Re: [rtcweb] Security Architecture: IdP for RTP and RTCP

Martin Thomson <martin.thomson@gmail.com> Fri, 11 July 2014 17:56 UTC

Return-Path: <martin.thomson@gmail.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 545B31B2C82 for <rtcweb@ietfa.amsl.com>; Fri, 11 Jul 2014 10:56:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.4
X-Spam-Level:
X-Spam-Status: No, score=-1.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, J_CHICKENPOX_111=0.6, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0ysX5aJ9TIph for <rtcweb@ietfa.amsl.com>; Fri, 11 Jul 2014 10:56:48 -0700 (PDT)
Received: from mail-wg0-x230.google.com (mail-wg0-x230.google.com [IPv6:2a00:1450:400c:c00::230]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE1BE1B2C7A for <rtcweb@ietf.org>; Fri, 11 Jul 2014 10:56:47 -0700 (PDT)
Received: by mail-wg0-f48.google.com with SMTP id x13so1465007wgg.7 for <rtcweb@ietf.org>; Fri, 11 Jul 2014 10:56:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=RsdhWGEelJM6MLvxsrnB/KdVWyitEhLo9ULlGT2jasw=; b=Aimnn8nsXVU0/S5wqOv3U5aFsQyT+owuQUYz6/Z8H7Z5VVXpMd0PXWK9R1hQfx2Dlz BY6DDHjgP/93wgJt4JzXCRIY+bTisR8a4Ti+EmbFEtr+uCgzwRMnmIDe65WToxwzWjpl 3Q6yRKs/ftYditz3s7oslJGuMmKSwHQJoTikU8t4k8IR84ftkg5LSdy3YA1qNbOLKYiX wwbZTJ5spQ4lTY8S2w7yDdtw403eLt9fCDSGnsiVxcFoj3SKnNq9z9eB+csN+7G/7Alu JaD6URwjTtGzYAu+7A+fI2Es+xBpHx/Z2zVQD6FrRxddywdAGsO7bz2Q7l4TSExNmHyu F4mQ==
MIME-Version: 1.0
X-Received: by 10.180.37.230 with SMTP id b6mr6760273wik.47.1405101404123; Fri, 11 Jul 2014 10:56:44 -0700 (PDT)
Received: by 10.194.110.6 with HTTP; Fri, 11 Jul 2014 10:56:44 -0700 (PDT)
In-Reply-To: <CAOJ7v-0iDjSFuDY=c_1vXApRWo66pXe_Hra=SnhWRKca-xBCSA@mail.gmail.com>
References: <CAOW+2dsVZj56aVL5+79d6RSTZFLwjfWdm=rs7FPnvdWQZHAdfA@mail.gmail.com> <CABkgnnUEXCuOcG_p5BpZf8Wz2Y-Pq92XGpmEb5304-uTz9JNuA@mail.gmail.com> <CAOJ7v-0iDjSFuDY=c_1vXApRWo66pXe_Hra=SnhWRKca-xBCSA@mail.gmail.com>
Date: Fri, 11 Jul 2014 10:56:44 -0700
Message-ID: <CABkgnnUd85TAzhUkDgDDSQ5J8KsT4RNCE62TZm0O64tg-Kvj=w@mail.gmail.com>
From: Martin Thomson <martin.thomson@gmail.com>
To: Justin Uberti <juberti@google.com>
Content-Type: text/plain; charset="UTF-8"
Archived-At: http://mailarchive.ietf.org/arch/msg/rtcweb/VUZIdRsVeALj945z9TM1wNRF1XI
Cc: "rtcweb@ietf.org" <rtcweb@ietf.org>
Subject: Re: [rtcweb] Security Architecture: IdP for RTP and RTCP
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Jul 2014 17:56:49 -0000

On 11 July 2014 09:03, Justin Uberti <juberti@google.com> wrote:
> Different m= lines can have different fingerprints, but do we expect to
> support multiple fingerprints with the same digest algorithm on the same m=
> line, where the receiver then checks that the received certificate matches
> one of the possible fingerprints?

That's what the spec says to do.  That's how Firefox currently
operates.  It's not particularly hard to do.

To be precise, it assembles all relevant a=fingerprint attributes for
the m= section and allows the session to proceed if all sections have
one match, using the provided hash function.  I think that we provide
SHA-256, but support the full intersection of the textual names
registry and what is implemented and enabled (i.e., sha1 is OK).

I don't think that we require that the hash function match the
function used in the certificate signature; that's a nonsensical
requirement.