Re: [rtcweb] Encryption mandate

Michael Procter <michael@voip.co.uk> Thu, 08 September 2011 09:32 UTC

Return-Path: <michael@voip.co.uk>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7142021F8677 for <rtcweb@ietfa.amsl.com>; Thu, 8 Sep 2011 02:32:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.977
X-Spam-Level:
X-Spam-Status: No, score=-5.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DYpoG67I6ksU for <rtcweb@ietfa.amsl.com>; Thu, 8 Sep 2011 02:32:13 -0700 (PDT)
Received: from na3sys009aog111.obsmtp.com (na3sys009aog111.obsmtp.com [74.125.149.205]) by ietfa.amsl.com (Postfix) with SMTP id 96C4121F84EC for <rtcweb@ietf.org>; Thu, 8 Sep 2011 02:32:13 -0700 (PDT)
Received: from mail-vx0-f172.google.com ([209.85.220.172]) (using TLSv1) by na3sys009aob111.postini.com ([74.125.148.12]) with SMTP ID DSNKTmiMAnpDb4yON9VugmkvLmE+wESRZMPG@postini.com; Thu, 08 Sep 2011 02:34:05 PDT
Received: by mail-vx0-f172.google.com with SMTP id 29so555694vxi.31 for <rtcweb@ietf.org>; Thu, 08 Sep 2011 02:33:54 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.52.23.76 with SMTP id k12mr458657vdf.225.1315474434628; Thu, 08 Sep 2011 02:33:54 -0700 (PDT)
Received: by 10.220.153.79 with HTTP; Thu, 8 Sep 2011 02:33:54 -0700 (PDT)
In-Reply-To: <95877BC0-B0AA-4B20-9C2E-C16076BBE96E@edvina.net>
References: <A444A0F8084434499206E78C106220CA0B00FDB08B@MCHP058A.global-ad.net> <89177AB2-F721-47E4-8471-2180EDA10615@voxeo.com> <A444A0F8084434499206E78C106220CA0B00FDB34D@MCHP058A.global-ad.net> <496EE152-41F2-49AB-A136-05735FE5A9F9@voxeo.com> <101C6067BEC68246B0C3F6843BCCC1E31018BF6BE2@MCHP058A.global-ad.net> <4E540FE2.7020605@alcatel-lucent.com> <2E239D6FCD033C4BAF15F386A979BF5106423F@sonusinmail02.sonusnet.com> <4E6595E7.7060503@skype.net> <4E661C83.5000103@alcatel-lucent.com> <2E239D6FCD033C4BAF15F386A979BF510F086B@sonusinmail02.sonusnet.com> <4E666926.8050705@skype.net> <43A0D702-1D1F-4B4E-B8E6-C9F1A06E3F8A@edvina.net> <033458F56EC2A64E8D2D7B759FA3E7E7020E64DC@sonusmail04.sonusnet.com> <E4EC1B17-0CC4-4F79-96DD-84E589FCC4F0@edvina.net> <4E67C3F7.7020304@jesup.org> <4E67D1F4.10002@mozilla.com> <4E6808D5.7090709@alum.mit.edu> <95877BC0-B0AA-4B20-9C2E-C16076BBE96E@edvina.net>
Date: Thu, 08 Sep 2011 10:33:54 +0100
Message-ID: <CAPms+wSy3b_M97BuvE9wn+hJRVDZA-qJ4XRPTQtdnScPxWpp8w@mail.gmail.com>
From: Michael Procter <michael@voip.co.uk>
To: "Olle E. Johansson" <oej@edvina.net>, Paul Kyzivat <pkyzivat@alum.mit.edu>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: rtcweb@ietf.org
Subject: Re: [rtcweb] Encryption mandate
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Sep 2011 09:32:14 -0000

Paul, Olle,

Both of you correctly point out that determining when a session is
secure is a very hard problem - one that is nigh-on impossible except
for certain restricted scenarios.  But I think we may have missed the
change of emphasis in Chris' proposed UI change.  Instead of marking a
session as secure (which is hard to determine), he is suggesting
marking it as insecure (which is easier!).

If the signalling and media entering and leaving the browser are not
secured by an appropriate mechanism, then the session should be marked
as 'insecure'.  If they are secured, then Chris' proposal would have
no indication on the browser, which intuitively seems to match what we
know about the session - secure to the server but 'who knows' after
that.  Whether that is good enough for you will depend on whether you
trust the service you are using.

Michael

On 8 September 2011 06:48, Olle E. Johansson <oej@edvina.net> wrote:
>
> 8 sep 2011 kl. 02:14 skrev Paul Kyzivat:
>>
>> Chris,
>>
>> I agree with you that the UI indication of security is important.
>> But its also *hard* for this application, for a variety of reasons:
>>
>> - While it may be easy for the browser to know if the media stream
>>  is itself secured, its hard (impossible) to know that its secured
>>  to its ultimate end point. That is the problem with intermediaries.
>>
>> - it may turn out that not all the streams in the "call" have the
>>  same degree of security.
>>
>> Of course this can all be dealt with via proper definition of what the UI
>> indication means, and doesn't mean. But doing that will just render it
>> meaningless to many users. To be widely understood, the indication will need
>> to be simple, and closely aligned with what people "expect".
>>
>> Consider a stream that is secured to a PSTN gateway, and then travels over
>> the PSTN to somebody's phone. Should that be considered a "secure" call? Or
>> an "insecure" call? Or somewhere between those?
>>
>> Its going to be hard work to figure out what can both be reliably reported
>> to users and also be understandable and meaningful to users.
>>
> Agree. I see your way of thinking as an argument to make all sessions
> confidential, encrypted by default. We can't reliable define a "secure call"
> and separate insecure sessions from secure sessions. Which mean that a UI
> indication won't mean anything. We can just make sure that the first hop is
> protected, the rest is up to the application that operates the media
> session.
> /O


> On 9/7/11 4:20 PM, Christopher Blizzard wrote:
>
> I want secure-by-default, maybe even secure-only.
> Even if it's not secure-only there's also an important UI consideration
> depending how we end up doing that in browsers. In the past we've made
> the secure mode special (the lock icon in the early days, now the
> green/blue bar) but I think that we should be making the insecure mode
> special. That is, always mark a connection as very clearly unencrypted
> via UI affordances. Just like banks "wanting to know how to get the lock
> icon" we should be making call sites "wanting to know how to get rid of
> that huge ugly warning that makes us look bad."
>
> Once again, I would much prefer secure-only, but I'll take
> secure-by-default across browsers if I can get it.
>
> --Chris