Re: [rtcweb] SDP Security Descriptions (RFC 4568) and RTCWeb
Randell Jesup <randell-ietf@jesup.org> Fri, 26 April 2013 05:53 UTC
Return-Path: <randell-ietf@jesup.org>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 60A6E21F9080 for <rtcweb@ietfa.amsl.com>; Thu, 25 Apr 2013 22:53:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.166
X-Spam-Level:
X-Spam-Status: No, score=-2.166 tagged_above=-999 required=5 tests=[AWL=0.433, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yH5c8po5W1kH for <rtcweb@ietfa.amsl.com>; Thu, 25 Apr 2013 22:53:58 -0700 (PDT)
Received: from r2-chicago.webserversystems.com (r2-chicago.webserversystems.com [173.236.101.58]) by ietfa.amsl.com (Postfix) with ESMTP id 0758B21F8F4A for <rtcweb@ietf.org>; Thu, 25 Apr 2013 22:53:57 -0700 (PDT)
Received: from pool-98-111-140-34.phlapa.fios.verizon.net ([98.111.140.34]:4963 helo=[192.168.1.12]) by r2-chicago.webserversystems.com with esmtpsa (TLSv1:DHE-RSA-AES256-SHA:256) (Exim 4.80) (envelope-from <randell-ietf@jesup.org>) id 1UVbbZ-00094X-3p for rtcweb@ietf.org; Fri, 26 Apr 2013 00:53:57 -0500
Message-ID: <517A167A.9090105@jesup.org>
Date: Fri, 26 Apr 2013 01:54:02 -0400
From: Randell Jesup <randell-ietf@jesup.org>
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:17.0) Gecko/20130328 Thunderbird/17.0.5
MIME-Version: 1.0
To: rtcweb@ietf.org
References: <3FA2E46D-C98E-4FC0-9F1D-AD595A861CE1@iii.ca> <20130425202238.74EF321F96A5@ietfa.amsl.com> <AE1A6B5FD507DC4FB3C5166F3A05A48416281FDB@tk5ex14mbxc272.redmond.corp.microsoft.com> <5179BEEF.4000600@jesup.org> <517A0237.9030008@matthew.at>
In-Reply-To: <517A0237.9030008@matthew.at>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - r2-chicago.webserversystems.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - jesup.org
Subject: Re: [rtcweb] SDP Security Descriptions (RFC 4568) and RTCWeb
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 26 Apr 2013 05:53:59 -0000
On 4/26/2013 12:27 AM, Matthew Kaufman wrote: > On 4/25/2013 4:40 PM, Randell Jesup wrote: >> On 4/25/2013 4:27 PM, Matthew Kaufman (SKYPE) wrote: >>> I agree. The ability to set the cipher suite and keys from >>> JavaScript is critical for certain applications. SDES is the best >>> we'll get with SDP as the API. DTLS-SRTP-only would be unacceptably >>> limiting. >> >> So, the problems with SDES (discussed to a fare-the-well every 3 >> months for the last 1.75 years or more, so there's nothing really new >> here): >> >> It exposes security keys directly to the application (or takes them >> from there). Basically, you're back in "all your media is totally in >> trust to the application and website". The keys aren't even >> end-2-end encrypted or even authenticated. And even if you expose >> SDES bid-downs to the user, they don't know what they mean or how to >> process this information. > > This is true anyway, because even if we only allow DTLS-SRTP, we will > allow cases like (as an example) Google Hangouts... which will no > doubt be implemented by having the box in the middle be who you're > calling and doing the DTLS exchange with. And then yes, you're > trusting the application and website and its mixer with your media. No argument: if you're calling into a mixer, all bets are off (it's secure only until it gets the data to the server/mixer). And even person-to-person, without identity assertions it is MITM-able, though not completely undetectably - you can examine the IP addresses of the packet (and if you have identity assertions you have to check the identities, or have something to flag that there was a fingerprint/key change). > >> >> SDES basically means to me "secure against random WiFi sniffers at >> the coffeeshop", and little more than that. I realize carriers and >> others like SDES because they make certain uses and obligations easy >> for them to meet, and interop with legacy devices and systems easier >> (though many such legacy interop systems will perforce need gateways >> anyways, and those gateways can convert from DTLS-SRTP to SDES. > > They can, but gateways that do the ICE connectivity check only were > already an annoyance that makes interop harder than we'd like. Now > we're going to force those gateways to also do DTLS-SRTP and EKT? Is > the goal here to put up as many roadblocks as possible to RTCWEB > developers who want to access networks outside of the > browser-to-browser case? I agree it's inconvenient to have these requirements - I spent a bunch of brain cycles and some phone chats with Cullen trying to figure out a way to enable PSTN gateway calls to avoid needing to use ICE and avoid needing DTLS-SRTP, and failed. With DNSSec it's almost possible. > >> >> Yes, some gateway scenarios might be cheaper/easier with SDES, but I >> see the primary use-cases for WebRTC to be browser-to-browser, not >> browser-legacy. > > Just because the charter was mistakenly written that way doesn't mean > it is true. Think of all the C2B use cases, where the agents in the > call center probably won't be on browsers... and even if they are, > those browsers will be behind systems that do things like supervisor > monitoring and barge-in, audit recording, etc. I don't count that as legacy - or if it is, that's fine - the call can be confirmed secure to the company's gateway and the gateway can identify itself as the company. > >> Certainly some large organizations are built around the VoIP/net to >> legacy equipment/PSTN/PBX use-case, and certainly they would find >> SDES easier. > > And many upstarts in the space are leveraging the large legacy VoIP > and PSTN networks to give developers a reason to put their > RTCWEB-based services into their browser experiences, too. > >> >> But I think we need to weigh that against the longer term, and the >> interests of the users (not the providers) -- the users aren't >> generally at this table; the IETF is full of people who almost by >> definition work for the companies that provide data and services. >> (Not everyone, but most.) >> >> I realize there are some (many) who have >> business/organizational/political reasons to avoid end-2-end >> encryption. However, per IETF norms (RFC 2084) we should not be >> letting that decide this issue. >> >> >> It's tough to find a way to allow SDES in the "connect to a gateway >> that will decrypt anyways" case, while also avoid bid-down attacks on >> browser-browser communication. (and EKT has some of the same key >> control issues) >> >> We can say "we enforce DTLS-SRTP only for secure, authenticated" >> calls like ekr presented (with media tainting, etc) - but that mode >> isn't the default and really can't be/won't be for many users and >> applications, making it at best an obscure option for most people. An >> app (or browser chrome) could put a "renegotiate/re-encrypt NOW with >> only DTLS-SRTP" button up, but I doubt most apps would bother, and it >> might be a struggle to get all browsers to include such an option I >> suspect. And even that might/would be hard to convey to users. But >> maybe that's the best we can do. If so, it's a sad day we can't >> collectively figure out something better. >> > > We could do much better security-wise... If we really wanted nobody to > use this stuff. That's always the problem with strong security... It has to be unobtrusive-but-functional in the "normal" cases to get widely used. Green-field encryption can be fairly easily strong because of lack of needing to interop. -- Randell Jesup randell-ietf@jesup.org
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Matthew Kaufman (SKYPE)
- [rtcweb] SDP Security Descriptions (RFC 4568) and… Cullen Jennings
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Alan Johnston
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Bernard Aboba
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Bogineni, Kalyani
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Ejzak, Richard P (Richard)
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Igor Faynberg
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Martin Thomson
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Dan Wing
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Mandeep Singh
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Adam Roach
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Martin Thomson
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Eric Rescorla
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Ejzak, Richard P (Richard)
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Martin Thomson
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Eric Rescorla
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Randell Jesup
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Martin Thomson
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Randell Jesup
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Martin Thomson
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Dan Wing
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Dan Wing
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Eric Rescorla
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Matthew Kaufman
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Matthew Kaufman
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Matthew Kaufman
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Matthew Kaufman
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Matthew Kaufman
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Matthew Kaufman
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Harald Alvestrand
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Harald Alvestrand
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Randell Jesup
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Ted Hardie
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Hutton, Andrew
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Xavier Marjou
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Iñaki Baz Castillo
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Iñaki Baz Castillo
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Iñaki Baz Castillo
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Matthew Kaufman
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Matthew Kaufman
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Matthew Kaufman
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Matthew Kaufman
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Harald Alvestrand
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Matthew Kaufman
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Eric Rescorla
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Dan Wing
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Dan Wing
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Iñaki Baz Castillo
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Oscar Ohlsson
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Cullen Jennings
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Suhas Nandakumar
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Iñaki Baz Castillo
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Alan Johnston
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Roman Shpount
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… DRUTA, DAN
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Iñaki Baz Castillo
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Roman Shpount
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Cullen Jennings (fluffy)
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Cullen Jennings
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Cullen Jennings
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Roman Shpount
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Martin Thomson
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Eric Rescorla
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Salvatore Loreto
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Christer Holmberg
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Bernard Aboba
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Iñaki Baz Castillo
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Markus.Isomaki
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Binod
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Harald Alvestrand
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Emil Ivov
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Iñaki Baz Castillo
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Christer Holmberg
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Ejzak, Richard P (Richard)
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Ted Hardie
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Dan Wing
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Salvatore Loreto
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Iñaki Baz Castillo
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Ejzak, Richard P (Richard)
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Dan Wing
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Iñaki Baz Castillo
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Dan Wing
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Iñaki Baz Castillo
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Martin Thomson
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Eric Rescorla
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Ejzak, Richard P (Richard)
- [rtcweb] Network times … was SDP Security Descrip… Cullen Jennings (fluffy)
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] Network times . was SDP Security Des… Tim Panton
- Re: [rtcweb] Network times . was SDP Security Des… Roy, Radhika R CIV USARMY (US)
- Re: [rtcweb] Network times . was SDP Security Des… Cullen Jennings (fluffy)
- Re: [rtcweb] Network times . was SDP Security Des… Justin Uberti
- Re: [rtcweb] Network times . was SDP Security Des… Michael Tuexen
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] Network times . was SDP Security Des… Randell Jesup
- Re: [rtcweb] Network times . was SDP Security Des… Randell Jesup
- Re: [rtcweb] Network times . was SDP Security Des… Roy, Radhika R CIV USARMY (US)
- Re: [rtcweb] Network times . was SDP Security Des… Justin Uberti
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] Network times . was SDP Security Des… Bo Burman
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] Network times . was SDP Security Des… Olle E. Johansson
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] Network times . was SDP Security Des… Daniel-Constantin Mierla
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] Network times . was SDP Security Des… Harald Alvestrand
- Re: [rtcweb] Network times . was SDP Security Des… Eric Rescorla
- Re: [rtcweb] Network times . was SDP Security Des… Daniel-Constantin Mierla
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] Network times . was SDP Security Des… Dan Wing
- Re: [rtcweb] Network times . was SDP Security Des… Cullen Jennings
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Harald Alvestrand
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Bernard Aboba
- Re: [rtcweb] Network times . was SDP Security Des… Justin Uberti
- Re: [rtcweb] Network times . was SDP Security Des… Karl Stahl
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Henry Lum
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Dan Wing
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Henry Lum
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Dan Wing
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Henry Lum
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Dan Wing
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Martin Thomson
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Tim Panton
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Cullen Jennings
- Re: [rtcweb] SDP Security Descriptions (RFC 4568)… Dan Wing