Re: [MMUSIC] [Technical Errata Reported] RFC4568 (6291)

"Patrick Kinane (pkinane)" <pkinane@cisco.com> Tue, 20 October 2020 20:24 UTC

Return-Path: <pkinane@cisco.com>
X-Original-To: mmusic@ietfa.amsl.com
Delivered-To: mmusic@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA37F3A07F0 for <mmusic@ietfa.amsl.com>; Tue, 20 Oct 2020 13:24:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.597
X-Spam-Level:
X-Spam-Status: No, score=-9.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=XKjYT9XJ; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=TzA3akq8
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aqE0_HtoGJG7 for <mmusic@ietfa.amsl.com>; Tue, 20 Oct 2020 13:24:53 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C16E63A07F9 for <mmusic@ietf.org>; Tue, 20 Oct 2020 13:24:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=64700; q=dns/txt; s=iport; t=1603225492; x=1604435092; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=BlJllvK7y47tV+4PCPNqiCuoAslwomrtZT2HCBetoZw=; b=XKjYT9XJnj5C3FYp3Jnce2+cDUIo33aFtcEw3QyTo7SQa4bU2dNzM5iT YcqBeWDkI0i5WjdHhy/D2teCFePtZaXNSlZ9/JNbGSMi6V0yD1e8DfM6H Z8Vt7pLFHLZ5WDKE7+VOmdt7De+z/ETRlamufW5EhTwW2yRY+9Gwl4qf4 c=;
IronPort-PHdr: 9a23:/GOOPRLy2yW9bLrTY9mcpTVXNCE6p7X5OBIU4ZM7irVIN76u5InmIFeGvKk/h17SVoKd4PVB2KLasKHlDGoH55vJ8HUPa4dFWBJNj8IK1xchD8iIBQyeTrbqYiU2Ed4EWApj+He2YkNUA835IVbVpy764TsbAB6qMw1zK6z8EZLTiMLi0ee09tXTbgxEiSD7b6l1KUC9rB7asY8dho4xJw==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0DUBQD7Ro9f/5FdJa1dAxwBAQEBAQEHAQESAQEEBAEBgg+BIy8jBigHcFkvFxUKhDODSQONU4oQjmqBQoEIAwYDUAULAQEBDQEBGAEMCAIEAQGEBkQCF4FuAiU4EwIDAQELAQEFAQEBAgEGBG2FYQyFcgEBAQEDAQEQCAkKAhEBASwLAQ0CAgEIEQMBAQEhAQYDAgICGQYGCxQJCAIEAQ0FCBMHgjlMgX5NAy4BDqIQAoE5iGh2gTKDBAEBBYUpDQuCEAkFgTOCcoNhD4EGgUaCR4FDG4FBP4ERQ4FPfj6BBIEWQgEBAQGBKAELBwEIARoEEQkBDAkRglAzgiyQLAEDKQeCNgE9hxGDJohgkA04VAqCao9ghgeFL4MWig2FSYkaf4RVkzmBfItlklMCBAIEBQIOAQEFgWsjZ3BwFRohgmkJRxcCDViNRwwXg06FFIVCdAI2AgYBCQEBAwl8iwaBNQGBEAEB
X-IronPort-AV: E=Sophos;i="5.77,398,1596499200"; d="scan'208,217";a="567822644"
Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 20 Oct 2020 20:24:51 +0000
Received: from XCH-ALN-001.cisco.com (xch-aln-001.cisco.com [173.36.7.11]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 09KKOpse031277 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Tue, 20 Oct 2020 20:24:51 GMT
Received: from xhs-rtp-002.cisco.com (64.101.210.229) by XCH-ALN-001.cisco.com (173.36.7.11) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 20 Oct 2020 15:24:50 -0500
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rtp-002.cisco.com (64.101.210.229) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Tue, 20 Oct 2020 16:24:49 -0400
Received: from NAM11-DM6-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Tue, 20 Oct 2020 16:24:49 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VI+WhR2fclNbXENWjsFMOcaLJ0RBpOU0NMtd3v6tsjZfaZmf/+wNgcWslpkrrZc5xv5n+ZatDblJ8LinD/IRdcAQtJ1kSg4lckMRQHexg8c8i9IS7GxPPg6vXoa3/k+mqLoAfEa2ePldBYWqVv3fVyFpSZn0gHm5KrGogIi9pQQnjbwqyFqkdCoL+moF4Zy102Ec6KAre/NfInV6ve/h5e+an4yD+8Nq5jqUL0IUWfcw2MwIBL3yaUuLxm950e8Ja4oREZfmEJehHzKEjgmkqTzGJ1Y1y+mEbcgpiJeYM1cCKyGcdeP6Vha02ws9Dy4SGFcPGn6+iIC4/C4GRwCyyg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BlJllvK7y47tV+4PCPNqiCuoAslwomrtZT2HCBetoZw=; b=ICaa7QhrV8fOKLoAjaCwgJo9wnvU92Vdh8FHwEmIqTZxVLaRT8LHp5LeuQHvA4o0+u+aYcH2Gn7FgV3PdDCS6VMV552zRpXT1VoZcpFe055KxtkYdubFWL5aMYM4RbwZjwYHJAngT1NrNMYEabmZNq+nMQCgLxdi94lRuA6GANQdtD40w0Z5FvDTLNq8CKPPgEhRtgtidmBxhCy3iGe6a4UxKhS57uwE5V6QgCtouc/+gPSvcm53jKFdL2mo5pKIo84KQ8FTAaxMz167dX5NwOw68JSP7uiqMb9NPDzc6VvQnO7Nk+DJ7L87X/Sutt17eRdIIsSfJJEpyGRcV3VgYg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BlJllvK7y47tV+4PCPNqiCuoAslwomrtZT2HCBetoZw=; b=TzA3akq83W187gbsCahuNs7Wm8xV8KxlpAbbe4kJxEes9C5zGUIegat9TT2TQ23uvDVa9QtgiXul5IEmTAYw1U0/L6+lSmJyWWG2/vYQ+XEabyWL4EXapsc1v4I9W06J9bXucNPhRUz9XPgBeUdcjLUdKq6yP7Iz2eEeLLHK08I=
Received: from DM5PR11MB1292.namprd11.prod.outlook.com (2603:10b6:3:7::15) by DM6PR11MB4690.namprd11.prod.outlook.com (2603:10b6:5:2ae::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3477.22; Tue, 20 Oct 2020 20:24:48 +0000
Received: from DM5PR11MB1292.namprd11.prod.outlook.com ([fe80::e858:206d:32dd:8c53]) by DM5PR11MB1292.namprd11.prod.outlook.com ([fe80::e858:206d:32dd:8c53%9]) with mapi id 15.20.3477.028; Tue, 20 Oct 2020 20:24:47 +0000
From: "Patrick Kinane (pkinane)" <pkinane@cisco.com>
To: "David Nguyen (davidtng)" <davidtng@cisco.com>, "Jeff Neifert (jneifert)" <jneifert@cisco.com>
CC: "Flemming Andreasen (fandreas)" <fandreas@cisco.com>, RFC Errata System <rfc-editor@rfc-editor.org>, "mbaugher@cisco.com" <mbaugher@cisco.com>, "dwing-ietf@fuggles.com" <dwing-ietf@fuggles.com>, "Murray S. Kucherawy" <superuser@gmail.com>, "barryleiba@computer.org" <barryleiba@computer.org>, Bo Burman <bo.burman@ericsson.com>, mmusic WG <mmusic@ietf.org>, "Venkata Amudalapalli -X (vamudala - INFOSYS LIMITED at Cisco)" <vamudala@cisco.com>, Roman Shpount <roman@telurix.com>
Thread-Topic: [MMUSIC] [Technical Errata Reported] RFC4568 (6291)
Thread-Index: AQHWjFFYCjE8+01E7UOChcPtEkJQH6mUsmmAgAACH4CAAXA8AP//kfYAgADC6oCAASw9gIAAgHqAgAj+ssA=
Date: Tue, 20 Oct 2020 20:24:47 +0000
Message-ID: <DM5PR11MB129291FA16EFD60FAB45C5E8B61F0@DM5PR11MB1292.namprd11.prod.outlook.com>
References: <20200916174633.E62DCF40776@rfc-editor.org> <b04d4902-5c9c-b2d0-17eb-21a2cf27663a@cisco.com> <CAD5OKxvbOOmdEfEFEM_iwV0dsi=nccUXS+x3mnTMOBFtdmDzFQ@mail.gmail.com> <335cdf8e-5f21-db82-a283-a53ed9f40136@cisco.com> <DAFACA3E-8D8F-4065-8E5B-D36B01F42C65@cisco.com> <901f92b5-7e91-bee3-f346-f64fae79341f@cisco.com> <C6EDA481-CB2B-431B-B3F6-D4ADBF4BF673@cisco.com> <CAD5OKxuP_MxBo66NA3XTOLvVo_9Cpg01C+1R68G6wShCpQg0ng@mail.gmail.com>
In-Reply-To: <CAD5OKxuP_MxBo66NA3XTOLvVo_9Cpg01C+1R68G6wShCpQg0ng@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-Mentions: davidtng@cisco.com
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [173.38.117.65]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3bcb1258-f39a-4c28-c881-08d8753630b3
x-ms-traffictypediagnostic: DM6PR11MB4690:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DM6PR11MB469055B2358D37C314997ED2B61F0@DM6PR11MB4690.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: t3wz6wQEFvwyPW6xNh8ukHy3lt160rtXgbioSomKI/+PeuFhcG3lhLQOqbq6mGfnyTEYoYdwu0H/t+nyBUOblkkRDD5XjQmErg82SkjubU8hEw5aLabOkj8jWUx62i1f1vYdU1Lt+ZiG3YZtR895AQRMyjZ6yAIyHNaCLbemqc9BdMUVg3cQGp4w6E1D7nRwkA4EaN8Sqbixm1O7Jz+9MnR28+mS+kU+UnJyf0x5xVSB7MCanyt9UnUKeaZtfSNAq5691hMTBblfy4XpUpGWFj+Spo+1CDJAnhTfaTMxInpH6GfyKEPjRxzUpu0qJIHiixjHcTkmwGtKyKLmOlbbAfAE6/vyPA7aZalwYM6hRa2/qN5W7WE6xUexmbJ4oyQaWvbRf68jd6JbIdqMjC2v5Q==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM5PR11MB1292.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(39860400002)(136003)(366004)(376002)(346002)(396003)(66476007)(76116006)(33656002)(86362001)(30864003)(2906002)(8936002)(83380400001)(64756008)(186003)(166002)(9686003)(478600001)(7696005)(966005)(55016002)(66556008)(66946007)(21615005)(66446008)(316002)(8676002)(4326008)(54906003)(110136005)(6506007)(6636002)(53546011)(52536014)(26005)(5660300002)(71200400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
Content-Type: multipart/alternative; boundary="_000_DM5PR11MB129291FA16EFD60FAB45C5E8B61F0DM5PR11MB1292namp_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM5PR11MB1292.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3bcb1258-f39a-4c28-c881-08d8753630b3
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Oct 2020 20:24:47.6388 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Ea2Q5b464G67KNArPo4sYmbXeQCRpMJ22XkQ5GXbporEyyDUnG7sdFF6pEN7fMvFQhfa1h1QZxMX3/06vL3ImQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM6PR11MB4690
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.11, xch-aln-001.cisco.com
X-Outbound-Node: rcdn-core-9.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/mmusic/wUi02pHEBlxfdep587U3akyQRMc>
X-Mailman-Approved-At: Wed, 21 Oct 2020 08:57:22 -0700
Subject: Re: [MMUSIC] [Technical Errata Reported] RFC4568 (6291)
X-BeenThere: mmusic@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Multiparty Multimedia Session Control Working Group <mmusic.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mmusic>, <mailto:mmusic-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mmusic/>
List-Post: <mailto:mmusic@ietf.org>
List-Help: <mailto:mmusic-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mmusic>, <mailto:mmusic-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Oct 2020 02:43:20 -0000

Hey Jeff,

I hope all is well. @David<mailto:davidtng@cisco.com> wanted to know your input from the phone side for this:

“As far as I know, and as far as I understand this text, if either offerer or answerer changes the IP address, a new master key should be sent in SDP (either offer or answer) and new crypto contexts where the ROC is set to zero should be created in BOTH directions. The reasoning for this is a decomposed SIP gateway or working with B2BUA. In these cases, there is no guarantee that the same two endpoints communicate and that that the current ROC counter is known."

Respectfully,

Patrick Kinane - CCIE Collaboration #58284
Technical Consulting Engineer
Global CX Centers - Collaboration Support Services
Standard business hours: 8am – 5pm ET or 12pm – 9pm UTC
Email: pkinane@cisco.com<mailto:pkinane@cisco.com>
Phone: +1-919-574-6013
Cisco U.S. Contact Numbers: +1-800-553-2447 or +1-408-526-7209
Cisco Worldwide Contact: http://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html
-------------------------------------------
Team Lead: Bryan Johnson
Phone: +1-919-392-2297
Email: bryajohn@cisco.com<mailto:bryajohn@cisco.com>
-------------------------------------------
Direct Manager: Chris Phillips
Phone: +1-919-392-4013
Email: chphilli@cisco.com<mailto:chphilli@cisco.com>
-------------------------------------------
Looking for an instant update on your case?
Connect with me via TAC Connect Bot!
Teams: mailto:tac.connect@webex.bot or learn more here.

From: Roman Shpount <roman@telurix.com>
Sent: Wednesday, October 14, 2020 11:02 PM
To: David Nguyen (davidtng) <davidtng@cisco.com>
Cc: Flemming Andreasen (fandreas) <fandreas@cisco.com>; RFC Errata System <rfc-editor@rfc-editor.org>; mbaugher@cisco.com; dwing-ietf@fuggles.com; Murray S. Kucherawy <superuser@gmail.com>; barryleiba@computer.org; Bo Burman <bo.burman@ericsson.com>; mmusic WG <mmusic@ietf.org>; Patrick Kinane (pkinane) <pkinane@cisco.com>; Venkata Amudalapalli -X (vamudala - INFOSYS LIMITED at Cisco) <vamudala@cisco.com>
Subject: Re: [MMUSIC] [Technical Errata Reported] RFC4568 (6291)

David,

You can look at open source projects such as pjsip,  Asterisk, Freeswitch, linphone.

I am fairly certain they reset the ROC count if either IP address changes, but you are free to double check.
_____________
Roman Shpount


On Wed, Oct 14, 2020 at 10:21 PM David Nguyen (davidtng) <davidtng@cisco.com<mailto:davidtng@cisco.com>> wrote:
Thanks Flemming.  Who can we reach out to in order to get further input regarding your comments?
a) What they have actually implemented
b) What they believe is the propoer solution here.

Thanks,
David
From: Flemming Andreasen <fandreas@cisco.com<mailto:fandreas@cisco.com>>
Date: Tuesday, October 13, 2020 at 6:27 PM
To: "David Nguyen (davidtng)" <davidtng@cisco.com<mailto:davidtng@cisco.com>>, Roman Shpount <roman@telurix.com<mailto:roman@telurix.com>>
Cc: RFC Errata System <rfc-editor@rfc-editor.org<mailto:rfc-editor@rfc-editor.org>>, "mbaugher@cisco.com<mailto:mbaugher@cisco.com>" <mbaugher@cisco.com<mailto:mbaugher@cisco.com>>, "dwing-ietf@fuggles.com<mailto:dwing-ietf@fuggles.com>" <dwing-ietf@fuggles.com<mailto:dwing-ietf@fuggles.com>>, "Murray S. Kucherawy" <superuser@gmail.com<mailto:superuser@gmail.com>>, "barryleiba@computer.org<mailto:barryleiba@computer.org>" <barryleiba@computer.org<mailto:barryleiba@computer.org>>, Bo Burman <bo.burman@ericsson.com<mailto:bo.burman@ericsson.com>>, mmusic WG <mmusic@ietf.org<mailto:mmusic@ietf.org>>, "Patrick Kinane (pkinane)" <pkinane@cisco.com<mailto:pkinane@cisco.com>>, "Venkata Amudalapalli -X (vamudala - INFOSYS LIMITED at Cisco)" <vamudala@cisco.com<mailto:vamudala@cisco.com>>
Subject: Re: [MMUSIC] [Technical Errata Reported] RFC4568 (6291)


On 10/13/20 4:49 PM, David Nguyen (davidtng) wrote:
Thanks Flemming.

For the flow I posted in the Errata, which is also the reason for the Errata, your understanding is correct.  Due to Music on Hold (MOH) handling by CUCM, the c= IP address in the INVITE gets changed from IP1ofEXP to IP2ofMoH and then back to IP1ofEXP.  (The CUCM is only part of the signaling flow and not part of the actual media flow)  The problem is Expressway (or an IP phone) does not know about this IP address change and thus does not reset the crypto context/ROC for the media stream from SBC to EXP.
Should the SBC in this case cache the crypto context from before the hold/resume to continue using it afterwards? (since they are using the same SSRC before and after hold/resume)
It can do that as a workaround in this particular case, but it's not something that's defined in RFC 4568 (which, as noted below, doesn't seem to properly cover this call flow scenario).

Thanks

-- Flemming


Thanks,
David

From: Flemming Andreasen <fandreas@cisco.com><mailto:fandreas@cisco.com>
Date: Tuesday, October 13, 2020 at 1:23 PM
To: Roman Shpount <roman@telurix.com><mailto:roman@telurix.com>
Cc: RFC Errata System <rfc-editor@rfc-editor.org><mailto:rfc-editor@rfc-editor.org>, "mbaugher@cisco.com"<mailto:mbaugher@cisco.com> <mbaugher@cisco.com><mailto:mbaugher@cisco.com>, "dwing-ietf@fuggles.com"<mailto:dwing-ietf@fuggles.com> <dwing-ietf@fuggles.com><mailto:dwing-ietf@fuggles.com>, "Murray S. Kucherawy" <superuser@gmail.com><mailto:superuser@gmail.com>, "barryleiba@computer.org"<mailto:barryleiba@computer.org> <barryleiba@computer.org><mailto:barryleiba@computer.org>, Bo Burman <bo.burman@ericsson.com><mailto:bo.burman@ericsson.com>, "David Nguyen (davidtng)" <davidtng@cisco.com><mailto:davidtng@cisco.com>, mmusic WG <mmusic@ietf.org><mailto:mmusic@ietf.org>
Subject: Re: [MMUSIC] [Technical Errata Reported] RFC4568 (6291)


On 10/12/20 6:25 PM, Roman Shpount wrote:
Hi Flemming,

As far as I know, and as far as I understand this text, if either offerer or answerer changes the IP address, a new master key should be sent in SDP (either offer or answer) and new crypto contexts where the ROC is set to zero should be created in BOTH directions.
I agree this is what needs to happen (or alternatively we need another way of resetting the ROC), but I don't think the current text says exactly that. For example, if only the answerer changes it's IP-address, then by definition, the offerer will keep his master key for media he is sending to the answerer. What you could do at that point of course is to require another offer/answer exchange where the offerer needs to change it's media transport address, but that has some side effects that need to be considered as well (e.g. NAT traversal).


The reasoning for this is a decomposed SIP gateway or working with B2BUA. In these cases, there is no guarantee that the same two endpoints communicate and that that the current ROC counter is known.
Right - that's the problem. It would be good to hear from more people as to
a) What they have actually implemented
b) What they believe is the propoer solution here.

Thanks

-- Flemming


Best Regards,
_____________
Roman Shpount


On Mon, Oct 12, 2020 at 6:18 PM Flemming Andreasen <fandreas=40cisco.com@dmarc.ietf.org<mailto:40cisco.com@dmarc.ietf.org>> wrote:
Sorry for the delay - it's been quite a while since I looked at SRTP and RFC 4568 in detail and hence it would be great if more people could take a closer look and chime in as well.

In any case, please see below.
On 9/16/20 1:46 PM, RFC Errata System wrote:

The following errata report has been submitted for RFC4568,

"Session Description Protocol (SDP) Security Descriptions for Media Streams".



--------------------------------------

You may review the report below and at:

https://www.rfc-editor.org/errata/eid6291



--------------------------------------

Type: Technical

Reported by: David Nguyen <davidtng@cisco.com><mailto:davidtng@cisco.com>



Section: 7.1.4



Original Text

-------------

If the offerer includes an IP address and/or port that differs from

   that used previously for a media stream (or FEC stream), the offerer

   MUST include a new master key with the offer (and in so doing, it

   will be creating a new crypto context where the ROC is set to zero).

   Similarly, if the answerer includes an IP address and/or port that

   differs from that used previously for a media stream (or FEC stream),

   the answerer MUST include a new master key with the answer (and hence

   create a new crypto context with the ROC set to zero).  The reason

   for this is that when the answerer receives an offer or the offerer

   receives an answer with an updated IP address and/or port, it is not

   possible to determine if the other side has access to the old crypto

   context parameters (and in particular the ROC).  For example, if one

   side is a decomposed media gateway, or if a SIP back-to-back user

   agent is involved, it is possible that the media endpoint changed and

   no longer has access to the old crypto context.  By always requiring

   a new master key in this case, the answerer/offerer will know that

   the ROC is zero for this offer/answer, and any key lifetime

   constraints will trivially be satisfied too.  Another consideration

   here applies to media relays; if the relay changes the media endpoint

   on one side transparently to the other side, the relay cannot operate

   as a simple packet reflector but will have to actively engage in SRTP

   packet processing and transformation (i.e., decryption and re-

   encryption, etc.).

Finally, note that if the new offer is rejected, the old crypto

   parameters remain in place.





Corrected Text

--------------





Notes

-----

(and in so doing, it

   will be creating a new crypto context where the ROC is set to zero).

    -Which crypto context for which direction?  Logically this would be the crypto context for media towards the new IP address ?
Note that there is some asymmetry in the way SDP signaling is done in RFC 4568:
- The transport address information (per normal SDP) refers to where media will be *received* (although in practice, symmetric RTP will lead to it being both the send and receive address)
- The SRTP crypto parameters provided apply to media being *sent* by the endpoint that generated the SDP

Furthermore, both the sender and receiver of SRTP media need to agree on the SRTP cryptographic context for a given SSRC.

Having said that, the above text applies to media being generated (sent) by the offerer. The change in IP-address indicates that the offerer may not have access to the old cryptographic context parameters, and hence we must create a new one (on both the sending and receiving side).




(and hence

   create a new crypto context with the ROC set to zero).

   -What if the offerer stays the same and only the answerer changes the IP address?

New crypto context in direction towards new IP address?
If the offer transport address stays the same, then the cryptographic context also stays the same (unless any of the parameters were changed in the offer). In other words, the offerer does not change the SRTP crypto context for media sent to the answerer.

Conversely, if the answerer sends back a new transport address, then a new crypto context will be created for media sent from the answerer to the offerer.

Now, there seems to be a potential problem here, since if only the answerer changed his IP-address, then the answer endpoint may have changed, and chances are he does not have the crypto context parameters for media sent to him. The current text does not seem to adequately handle this scenario.



By always requiring

   a new master key in this case, the answerer/offerer will know that

   the ROC is zero for this offer/answer,

   -Is this resetting crypto context for both directions of media flow?
The current text treats each direction independently, and hence the answer is no (which as noted above can lead to problems).

Note also that the above sentence is misleading when taken out of context: It is not the change in master key that causes the ROC to be reset to zero - it's the change in transport address as called out earlier in the paragraph for that sentence (if my re-read of SRTP [RFC 3711] is correct).



Is this section based on having offer and answerer both change the IP address.

What if the offerer did not change the IP address but the answerer does change it.

What is the expected behavior for media/crypto context/ROC for both sides?
The document does not seem to adequately address this scenario. A couple of options come to mind:
1) If the offerer sees a change in transport address information (but it kept the old crypto context itself), it can change the SSRC for media packets it sends, thereby forcing a new "late binding" event with a ROC=0 (RFC 4568, Section 6.4.1)
2) Update RFC 4568 to clarify how the above situation should be handled. It's not immediately obvious to me how we can do that without either
a) introducing some additional form of signaling where we include the current ROC value from the offerer
b) require another O/A exchange with a new transport address from the offerer (and hence a new crypto context)



What is expected for IP address of 0.0.0.0 for hold, should this reset crypto context as well?
The text does not treat 0.0.0.0 as a special IP-address, so yes.



How should all of this be handled for the case of switching to MoH server and then back to original call?

SBC ------------- CUCM ------------ EXP (signaling)

SBC --------------------------------- EXP (media stream 1)

SBC --------------------------------- MOH (media stream 2)



SBC ------------- CUCM ------------ EXP

<--------------------SDP with IP1ofEXP part of early offer from SBC

Crypto context for media towards EXP

<--------------------SDP with IP2ofMoH part of delayed offer from CUCM and additional early offer CUCM.  CUCM initiates MoH signaling towards SBC.

Crypto context for media towards MoH (only SBC and MoH know about this)

<--------------------SDP with IP1ofEXP part of delayed offer from CUCM

Crypto context for media towards EXP.  Should this be the same as the original if SSRC did not change for media from SBC towards Expressway?
It's a bit difficult to follow given the lack of call flow detail above, but since there was an IP-address change from IP2ofMoH to IP1ofEXP, RFC 4568 Section 7.1.4 would want a new crypto context for media *from* the EXP.

In terms of media *to* the EXP, the SBC sees a change in IP-address information (from IP2ofMoH to IP1ofEXP), so it should create a new crypto context. However, from EXP's point of view, it may or may not have seen a change in IP-address when the change to IP2ofMoH was made. If it did, then things should be ok. If it did not, then we are in a situation that is not properly covered by RFC 4568 (as far as I can tell) and one the above suggestions will have to be considered.

Thanks

-- Flemming



Instructions:

-------------

This erratum is currently posted as "Reported". If necessary, please

use "Reply All" to discuss whether it should be verified or

rejected. When a decision is reached, the verifying party

can log in to change the status and edit the report, if necessary.



--------------------------------------

RFC4568 (draft-ietf-mmusic-sdescriptions-12)

--------------------------------------

Title               : Session Description Protocol (SDP) Security Descriptions for Media Streams

Publication Date    : July 2006

Author(s)           : F. Andreasen, M. Baugher, D. Wing

Category            : PROPOSED STANDARD

Source              : Multiparty Multimedia Session Control RAI

Area                : Real-time Applications and Infrastructure

Stream              : IETF

Verifying Party     : IESG

.

_______________________________________________
mmusic mailing list
mmusic@ietf.org<mailto:mmusic@ietf.org>
https://www.ietf.org/mailman/listinfo/mmusic