Re: [rtcweb] New use-case proposed

"Henry Lum" <> Fri, 11 May 2012 17:26 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 1EE0C21F86BD for <>; Fri, 11 May 2012 10:26:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -2.165
X-Spam-Status: No, score=-2.165 tagged_above=-999 required=5 tests=[AWL=0.433, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id dHvlsuLcIBTo for <>; Fri, 11 May 2012 10:26:57 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id 786C321F86A0 for <>; Fri, 11 May 2012 10:26:57 -0700 (PDT)
Received: from ( []) by (8.13.8+Sun/8.13.8) with ESMTP id q4BHQpj6009895; Fri, 11 May 2012 10:26:51 -0700 (PDT)
Received: from ([]) by with Microsoft SMTPSVC(6.0.3790.4675); Fri, 11 May 2012 10:26:51 -0700
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----_=_NextPart_001_01CD2F9B.409B1582"
Date: Fri, 11 May 2012 10:26:30 -0700
Message-ID: <>
In-Reply-To: <>
Thread-Topic: [rtcweb] New use-case proposed
Thread-Index: Ac0vktJlEshr9v/oTQmFzvYLBTcEywAB5w9A
References: <><> <>
From: "Henry Lum" <>
To: "Roman Shpount" <>, "Harald Alvestrand" <>
X-OriginalArrivalTime: 11 May 2012 17:26:51.0813 (UTC) FILETIME=[40DACD50:01CD2F9B]
Subject: Re: [rtcweb] New use-case proposed
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 11 May 2012 17:26:58 -0000

I agree as well since based on our testing for a simple media bridge
that SRTP re-encryption adds a similar amount of CPU load (around 10%). 




From: [] On Behalf
Of Roman Shpount
Sent: May-11-12 12:26 PM
To: Harald Alvestrand
Subject: Re: [rtcweb] New use-case proposed



I have provided the CPU requirements for doing SRTP re-encryption
before. Bottom line, on the real conferencing service encryption adds
about 10% extra CPU load. There is no benefit in compromising security
to avoid re-encrypting.
Roman Shpount

On Fri, May 11, 2012 at 12:21 PM, Harald Alvestrand
<> wrote:

I propose to reject this use case because it requires yet another
security redesign.
The clue is here:

- The keying solution must allow each participants to encrypt to
multiple receivers without any decryption+encryption in the middle node

This means that each participant must use the same encryption keys to
all other participants; this in turn means that when someone leaves the
group, all participants must change their encryption keys; it also means
that as long as shared keys are used for authentication, all
participants can impersonate all other participants.

In fact, this solution has most of the issues (except for the network
layer deployment issue) that leads me to strongly advocate leaving
multicast out of scope for this effort.


rtcweb mailing list