Re: [rtcweb] Consent alternative

"Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com> Thu, 23 January 2014 08:55 UTC

Return-Path: <tireddy@cisco.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F7E71A033D for <rtcweb@ietfa.amsl.com>; Thu, 23 Jan 2014 00:55:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.036
X-Spam-Level:
X-Spam-Status: No, score=-15.036 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.535, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WJIhSf2QOg4O for <rtcweb@ietfa.amsl.com>; Thu, 23 Jan 2014 00:55:19 -0800 (PST)
Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) by ietfa.amsl.com (Postfix) with ESMTP id DBE271A02DF for <rtcweb@ietf.org>; Thu, 23 Jan 2014 00:55:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1208; q=dns/txt; s=iport; t=1390467318; x=1391676918; h=from:to:cc:subject:date:message-id: content-transfer-encoding:mime-version; bh=ao3/huNdAWdEmSgiffBhVsjTKqSP6VTOewBgHBZ4iG0=; b=fbxkdOCKcNe7Blr/PiZRZBGYXRydcvAIZgzbZ/ZmnPjiFtfiC72cFEGh oqkNe3bP70SFxb1xdmreEwYhC3coCB6k2QO7862oud1QfP9Y1mA8z7Sru Yo4SmHoKKzSx2vZowVT7uiJc9/DONZeSR7lYFK44iBFvv9B4f+vyEGJX6 Q=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AgkFAMLX4FKtJV2c/2dsb2JhbABbgwyBDoJ+uHQYdxZ0giUBAQEEIxFFDAYBCBEEAQEBAgIGDg8DAgQfERQBCAkBBA4FCIdpAxGof5Y+DYVWF4Epiz+BYzENEoJXNYEUAQOWNo5JhTuDLYIq
X-IronPort-AV: E=Sophos;i="4.95,705,1384300800"; d="scan'208";a="299242258"
Received: from rcdn-core-5.cisco.com ([173.37.93.156]) by rcdn-iport-4.cisco.com with ESMTP; 23 Jan 2014 08:55:17 +0000
Received: from xhc-aln-x01.cisco.com (xhc-aln-x01.cisco.com [173.36.12.75]) by rcdn-core-5.cisco.com (8.14.5/8.14.5) with ESMTP id s0N8tH5p024165 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 23 Jan 2014 08:55:17 GMT
Received: from xmb-rcd-x10.cisco.com ([169.254.15.227]) by xhc-aln-x01.cisco.com ([173.36.12.75]) with mapi id 14.03.0123.003; Thu, 23 Jan 2014 02:55:16 -0600
From: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
To: Martin Thomson <martin.thomson@gmail.com>
Thread-Topic: [rtcweb] Consent alternative
Thread-Index: Ac8YGNNvQEj6UNaRTY2EX96oDrnrWQ==
Date: Thu, 23 Jan 2014 08:55:16 +0000
Message-ID: <913383AAA69FF945B8F946018B75898A2428FEA5@xmb-rcd-x10.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.65.75.9]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Cc: "Cullen Jennings (fluffy)" <fluffy@cisco.com>, "rtcweb@ietf.org" <rtcweb@ietf.org>
Subject: Re: [rtcweb] Consent alternative
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Jan 2014 08:55:20 -0000

> -----Original Message-----
> From: Martin Thomson [mailto:martin.thomson@gmail.com]
> Sent: Thursday, January 23, 2014 9:43 AM
> To: Tirumaleswar Reddy (tireddy)
> Cc: Muthu Arul Mozhi Perumal (mperumal); Cullen Jennings (fluffy);
> rtcweb@ietf.org
> Subject: Re: [rtcweb] Consent alternative
> 
> On 22 January 2014 18:01, Tirumaleswar Reddy (tireddy)
> <tireddy@cisco.com> wrote:
> > I am still referring to off-path attacker only who can sniff packets and spoof
> IP address but cannot modify or consume packets.
> 
> How exactly is this attacker able to generate a valid heartbeat ?

In the example attack you had mentioned, Attacker B knows both the master secret and STUN short-term username/password. It will sniff the heartbeat request sent by A, spoof IP address of C and send valid heartbeat response. Same problem exists with STUN consent. 

-Tiru.