.com> <ea61540a-20c7-0c3d-1f7d-4d702d9a5332@cisco.com> <e17042ae-af33-4b86-8a99-086290a1e8c0@www.fastmail.com> <f28a5698-d7bd-b39a-b307-fc8ced708ad3@cisco.com> <69e1ed84-7bae-4258-897b-a6d36716c261@www.fastmail.com> <718ce899-166c-b793-c7d4-84bb5fcceea5@cisco.com> <HE1PR07MB32592AA35C2183A0F1EB34BC8D550@HE1PR07MB3259.eurprd07.prod.outlook.com> <ea80d50b-9463-4bb4-ac89-862987a94585@www.fastmail.com> <4a6a7d47-bd49-ed20-561e-ed4223f2d190@cisco.com> <0de3648b-e750-41a7-819d-59d1bbf5ad70@www.fastmail.com>
From: Flemming Andreasen <fandreas@cisco.com>
Message-ID: <d94aa49b-048f-59f4-3351-80d4d0af7eb2@cisco.com>
Date: Sun, 21 Apr 2019 18:07:39 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <0de3648b-e750-41a7-819d-59d1bbf5ad70@www.fastmail.com>
Content-Type: multipart/alternative; boundary="------------B10221D3CFAAFC5DCD554D96"
Content-Language: en-US
X-Outbound-SMTP-Client: 10.118.10.21, rtp-fandreas-2-8814.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/ug53CsuQM_cJKqHsXYnesp2OAy0>
Subject: Re: [MMUSIC] WGLC on draft-ietf-mmusic-sdp-uks-03
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 21 Apr 2019 22:07:46 -0000


On 4/8/19 8:20 PM, Martin Thomson wrote:
> On Tue, Apr 9, 2019, at 06:48, Flemming Andreasen wrote:
>>   Offers and SIP Requests are not the same. In RFC 3725 Flow 2 and 3, it
>> is the controller that generates the SIP Requests and the endpoints
>> that generate the SIP Responses and to quote RFC 8224, Section 3:
>>
>>   Note that the scope of this document is limited to providing an
>>   identity assurance for SIP requests; solving this problem for SIP
>>   responses is outside the scope of this work (see [RFC4916]).
> Right.  What is relevant here is the offers and answers, not the SIP requests.  RFC 3725 shows only inconsequential offers being generated by the controller.
This is where we differ. In the SIP case, the attack you describe is 
predicated on a mismatch between the Identity information provided in 
the SIP request and the (assumed) identity of the SDP in an offer, thus 
the SIP requests are indeed very relevant to the discussion.

> In the RFC 8224 context, this remains true, but it is hard to see why (more on that below).
>
>>   Thus, I still don't see how you get these endpoint Identity assertions
>> sent across with 3PCC. Maybe we need somebody else to chime in at this
>> point.
>>
>>   Jon/Cullen/Ekr: As authors of RFC 8224, can you help shed light on
>> this part of the thread ?
> [...]
>
>> Ok - I think you are saying a bit
>> more actually. Using the terminology of RFC 8224, I believe you are
>> assuming that the attacker controls the Authentication Service (which I
>> see as more than the signaling channel). If that is the case, then I
>> would suggest clarifying that in the text.
> I don't believe that is the case.  But I see now the angle you are concerned about.  Because RFC 8224 doesn't consider 3PCC, we might have a problem in the sense that 3PCC doesn't work at all with SIP Identity, but let's see if we can work out what it looks like.
>
> Note that "signing" as imagined in RFC 8224 depends on there being SDP to sign.  If there is SDP and it is not bogus, then there is potentially a binding between the a=fingerprint attributes and some identity.  Whether that is in the SIP Identity header field (RFC 8224) or the SDP itself (WebRTC), the result is the same.
Maybe so, but the flows and feasibility of the attacks are not, and that 
is an important distinction:
- 3PCC is defined for SIP, and SIP Identity is only defined for SIP Requests
- WebRTC Identity on the other hand is defined as an SDP attribute, and 
it is included in SDP offers (and optionally answers)

> For 3PCC with RFC 8224, either the controller is responsible for signing, the signing is performed by proxies near A and B (proxies that are not shown in the figure), or by A and B directly.  The point of the signature is to protect against attack between the point that the signature is added and where it is removed.  If the controller is both signing and consuming signatures, that would be pointless because they would be trusted by both A and B, so we'll ignore that case.   Therefore, we assume that signatures happen closer to A or B (or both) so that the signatures serve a purpose.
>
> So we have:  A---AuthSvcA---...---AuthSvcB---B with a controller somewhere on the signaling path between the two ends.  Generally, RFC 8224 assumes that the path from A to its Authentication Service is "trusted", so the attack is on the path between the two Authentication Services.  The controller can be anywhere, because we're not assuming anything about that.
Agreed so far.
> You might wonder whether the controller can generate bogus SDP that can be signed, but that is a constraint on deployment, not on security.
I disagree - it is a constraint on the overall feasibility of the 
attack. If we can't construct a deployment scenario that enables the 
attack, then the attack is not practically feasible, and then why are we 
concerned with it ?

To be more specific, the signature covering the SDP is generated by the 
authentication service above, and you stated (and I agree) that the 
attack cannot happen between A and AuthSvcA. Given that, how can the 
controller generate bogus SDP that gets signed (with a signature 
covering the "From: A", "To: B", Date and SDP fingerprint ) ?


>    Bogus SDP generated by a controller that sits on the "untrusted" portion of the signaling path won't be signed and therefore might be rejected, but that just limits the choices the controller has.
I agree it won't be signed, but at that point I don't believe we are in 
the attack scenario the document describes (?)

>   If the controller is on a "trusted" segment, then it might generate SDP for the endpoint nearest to it and have a valid signature over that content.
Sure, but above, you just said that wasn't the attack scenario we were 
contemplating (presumably because it invalidates the premise of SIP 
Identity to begin with)
>
> The attack that we're contemplating acts on the "untrusted" segment of the signaling path.  It operates without collaboration with any of the "trusted" entities.  It relies on being able to intercept and modify signaling on that path segment.  That's all.
I hear you, but you have yet to show me how that is possible. Please 
provide an example SIP flow that demonstrates how this attack is 
realized, 'cause I still don't see it.

>   In all cases other than the nonsensical one where the controller acts as Authentication Service for both parties, the attack we're  considering doesn't depend on the Authentication Service being compromised.
I agree that should be the premise, but I don't see how it is achieved.
> In the extreme case, say that  A and B sign their own SDP/signaling and assert their own identities.  If the controller is the attacker, they control when sessions are established and how.  They can copy-paste signatures between the different messages they receive.
Please provide an example flow that illustrates this in more detail.

Thanks

-- Flemming