Re: [Perc] AD Evaluation of draft-ietf-perc-private-media-framework-07

Ben Campbell <ben@nostrum.com> Mon, 14 January 2019 23:11 UTC

Return-Path: <ben@nostrum.com>
X-Original-To: perc@ietfa.amsl.com
Delivered-To: perc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48D4212DF72; Mon, 14 Jan 2019 15:11:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.979
X-Spam-Level:
X-Spam-Status: No, score=-1.979 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nostrum.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V8sk65RlEUI0; Mon, 14 Jan 2019 15:11:37 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A0F9612D84D; Mon, 14 Jan 2019 15:11:34 -0800 (PST)
Received: from [10.0.1.45] (cpe-70-122-203-106.tx.res.rr.com [70.122.203.106]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id x0ENBWBE056746 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Mon, 14 Jan 2019 17:11:33 -0600 (CST) (envelope-from ben@nostrum.com)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nostrum.com; s=default; t=1547507494; bh=lOPHpwJ+B4szZDcIXbF/Mq54Dgq829croCrgPgubpWc=; h=From:Subject:Date:In-Reply-To:Cc:To:References; b=pOOGtx14Fk2pa1szqTuPvaUmwuFXGmOU9o+Jh/HkanioztiIMOdNRH3vJWflLNbga IMjNiEfM/209zKhwCrY8GtKrjKJZEl8cuk6uF2Bz0pGipHnH8ckfGAFD5eDYvUW9hh 4evD2ll4hMCVrtSvT9qzIxAcrGDETUAu6t1SR07U=
X-Authentication-Warning: raven.nostrum.com: Host cpe-70-122-203-106.tx.res.rr.com [70.122.203.106] claimed to be [10.0.1.45]
From: Ben Campbell <ben@nostrum.com>
Message-Id: <A750517B-DA97-4E20-A909-9EBEA08AA042@nostrum.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_9ED3B02B-5240-43D5-9A75-D5026877AFD9"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
Date: Mon, 14 Jan 2019 17:11:32 -0600
In-Reply-To: <8F9C11FD-9CCD-48DD-96E8-286CA2569626@nostrum.com>
Cc: perc@ietf.org
To: draft-ietf-perc-private-media-framework.all@ietf.org
References: <8F9C11FD-9CCD-48DD-96E8-286CA2569626@nostrum.com>
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/perc/wu5ySgUHqvIWSjI1GXcWGY2JOvs>
Subject: Re: [Perc] AD Evaluation of draft-ietf-perc-private-media-framework-07
X-BeenThere: perc@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhanced RTP Conferencing <perc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perc>, <mailto:perc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/perc/>
List-Post: <mailto:perc@ietf.org>
List-Help: <mailto:perc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perc>, <mailto:perc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Jan 2019 23:11:40 -0000

Hi,

What’s the status of getting an update? It would be nice to get this through IETF LC and the IESG evaluation before Prague.

Thanks!

Ben.

> On Oct 22, 2018, at 2:47 PM, Ben Campbell <ben@nostrum.com> wrote:
> 
> Hi,
> 
> This is my AD Evaluation of draft-ietf-perc-private-media-framework-07.
> 
> I appreciate all the work that has gone into this, but I think this draft still needs some work before the IETF last call. I have some substantive and significant editorial comments that I would like to resolve prior to the LC.
> 
> Thanks!
> 
> Ben.
> 
> -------------------------
> 
> Substantive Comments:
> 
> §1, 2nd paragraph: This paragraph needs to tie the ideas together better. It says the ability to deploy in virtual environments is an advantage, but the rest of the paragraph seems to argue why doing so is insecure. I _think_ the idea is to say that this draft helps improve that security, thus helping remove a barrier to taking advantage of virtual/cloud environments? If so, please say so.
> 
> §2: Please use the new boilerplate from RFC 8174. There are multiple uses of lower-case “must” and “should” in the document that don’t appear to be intended as normative.
> 
> §2, definition of MD: It seems like this definition is a little too focused on the PERC trust model, and leaves out the definition of it as a middlebox that forwards the active stream without modification. (I guess that’s caught in the reference to 7667, but it would be better to include the core of the definition here, rather than imply it by reference.
> 
> §3.1.1: "The actual
> media content MUST NOT not be decryptable by a Media Distributor, so
> it is untrusted to have access to the E2E media encryption keys.”
> 
> I’m not sure that MUST NOT should be stated normatively, as it’s really a statement of fact, or at least a foundational assumption.
> 
> §3.1.1, paragraph 3: "A Media Distributor MUST perform its role in properly forwarding
> media packets while taking measures to mitigate the adverse effects
> of denial of service attacks (refer to Section 6), etc, to a level
> equal to or better than traditional conferencing (i.e. non-PERC)
> deployments.”
> 
> That requirement is too vague for a normative MUST. Consider leaving the normative language to section 6.
> 
> §3.1.2, last paragraph: "In any deployment scenario where the call processing function is
> considered trusted, the call processing function MUST ensure the
> integrity of received messages before forwarding to other entities.”
> 
> Please describe why that is important in a PERC environment.
> 
> §4.2, first paragraph: "participants in the conference
> MUST keep track of the E2E keys”
> 
> This seems redundant to similar requirement in 4.3. The requirements in 4.3 are more precise, so I suggest stating this one descriptively.
> 
> §4.3: "prior E2E keys SHOULD be retained”
> 
> I think there’s some disagreement internal to this document, and between this and EKT (and maybe double?). Please see related comment 0n section 4.5.2:
> 
> §4.4: First paragraph: "this framework requires that every packet be authenticated”: Is that a statement of fact that this framework states a normative requirement elsewhere, or is it this intended to be a normative requirement in itself?
> 
> §4.4, 2nd paragraph: "Using hop-by-hop authentication gives the Media Distributor the
> ability to change certain RTP header values.”
> That’s not really a true statement. It’s the lack of E2E authentication that enables that. It seems like the real point is that, since we can’t use E2E authentication, HBH authentication is better than nothing.
> 
> §4.4, 3rd paragraph: "If there is a need to encrypt one or more RTP header extensions hopby-
> hop, ...” : Is that optional?
> 
> §4.4, last paragraph: "Note that when RTP header extensions are encrypted,
> all hops - in the untrusted domain at least - will need to decrypt
> and re-encrypt these encrypted header extensions.”
> 
> I’m confused by this; the document requires distinct keys for each hop. is there an exception for trusted MDs?
> 
> §4.5.1,
> - 2nd to  last paragraph: "Endpoints MAY use the DTLSSRTP
> generated E2E key for transmission or MAY generate a fresh E2E
> key.”: They have to do one or the other, right? That wording allows then to do neither.
> 
> - Last paragraph:  It would be helpful to describe the security associations involved. Do I understand correctly that an endpoint has an SA with the KD, but not the MD?  But peer MDs do have SAs with each other?
> 
> §4.5.2, 3rd paragraph:
> 
> I think there’s some disagreement on the normative keywords for delaying the switch to new keys. I discussed this offline with Richard, and he replied with the following:
> 
>> There's sort of a conflict here.  The crux is here:
>> 
>> """
>>   Since it may take some time for all of the
>>   endpoints in conference to finish re-keying, senders MUST delay a
>>   short period of time before sending media encrypted with the new
>>   master key, but it MUST be prepared to make use of the information
>>   from a new inbound EKT Key immediately.
>> """
>> 
>> The first part talks about media keys, which conflicts with EKT; it should probably be deleted.  The second part is about processing EKT tags, and should be kept.  So we probably end up with something like the following:
>> 
>> """
>>   In order to allow time for all endpoints in the conference to receive the new keys,
>>   the sender should follow the recommendations in Section XXX of [I-D.ietf-perc-srtp-ekt-diet].
>>   On receiving a new EKT Key, endpoints MUST be prepared to decrypt EKT tags using the
>>   new key.  The EKT SPI field can be used to differentiate between tags encrypted with
>>   the old and new keys.
>> """
> 
> §5.2, 2nd paragraph: If the fingerprint is signed, does the entire signaling network still need to be trusted? Also, should the reference to 4474 be 8224?
> 
> §6:  This is written in forward-looking language about how the framework needs to be designed. That design is complete now, what are the considerations for it’s use as designed?
> 
> Also, there are considerations for attacks other than DOS attacks, right?
> 
> §6.2.1: This section seems odd to me.  I understand not trusting the MD to keep communication confidential or to not tamper with it, etc. But if the MD wants to deny service, it can find much easier ways. For example, simply not forwarding packets.
> 
> §A.1: "Assuming the use of Double...”
> Is that optional?
> 
> - "The media distributor doesn’t perform DTLS-SRTP,...”
> 
> The document describes one case where it does (connections between peer MDs)
> 
> §A.3: "To reduce complexity, PERC
> *RECOMMENDS* that endpoints create random SRTP master keys locally to
> be used for E2E encryption.”
> 
> Is RECOMMENDS intended as normative? If not, where is the actual recommendation?
> 
> Editorial Comments:
> 
> - General: I found the draft to have some issues with flow and fragmentation. I expected this draft give a big-picture overview tying together the moving parts of PERC in a way that tells me how they work together.  I was surprised to find that the text that does that was relegated to the appendices, which I usually see reserved for more optional reading. I recommend promoting the appendix text into a non-normative introduction. (If you follow this recommendation, please edit that text for tone; it veers a bit too far on the casual side in places for a standards track RFC.)
> 
> - General: Please be consistent between using “E2E" or "end-to-end” when referring to keys. (Same with HBH and "hop-by-hop")
> 
> - General: Please be consistent in using present vs future tense when describing procedures. Present tense is usually more readable for that sort of thing.
> 
> §1, first paragraph:
> - "Instead, media flows transmitted by
> conference participants are simply forwarded by the Media Distributor
> to each of the other participants, often forwarding only a subset of
> flows based on voice activity detection or other criteria.”
> 
> The sentence seems to switch subjects half way through. Suggest breaking into two sentences, with the second starting with “Media Distributors often forward only a subset..”
> 
> §1, 2nd paragraph: This paragraph needs to tie the ideas together better. It says the ability to deploy in virtual environments is an advantage, but the rest of the paragraph seems to argue why doing so is insecure. I _think_ the idea is to say that this draft helps improve that security, thus helping remove a barrier to taking advantage of virtual/cloud environments? If so, please say so.
> 
> §3.1.1, 2nd paragraph: "An endpoint’s ability to join a conference hosted by a Media
> Distributor MUST NOT alone be interpreted as being authorized to have
> access to the E2E media encryption keys, as the Media Distributor
> does not have the ability to determine whether an endpoint is
> authorized.”
> 
> MUST NOT be interpreted by what? (consider active voice). Also, I’m not sure what it means for "the ability to join a conference" to be authorized. Consider something to the effect of “... to imply that the endpoint is authorized...”
> 
> §4.1, first paragraph: "access of the end-to-
> end key information”
> s/of/to
> 
> §4.2, first paragraph: Please expand “SSRC" on first mention.
> 
> §4.3:
> - 2nd paragraph:"Receiving
> endpoints MUST discard old E2E keys no later than when it leaves the
> conference.”: singular/plural disagreement.
> 
> -3rd paragraph:"an encryption key is derived”: Derived by what? (consider active voice).
> 
> §4.4, section title: should “Hop Operations” be “Per-hop Operations”?
> 
> §4.4, last paragraph: "an encryption key is derived”: derived by what? (consider active voice.)
> 
> §4.5.2, last paragraph: "Endpoints are at liberty to change the E2E encryption key used at any
> time. Endpoints MUST generate a new E2E encryption key whenever it
> receives a new EKT Key.”
> 
> To be consistent with the “MUST" in the 2nd sentence, it seems like “are at liberty to” should be “MAY”.
> 
> §5: “The key requirements is...” : plural disagreement.
> 
> §6.1, 2nd paragraph: "If not
> making use of HBH authentication on the Media Distributor, such an
> attack could only be detected in the receiving endpoints where the
> forged packets would finally be dropped.”
> 
> The sentence suggests that an attack might make use of HBH authentication. I don’t think that’s the intent.
> 
> §6.2.2: Missing article before “Replay”
> 
> Appendix A:
> 
> -- "The time required to retain old keys (either EKT Keys or SRTP master
> keys) is not specified, but they should be retained at least for the
> period of time required to re-key the conference or handle latearriving
> or out-of-order packets. A period of 60s should be
> considered a generous retention period, but endpoints may keep old
> keys on hand until the end of the conference.”
> 
> That should be stated in the main body.
> 
> -- "Or more detailed explanation of each of the keys follows.”
> 
> Sentence fragment.
> 
> Appendix B:
> 
> It really seems like the packet format should go in the main body (if it’s needed in this document at all.)
> 
> Also, is there really anything called a PERC packet? That would be" SRTP with double", or something like that, right?
> 
> 
> 
> 
> 
> 
>