Re: [rtcweb] Mandating encryption of RTP header extensions for MID and RID SDES items

Christer Holmberg <christer.holmberg@ericsson.com> Thu, 20 October 2016 19:56 UTC

Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0394129417 for <rtcweb@ietfa.amsl.com>; Thu, 20 Oct 2016 12:56:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VI-ak5PiteUV for <rtcweb@ietfa.amsl.com>; Thu, 20 Oct 2016 12:56:55 -0700 (PDT)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E95FC129423 for <rtcweb@ietf.org>; Thu, 20 Oct 2016 12:56:54 -0700 (PDT)
X-AuditID: c1b4fb3a-e95069800000099a-1b-580921853c65
Received: from ESESSHC006.ericsson.se (Unknown_Domain [153.88.183.36]) by (Symantec Mail Security) with SMTP id 9C.E4.02458.48129085; Thu, 20 Oct 2016 21:56:53 +0200 (CEST)
Received: from ESESSMB209.ericsson.se ([169.254.9.90]) by ESESSHC006.ericsson.se ([153.88.183.36]) with mapi id 14.03.0319.002; Thu, 20 Oct 2016 21:56:51 +0200
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Magnus Westerlund <magnus.westerlund@ericsson.com>, "Cullen Jennings (fluffy)" <fluffy@cisco.com>
Thread-Topic: [rtcweb] Mandating encryption of RTP header extensions for MID and RID SDES items
Thread-Index: AQHSH9lMExaUQsC7kESlGYxjwYhpQqCmmXwAgADuiACAAE7CgIAEbfAAgAWTWCA=
Date: Thu, 20 Oct 2016 19:56:51 +0000
Message-ID: <7594FB04B1934943A5C02806D1A2204B4BDC0CF2@ESESSMB209.ericsson.se>
References: <e536bad2-08b1-4f77-8c75-6bc3b639c398@ericsson.com> <998B7677-E967-45B0-8FE5-FD71930C380F@cisco.com> <dca597f3-e23a-3dc6-f0e0-5c588729d7e1@ericsson.com> <3C0E8E83-3623-4D5C-A093-B26981F13477@cisco.com> <9d7c976f-ad3c-4731-1447-c2eaa934d711@ericsson.com>
In-Reply-To: <9d7c976f-ad3c-4731-1447-c2eaa934d711@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [153.88.183.149]
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrNLMWRmVeSWpSXmKPExsUyM2K7im6rImeEwbLN4hYdk9ks1v5rZ3dg 8pjyeyOrx5IlP5kCmKK4bFJSczLLUov07RK4Mj5NbGYsmGVYMfHhFLYGxuPqXYycHBICJhKX Xy9hB7GFBNYzSiw8It7FyAVkL2aU2PDxNVMXIwcHm4CFRPc/bZAaEYF0idnfLjGD2MwCihJf ls9nA7GFBRIkds2bzAJRkyjRfLuPGcL2k1i98QDYfBYBVYmOaWcZQWxeAV+JVX2HmSF2TWSS eNB9igkkwSngIDHr/Ecwm1FATOL7qTVMEMvEJW49mc8EcbSAxJI955khbFGJl4//sULYShJr D29ngajXk7gxdQobhK0tsWzha2aIxYISJ2c+YZnAKDoLydhZSFpmIWmZhaRlASPLKkbR4tTi 4tx0IyO91KLM5OLi/Dy9vNSSTYzAKDm45bfVDsaDzx0PMQpwMCrx8D54wx4hxJpYVlyZe4hR goNZSYR3sTxnhBBvSmJlVWpRfnxRaU5q8SFGaQ4WJXFes5X3w4UE0hNLUrNTUwtSi2CyTByc Ug2MqffrzXtZJuzP7uTPn+X49cmp91fDX02+6zm34QJfdK7RkuxiYbYjdREPW0we/fDlnnkr 4tjFv2vV7sUuuma5tq3z+5mF3utPb17ZWDZnQ/SKhAWbj7OdWnJd1n/RH5XiItaUw0ddVpTe ehFVdGfpFhNbbTVzs67dvbMavOXs7Fc5WzzTXF12VImlOCPRUIu5qDgRAIZU4AOOAgAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtcweb/GwdWkfHnse8q6-t0nZMrfBr7pKU>
Cc: RTCWeb IETF <rtcweb@ietf.org>
Subject: Re: [rtcweb] Mandating encryption of RTP header extensions for MID and RID SDES items
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Oct 2016 19:56:58 -0000

Hi,

I'd like some guidance on how to move forward and try to solve this issue. I really don't want us to switch to another mechanism at this point.

Regards,

Christer

-----Original Message-----
From: rtcweb [mailto:rtcweb-bounces@ietf.org] On Behalf Of Magnus Westerlund
Sent: 17 October 2016 11:47
To: Cullen Jennings (fluffy) <fluffy@cisco.com>
Cc: RTCWeb IETF <rtcweb@ietf.org>
Subject: Re: [rtcweb] Mandating encryption of RTP header extensions for MID and RID SDES items

Den 2016-10-14 kl. 15:08, skrev Cullen Jennings (fluffy):
>
>> On Oct 14, 2016, at 2:26 AM, Magnus Westerlund 
>> <magnus.westerlund@ericsson.com> wrote:
>>
>> Den 2016-10-13 kl. 20:12, skrev Cullen Jennings (fluffy):
>>>
>>> I think this is huge complexity that is not currently supported and 
>>> not needed. How about we generate the RID such that the RID for the 
>>> n'th m line is n. Or generate it as a random number. Do you see any 
>>> problem with this?
>>>
>>> I think this removes all the fingerprinting issues. I'm fine with 
>>> advice that say how to generate the RID in a way that is privacy 
>>> sensitive but I'm not a fan of making RID require support for RTP 
>>> header encryption.
>>>
>>
>> So, let disregard the fingerprinting issue for now. It is clear that 
>> I am in the rough and that this whole issue would benefit from a 
>> broad review on what we leak when using ICE and RTP/RTCP.
>
> That broad review was largely done as part of PERC.
>

I do not agree that review happened in that context. I can't remember that we discussed fingerprinting at all. We quickly put any effort of privacy in regards to that the communication occurs out of scope. All the focus in PERC is to my understanding on maintaining confidentiality of the media content as well as preventing third party injection, modifications (other than sub selection of content)  and replay attacks.



>>
>> What I don't understand here is that people have argued and agreed 
>> that we should encrypt the RTP and RTCP packets per default. Then 
>> when we comes to RTP header extensions we are no longer ready to 
>> provide that protection per default by ensuring RFC6904 
>> implementation support. So RID and MID may not be the most sensitive 
>> fields if it has well constructed values. Then we have the audio 
>> level extensions where Client to mixer is RECOMMENDED to be 
>> implemented and REQUIRES RFC6904.
>
> So the audio levels are recommended in WebRTC but this MID stuff is a 
> very generic mechanism that will like be broadly used to deal with RTP 
> lack of extensibility of size PT space. Lot of stuff does not 
> implement audio levels and some stuff that implements it does not 
> encrypt it. The 6904 mechanism is not exactly elegant, not easy to 
> implement, and doubles the size the headers which is not great for 
> audio. I think it is fair to say we might do it differently if doing 
> it over again.
>

I think Jonathan had an excellent reply on this.

>>
>> So what is the issue, is it that you currently lack RFC6904 
>> implementations, and thus this require more implementation work, or 
>> are there additional reasons for wanting to expose this information?
>
> Yes this adds needless security complexity that people don't see the 
> value in thus it becomes difficult to convince implementors to do it.
>
>>
>> To conclude, I personally think default usage of RFC6904 on header 
>> extensions would be a good thing. I currently see no reasons for 
>> changing the requirements that RFC 7941 puts on WebRTC, forcing the 
>> usage of RFC6904 encryption. If you want to something else, please 
>> provide a proposal for what that alternative would be.
>
> Originally MID was not a SDES items, I'd propose just moving it back 
> to a normal RTP Header. In looking at trying to use this in 
> deployments, it's hard to see what value transporting it in RTCP as 
> well as RTP provided.  When that was originally proposed, I don't 
> think anyone realized that mean encrypting it and did not really care 
> if it was normal or SDES as it was about the same work. But if SDES 
> means it needs to be encrypted, then I think we need to reconsider 
> that.
>

So, I think moving away from SDES item is a bad idea. As that would create additional implementation burden, rather than having the same processing for a number of SDES items of similar type. RID, MID and CNAME all need similar processing for initial startup handling. So moving RID out, while still having the other two just creates an additional cases to implement.

When it comes to RTCP inclusion of these SDES items I know of two reasons.

Reason one, is that one can actually use RTCP to send these for an SSRC prior to having RTP data to send for it. That enables one to have the association in place prior to actually having to handle media data.

Reason two is the saftey net RTCP provides. It enables a receiver to detect if its state is out of sync. Yes, this could be realized using periodic repeats in the RTP header extension also. However, that doesn't work if the SSRC currently don't have any data to send.

Considering the state that draft-ietf-avtext-rid is in. Deciding to change it to not be an SDES item is going be an equal if not greater hassle to actually pull it back to the WG to include a beef up of the security consdieration with an motivation why the rules in RFC7941 do not apply to it. Assuming that is what the consensus ends up being.

Cheers

Magnus Westerlund

----------------------------------------------------------------------
Services, Media and Network features, Ericsson Research EAB/TXM
----------------------------------------------------------------------
Ericsson AB                 | Phone  +46 10 7148287
Färögatan 6                 | Mobile +46 73 0949079
SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com
----------------------------------------------------------------------

_______________________________________________
rtcweb mailing list
rtcweb@ietf.org
https://www.ietf.org/mailman/listinfo/rtcweb