Re: [rtcweb] No Interim on SDES at this juncture

Bernard Aboba <bernard_aboba@hotmail.com> Thu, 13 June 2013 19:47 UTC

Return-Path: <bernard_aboba@hotmail.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AE5321F9AD3 for <rtcweb@ietfa.amsl.com>; Thu, 13 Jun 2013 12:47:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.52
X-Spam-Level:
X-Spam-Status: No, score=-102.52 tagged_above=-999 required=5 tests=[AWL=0.078, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ogCKL8IUreSZ for <rtcweb@ietfa.amsl.com>; Thu, 13 Jun 2013 12:47:44 -0700 (PDT)
Received: from blu0-omc1-s16.blu0.hotmail.com (blu0-omc1-s16.blu0.hotmail.com [65.55.116.27]) by ietfa.amsl.com (Postfix) with ESMTP id DEA1D21F9ACB for <rtcweb@ietf.org>; Thu, 13 Jun 2013 12:47:43 -0700 (PDT)
Received: from BLU169-W85 ([65.55.116.9]) by blu0-omc1-s16.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675); Thu, 13 Jun 2013 12:47:43 -0700
X-TMN: [u3YstHEvH1U7PYwx00rLBPoohP2E1BE4]
X-Originating-Email: [bernard_aboba@hotmail.com]
Message-ID: <BLU169-W85165ED7250E6035128B0693870@phx.gbl>
Content-Type: multipart/alternative; boundary="_084b0e56-8720-4161-9d87-7ab282dd5e53_"
From: Bernard Aboba <bernard_aboba@hotmail.com>
To: Harald Alvestrand <harald@alvestrand.no>, "rtcweb@ietf.org" <rtcweb@ietf.org>
Date: Thu, 13 Jun 2013 12:47:42 -0700
Importance: Normal
In-Reply-To: <51B9C244.9050705@alvestrand.no>
References: <CA+9kkMDnjCNXGV0GU7x6gbbZMf4WiEuVvCRY8_Fix5tmdOB-Kg@mail.gmail.com>, <AD220324-EEE7-4800-8512-FD7BADA9EC34@oracle.com>, <CA+9kkMDY2Z_5_1uYJ1K_ZmrJB2a1-RE7V3aPqNHQg82DyagjCg@mail.gmail.com>, <2975A93F-44DA-4020-B4DE-42E7ED98C08F@oracle.com>, <CABkgnnXr+zUW5mUn1nGwz9nxtY29JT5Cz=_84DB_ZxbZGa-kBA@mail.gmail.com>, <9F33F40F6F2CD847824537F3C4E37DDF115C8A0F@MCHP04MSX.global-ad.net>, <B7D2D5A3-586A-4846-904D-D2D3E6882500@phonefromhere.com>, <51B9C244.9050705@alvestrand.no>
MIME-Version: 1.0
X-OriginalArrivalTime: 13 Jun 2013 19:47:43.0576 (UTC) FILETIME=[DEE7FD80:01CE686E]
Subject: Re: [rtcweb] No Interim on SDES at this juncture
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Jun 2013 19:47:49 -0000

Harald said: 

> The architectural/non-cost argument I see against decrypt/encrypt is 
> "the gateway wants to be able to disclaim the ability to look at the bits".

[BA] There are only a limited number of situations where it is possible to "disclaim the ability to look at the bits".  For example, a PSTN gateway, PBX connecting to a SIP trunk, a video compositor or an audio mixer need to access decrypted RTP packets in order to do their job.  What non-P2P scenarios are you imagining where that would be possible? 
 
> My impression from the performance numbers people have quoted is that 
> the CPU cost of decrypt/encrypt doesn't cost enough to be the 
> deal-breaker between "viable solution" and "not viable solution"; other 
> things weigh far more on capex/opex.
 
[BA] I believe it is correct to say that the CPU cost of SRTP encrypt/decrypt  is not the bottleneck in large membership conferences (a good MCU implementation running on a high-end multicore server is likely to saturate a 1 Gbps NIC before CPU utilization becomes a factor).  Given that, I don't see that EKT will actually have that much impact, compared with other decisions about the key exchange -  whether PFS is required, key establishment algorithms and key sizes, etc.  For example, see: 
http://nmav.gnutls.org/2011/12/price-to-pay-for-perfect-forward.html