Re: [rtcweb] SRTP not mandatory-to-use

Ted Hardie <ted.ietf@gmail.com> Thu, 05 January 2012 17:12 UTC

Return-Path: <ted.ietf@gmail.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFBFF21F868D for <rtcweb@ietfa.amsl.com>; Thu, 5 Jan 2012 09:12:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.2
X-Spam-Level:
X-Spam-Status: No, score=-3.2 tagged_above=-999 required=5 tests=[AWL=0.084, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, SARE_MILLIONSOF=0.315]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pTjDPqf93f6G for <rtcweb@ietfa.amsl.com>; Thu, 5 Jan 2012 09:12:24 -0800 (PST)
Received: from mail-yx0-f172.google.com (mail-yx0-f172.google.com [209.85.213.172]) by ietfa.amsl.com (Postfix) with ESMTP id A40D121F85B0 for <rtcweb@ietf.org>; Thu, 5 Jan 2012 09:12:24 -0800 (PST)
Received: by yenm7 with SMTP id m7so309369yen.31 for <rtcweb@ietf.org>; Thu, 05 Jan 2012 09:12:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=LTNSks7g4LlwCbk9+UAa1HO3kyMxfWWuuiXO4UJtit4=; b=uOgYbhe2ik55nKWyrV7nDuV9kuXWqVbjWcrgnjEzbkaT2f2s3gIH9BHLkOWrigGpgs 3iJ1WpYGrSGPOmcLp7cU/dxs6Fj8E6kWoU09xTemqIbJ5SRrhhdKT8NQqexFGpNZR9lo +sBhGXHPheBbz4frJ1ZGOfasce5bUwBtLummU=
MIME-Version: 1.0
Received: by 10.236.139.193 with SMTP id c41mr2749145yhj.24.1325783542375; Thu, 05 Jan 2012 09:12:22 -0800 (PST)
Received: by 10.236.155.132 with HTTP; Thu, 5 Jan 2012 09:12:22 -0800 (PST)
In-Reply-To: <BLU152-W45A42F89F1A8A3B826DD1A93940@phx.gbl>
References: <CAErhfrwu322=HTS0JZhum9EGfb73KmYS6CU_KMESyzEWhtvg2w@mail.gmail.com> <CABcZeBOeg-O+6===5tk0haxC8nLxUQyEUFRES2FAoFEf00fKng@mail.gmail.com> <CAErhfrxTKdo7Z+61x5ZcDt5ZM7C7ob5LNxMzwng_kk3Uqrp2_Q@mail.gmail.com> <4F01A790.4060704@alvestrand.no> <4F02A061.60905@jesup.org> <E44893DD4E290745BB608EB23FDDB762141EF8@008-AM1MPN1-042.mgdnok.nokia.com> <4F035DD5.3050305@jesup.org> <CAOJ7v-1dziaA_ePCuMxjn6uhBgOH=ZVybUmLBwQi5qiuyOzDMA@mail.gmail.com> <BLU152-W469B2EB104C104547FC42393960@phx.gbl> <CAD5OKxuE0VhSsjKggj1mLOseLeDXarujvAG44yHkuZttagJggw@mail.gmail.com> <CAKhHsXHnT2p7yncha5-BQ=-Lzk3-N+tuijM-UqwfP1mPUi173A@mail.gmail.com> <BLU152-W1140980759D89AC3C1D0CA93940@phx.gbl> <CA+9kkMBdX7YT1tPj5M3VrzAPKa6tXNGZVvvhjW9V4oOEC7g_kA@mail.gmail.com> <CAOJ7v-1_qMoHBb3K7rV=hG9EadqL=xn4KEdG0zdWnKZU9_TipQ@mail.gmail.com> <BLU152-W45A42F89F1A8A3B826DD1A93940@phx.gbl>
Date: Thu, 05 Jan 2012 09:12:22 -0800
Message-ID: <CA+9kkMBG3yFoOoUecxr_QYjX-V1sQ+U8XFhFuMj3joKPgVLUuw@mail.gmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
To: Bernard Aboba <bernard_aboba@hotmail.com>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: quoted-printable
Cc: rtcweb@ietf.org
Subject: Re: [rtcweb] SRTP not mandatory-to-use
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Jan 2012 17:12:26 -0000

Hi Bernard,

The threading must have gotten mixed up here, because the responses
below are to me, not Justin.   Some further discussion in-line.

On Thu, Jan 5, 2012 at 12:03 AM, Bernard Aboba
<bernard_aboba@hotmail.com> wrote:
>
> Justin said:
>
>
> Are they easier or harder to deploy than SRTP?
>
> [BA] Having been involved in deployment of millions of SRTP endpoints, I
> wouldn't say SRTP is hard to deploy.  Virtually *all* the pain comes from
> key management.
>
> The same thing is true of IKE/IPsec by the way.  When people complain about
> IPsec, they almost always are talking about an IKE issue.
>
>

Thanks for the clarification.  But if we accept the current threat
model (untrusted JS, where we wish to avoid revealing the SRTP keys to
the application), I'm not sure that there is any way to avoid this
pain.


> Justin said:
>
> "If you could provide text for the use
> case/scenarios draft that illustrates one and explain why, that would
> be very useful in moving this discussion forward."
>
> [BA] It's not hard to come up with scenarios where SRTP might be fine, but
> DTLS/SRTP would be burdensome.
>
> PSTN gateways are a good example of that.  Some support SRTP today, and
> almost all of these do SDES.  If we
> insisted, we could probably get some vendors to support ICE too.  But asking
> for DTLS/SRTP (especially a variant
> different from the one implemented in SIP) is highly unlikely.
>

I agree that increasing the number of variants will be a pain for
gateway operators.   If there is something currently is deployed and
meets the threat model, I am sure that there would be interest.  But
shifting to something that reveals the keys to an untrusted part of
the system seems to be the wrong approach for solving the problem, at
least to me personally.



> Justin said:
>
> "Until then, I think the Danvers Doctrine pretty plainly pushes us to
> make SRTP mandatory to implement."
>
> [BA] No objection to mandating implementation here.  SRTP is implemented in
> sub-$100 devices, so it's no big deal.
>
>
> The key question is whether is whether it is:  always on; default on;
> negotiated on.  I am not
> personally persuaded that "negotiated on" makes for easier debugging
> of the resulting system, at least in the common case.
>
> [BA] I'm not sure how we can avoid the possibility of "negotiation" in
> signaling unless we adopt a pure media security approach (e.g. ZRTP).
> As long as it is possible to use offer/answer, you'll have the potential to
> "negotiate" SDES, DTLS/SRTP (SIP Flavor), etc.
>

Well, we've agreed to offer/answer as the basic model, but I think
we're still discussing whether that means that includes negotiation of
SRTP vs. RTP.

>
> Justin said:
>
> "To me, it increases the number of possible attacks and thus the code needed
> to mitigate them."
>
> [BA] Are you saying that a DTLS/SRTP variant integrated with Oath or other
> identity schemes would require minimal code and would interoperate
> seamlessly???
>
Nope, I'm saying that supporting that *plus* a negotiation that allows
for vanilla RTP means we have to add other protections against bid
down attacks.  Those protections men more code.

Hope that clarifies things,

Ted