Re: [rtcweb] SDP Security Descriptions (RFC 4568) and RTCWeb

Dan Wing <dwing@cisco.com> Fri, 26 April 2013 13:53 UTC

Return-Path: <dwing@cisco.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29EBA21F9727 for <rtcweb@ietfa.amsl.com>; Fri, 26 Apr 2013 06:53:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.166
X-Spam-Level:
X-Spam-Status: No, score=-110.166 tagged_above=-999 required=5 tests=[AWL=0.433, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iGgu+L4-VA1b for <rtcweb@ietfa.amsl.com>; Fri, 26 Apr 2013 06:53:16 -0700 (PDT)
Received: from mtv-iport-2.cisco.com (mtv-iport-2.cisco.com [173.36.130.13]) by ietfa.amsl.com (Postfix) with ESMTP id 9821521F9937 for <rtcweb@ietf.org>; Fri, 26 Apr 2013 06:53:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1219; q=dns/txt; s=iport; t=1366984391; x=1368193991; h=mime-version:subject:from:in-reply-to:date:cc: content-transfer-encoding:message-id:references:to; bh=qb1f6BSqVaL6gxeLeZk6OFYLO1eQqmrKmja3/gWx97c=; b=Aidn4hgBff3vQKjlGj+z3EuAFUgOHScyCKHgfFeKX06qbxN1fGAdryMl 019XyJsE+k2KLPqG/R/urL4M4DnFk3PxK6bUjaX4Qx9K5A18WyxlSM1/C 52NsdKZPYrjtKqi2STTeJdz46ZeX6cqaYqJb5Og2+ccO0T2HMcQsxRooh g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AjsFALaFelGrRDoH/2dsb2JhbABRgwc3vjqBAxZ0gh8BAQEDAXkQCxguVwYTGQKHcwW/D45fMweCbWEDiRKOC4YSixeDLhw
X-IronPort-AV: E=Sophos;i="4.87,558,1363132800"; d="scan'208";a="79691353"
Received: from mtv-core-2.cisco.com ([171.68.58.7]) by mtv-iport-2.cisco.com with ESMTP; 26 Apr 2013 13:53:09 +0000
Received: from [10.32.240.196] ([10.32.240.196]) by mtv-core-2.cisco.com (8.14.5/8.14.5) with ESMTP id r3QDr8pS010730; Fri, 26 Apr 2013 13:53:08 GMT
Content-Type: text/plain; charset="iso-8859-1"
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
From: Dan Wing <dwing@cisco.com>
In-Reply-To: <41A36FC7-9F29-45E6-8B98-4B3AB51094CD@phonefromhere.com>
Date: Fri, 26 Apr 2013 06:53:08 -0700
Content-Transfer-Encoding: quoted-printable
Message-Id: <8C20A9D9-F696-4658-84C6-407C1F37B948@cisco.com>
References: <3FA2E46D-C98E-4FC0-9F1D-AD595A861CE1@iii.ca> <74300615-2293-4DCE-82A7-475F1A5A8256@gmail.com> <91B4F744-2201-4361-A8D8-7D36F47B865C@cisco.com> <CALiegfnqW26gEMYNpjJyzu=Nd6z9wCjvZbuY1N2tYvbfQiHyPA@mail.gmail.com> <95219856-8365-4A7E-BD0B-4EECE8868498@phonefromhere.com> <517A7FF3.9050702@matthew.at> <41A36FC7-9F29-45E6-8B98-4B3AB51094CD@phonefromhere.com>
To: Tim Panton <tim@phonefromhere.com>
X-Mailer: Apple Mail (2.1503)
Cc: rtcweb@ietf.org
Subject: Re: [rtcweb] SDP Security Descriptions (RFC 4568) and RTCWeb
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Apr 2013 13:53:20 -0000

On Apr 26, 2013, at 6:29 AM, Tim Panton <tim@phonefromhere.com> wrote:

> 
> On 26 Apr 2013, at 14:24, Matthew Kaufman wrote:
> 
>> On 4/26/2013 6:16 AM, Tim Panton wrote:
>>> 
>>> On 26 Apr 2013, at 12:37, Iñaki Baz Castillo wrote:
>>> 
>>>> Such a solution requires a very expensive gateway. Good for vendors but bad for all the rest.
>>>> 
>>> 
>>> I don't understand why the DTLS gateway would be so expensive. It is _exactly_ the same
>>> (conceptually) as the ICE processing - you filter off a few UDP packets from the stream, do some
>>> stuff, send replies then once you are happy you punt some dynamic settings back up to the (s)rtp
>>> layer.
>>> 
>> 
>> The CPU-seconds of cryptography required are markedly different, especially on low-end processors used by some of the distributed gateway solutions.
> 
> True, but only at call set-up time, not for the life of the call. I'd want to see numbers on this before we select to adopt even 
> more complexity for the sake of a theoretical legacy interop requirement.

Right - only at call setup and only when keys change.  The SRTP packets themselves are not decrypted/encrypted.

-d