Re: [rtcweb] Reminder: Working group last call for draft-ietf-rtcweb-security-arch
Oscar Ohlsson <oscar.ohlsson@ericsson.com> Thu, 07 March 2013 14:49 UTC
Return-Path: <oscar.ohlsson@ericsson.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 121D821F8D52 for <rtcweb@ietfa.amsl.com>; Thu, 7 Mar 2013 06:49:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.949
X-Spam-Level:
X-Spam-Status: No, score=-5.949 tagged_above=-999 required=5 tests=[AWL=-0.300, BAYES_00=-2.599, HELO_EQ_SE=0.35, J_CHICKENPOX_18=0.6, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YTn4cuZW1rEQ for <rtcweb@ietfa.amsl.com>; Thu, 7 Mar 2013 06:49:23 -0800 (PST)
Received: from mailgw2.ericsson.se (mailgw2.ericsson.se [193.180.251.37]) by ietfa.amsl.com (Postfix) with ESMTP id E07A121F8D45 for <rtcweb@ietf.org>; Thu, 7 Mar 2013 06:49:22 -0800 (PST)
X-AuditID: c1b4fb25-b7f366d000004d10-69-5138a8f13436
Received: from ESESSHC017.ericsson.se (Unknown_Domain [153.88.253.124]) by mailgw2.ericsson.se (Symantec Mail Security) with SMTP id B9.8C.19728.1F8A8315; Thu, 7 Mar 2013 15:49:21 +0100 (CET)
Received: from ESESSMB301.ericsson.se ([169.254.1.208]) by ESESSHC017.ericsson.se ([153.88.183.69]) with mapi id 14.02.0318.004; Thu, 7 Mar 2013 15:49:21 +0100
From: Oscar Ohlsson <oscar.ohlsson@ericsson.com>
To: "EKR (ekr@rtfm.com)" <ekr@rtfm.com>
Thread-Topic: [rtcweb] Reminder: Working group last call for draft-ietf-rtcweb-security-arch
Thread-Index: AQHOE6+18fICFMHWHUySsbPOSiaetZiaXJBg
Date: Thu, 07 Mar 2013 14:49:20 +0000
Message-ID: <C643F355C8D33C48B983F1C1EA702A45090DEA@ESESSMB301.ericsson.se>
References: <CA+9kkMATiwiFNyq3awr-EHwnWb3+ZEsP+Omgiwdev=8swgMrAQ@mail.gmail.com>
In-Reply-To: <CA+9kkMATiwiFNyq3awr-EHwnWb3+ZEsP+Omgiwdev=8swgMrAQ@mail.gmail.com>
Accept-Language: sv-SE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [153.88.183.16]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFjrDLMWRmVeSWpSXmKPExsUyM+Jvje7HFRaBBm8XWFqseH2O3WLtv3Z2 ByaPJUt+MnlMftzGHMAUxWWTkpqTWZZapG+XwJXxc/sxtoL/ihXtrV9YGxhPSnUxcnJICJhI /NnzghHCFpO4cG89WxcjF4eQwCFGiRnbdzNDOIsZJXZt+sIEUsUmYCBx6/5JFhBbREBd4uvE k+wgNjOQfWfxOTBbWCBWYteXV1A1cRJTF51hhLCNJHbuPA9Uw8HBIqAicfGgLEiYV8BbouHA RbBWIYEAib3XzrKB2JwCgRKvH99gBbEZBWQl7n+/xwKxSlzi1pP5TBBHC0gs2XOeGcIWlXj5 +B8rhK0osfNsOzNEvZ7EjalT2CBsbYllC18zQ+wVlDg58wnLBEaxWUjGzkLSMgtJyywkLQsY WVYxsucmZuaklxttYgTGyMEtv1V3MN45J3KIUZqDRUmcN9z1QoCQQHpiSWp2ampBalF8UWlO avEhRiYOTqkGxuY2qZSwmvWnel3Vb3x4rBL16lXC6vaENUx92136LQ6/rLy6t0w6xV7o5qpH df8EvB+5J9xnv9765ctbrYTvx66H2xXXM928vf5NyWau/L3TTR22uwSzb4g5dIBJ4ski3s8n RNIWO0fH3fX7tVlgchavw7Q1G3Qk+n7KfavbxtUgOP2q1nRODiWW4oxEQy3mouJEAMMrkSRf AgAA
Cc: "rtcweb@ietf.org" <rtcweb@ietf.org>
Subject: Re: [rtcweb] Reminder: Working group last call for draft-ietf-rtcweb-security-arch
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Mar 2013 14:49:24 -0000
Hi Eric, When reading draft-ietf-rtcweb-security-arch I noticed a couple of things that might be missing: - According to section 4.3.2.4 in draft-ietf-rtcweb-security there shold be a mechanism to verify that the remote browser has engaged a "secure media mode". This mechanism is not (yet) described in the document. - Except for paragraph 6 in section 4.1, there is not much said about the implications of the "secure media mode". - An enterprise network with an HTTP proxy may not want external web sites to learn the IP addresses of its hosts using the PeerConnection API. I'm not sure if this kind of attack is relevant or not. If it is then it should be mentioned in Section 5.4. IP Location Privacy. I also have some minor comments on the rest of the document: - Section 3, 1st paragraph The basic assumption of this architecture is that network resources exist in a hierarchy of trust, rooted in the browser, which serves as the user's TRUSTED COMPUTING BASE (TCB). The term "hierarchy of trust" is unclear in this context. Are there other nodes in this hierarchy except for the browser and web server? - Section 3, 2nd paragraph This is a natural extension of the end-to-end principle. Perhaps it's just me but I don't understand what this end-to-end principle is. - Section 4.3, 1st paragraph The total number of channels depends on the amount of muxing; in the most likely case we are using both RTP/RTCP mux and muxing multiple media streams on the same channel, in which case there is only one DTLS handshake. Won't there be separate handshake for the data channel? - Section 5.4, 1st paragraph [...] which leaks large amounts of location information, especially for mobile devices. Why are mobile devices different in this aspect? - Section 5.6.4 The SDP example contains RTP/AVP but I thought SRTP was made mandatory? - Section 5.6.5.1, 3rd paragraph All requests from the PeerConnection object MUST contain an "id" field which MUST be unique for that PeerConnection object. Any responses from the IdP proxy MUST contain the same id in response, which allows the PeerConnection to correlate requests and responses. Couldn't the browser implementation handle the message routing without the id field? - Section 5.6.5.1.1 The mandatory id field is missing in the example - Section 5.6.5.2.2 How is the assertion field transformed into the a=identity attribute? I guess you´re using some form of B64 encoding but this is not expained anywhere. - Section 5.6.5.2.3 I think the reason for including request_origin should be explained here instead of in the end of the document. - Section 5.7.1, 3rd paragraph WebCrypto API lacks a reference. - Section 5.7.4.5.2 Any IdP which uses cookies to persist logins will be broken by third-party cookie blocking. Shouldn't it say "Any IdP which uses third-party cookies"? - Appendix A and B Both appendices appear unfinished. For example, ROAP is still mentioned in othe BrowserID example and it's unclear what client credentials Bob uses in the OAuth example. Regards, Oscar > -----Original Message----- > From: rtcweb-bounces@ietf.org [mailto:rtcweb-bounces@ietf.org] On Behalf > Of Ted Hardie > Sent: den 26 februari 2013 00:28 > To: rtcweb@ietf.org > Subject: [rtcweb] Reminder: Working group last call for draft-ietf- > rtcweb-security-arch > > This is a reminder that there is an ongoing last call for draft-ietf- > rtcweb-security-arch-06. Please send comments, including those of the > "reviewed and no issues" ilk, by March 9th, 2012. > > regards, > > Ted Hardie > > On Thu, Feb 14, 2013 at 8:35 AM, Ted Hardie <ted.ietf@gmail.com> wrote: > > This begins a working group last call for > > draft-ietf-rtcweb-security-arch. Please send comments to the list by > > March 9, 2013. > > > > regards, > > > > Ted, Cullen, Magnus > _______________________________________________ > rtcweb mailing list > rtcweb@ietf.org > https://www.ietf.org/mailman/listinfo/rtcweb
- [rtcweb] Reminder: Working group last call for dr… Ted Hardie
- Re: [rtcweb] Reminder: Working group last call fo… Colin Perkins
- Re: [rtcweb] Reminder: Working group last call fo… Ted Hardie
- Re: [rtcweb] Reminder: Working group last call fo… Justin Uberti
- Re: [rtcweb] Reminder: Working group last call fo… Eric Rescorla
- Re: [rtcweb] Reminder: Working group last call fo… Martin Thomson
- Re: [rtcweb] Reminder: Working group last call fo… Bernard Aboba
- Re: [rtcweb] Reminder: Working group last call fo… Oscar Ohlsson
- Re: [rtcweb] Reminder: Working group last call fo… Richard Barnes