Re: [rtcweb] Retransmit: Summary of Alternatives for media keying

Matthew Kaufman <matthew.kaufman@skype.net> Thu, 28 July 2011 17:18 UTC

Return-Path: <matthew.kaufman@skype.net>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95A6711E80D4 for <rtcweb@ietfa.amsl.com>; Thu, 28 Jul 2011 10:18:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.499
X-Spam-Level:
X-Spam-Status: No, score=-2.499 tagged_above=-999 required=5 tests=[AWL=0.100, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HHm5c-AAO1RS for <rtcweb@ietfa.amsl.com>; Thu, 28 Jul 2011 10:18:56 -0700 (PDT)
Received: from mx.skype.net (mx.skype.net [78.141.177.88]) by ietfa.amsl.com (Postfix) with ESMTP id 9DEC411E80D0 for <rtcweb@ietf.org>; Thu, 28 Jul 2011 10:18:56 -0700 (PDT)
Received: from mx.skype.net (localhost [127.0.0.1]) by mx.skype.net (Postfix) with ESMTP id B6ED416E2; Thu, 28 Jul 2011 19:18:55 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=skype.net; h=subject :mime-version:content-type:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; s=mx; bh=b4 jgXFunRhwSQ+xWEg+1m0iwA2I=; b=xL8NhgKbYsypBV3H3pCGhHYPOqqDnduYdz DDPZ7dPNTSrpkm2a/B+0Lh7KeIjksN+Q0DXhZTJe68x6m/LlcK344T1H1jEQ7wA7 fkVID4/YCOj4W2vy+BvK1EKm1oI4VBMgPauLNJ0xtrDpZGmTlKsaD3+efP+oJ6sY SukwpC9Ng=
DomainKey-Signature: a=rsa-sha1; c=nofws; d=skype.net; h=subject:mime-version :content-type:from:in-reply-to:date:cc:content-transfer-encoding :message-id:references:to; q=dns; s=mx; b=Gmh38z+4FY9zr09xgL/WHu t/8Ke3dsu1wFdMAuwxvvqRnuYkkNigI8HfR1ta+VM0MPkOSGNbm7UTv6rNav6tg/ Y6RktLwWfjwJTnH8k5N4Surp+ZjzgubcgQZsJzkX4l/duzQN9VaOJZHIS/pE4dCT 54O8ZKR4grUfaUr84KWxY=
Received: from zimbra.skype.net (zimbra.skype.net [78.141.177.82]) by mx.skype.net (Postfix) with ESMTP id AC3017FC; Thu, 28 Jul 2011 19:18:55 +0200 (CEST)
Received: from localhost (localhost [127.0.0.1]) by zimbra.skype.net (Postfix) with ESMTP id 922C9350811F; Thu, 28 Jul 2011 19:18:55 +0200 (CEST)
X-Virus-Scanned: amavisd-new at lu2-zimbra.skype.net
Received: from zimbra.skype.net ([127.0.0.1]) by localhost (zimbra.skype.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dQ65xMTUL18G; Thu, 28 Jul 2011 19:18:54 +0200 (CEST)
Received: from dhcp-103b.meeting.ietf.org (dhcp-103b.meeting.ietf.org [130.129.16.59]) by zimbra.skype.net (Postfix) with ESMTPSA id 1307A3508130; Thu, 28 Jul 2011 19:18:53 +0200 (CEST)
Mime-Version: 1.0 (Apple Message framework v1082)
Content-Type: text/plain; charset="us-ascii"
From: Matthew Kaufman <matthew.kaufman@skype.net>
In-Reply-To: <E1963869-9E21-4F1F-AB4A-E5D070CCA581@acmepacket.com>
Date: Thu, 28 Jul 2011 13:18:52 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <55C78CA7-292C-4E0E-901B-83B7614C2F32@skype.net>
References: <12BF9E55-662F-4762-9E47-2BBD3FA5FD93@acmepacket.com> <A444A0F8084434499206E78C106220CA08F1D75CF0@MCHP058A.global-ad.net> <2E6CBDE0-DA10-4792-8059-A01F554DB370@skype.net> <E1963869-9E21-4F1F-AB4A-E5D070CCA581@acmepacket.com>
To: Hadriel Kaplan <HKaplan@acmepacket.com>
X-Mailer: Apple Mail (2.1082)
Cc: "rtcweb@ietf.org" <rtcweb@ietf.org>
Subject: Re: [rtcweb] Retransmit: Summary of Alternatives for media keying
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Jul 2011 17:18:57 -0000

On Jul 28, 2011, at 11:13 AM, Hadriel Kaplan wrote:

> 
> On Jul 28, 2011, at 8:25 AM, Matthew Kaufman wrote:
> 
>>> Secondly, if interworking with legacy SIP, where DTLS-SRTP (or whatever we select) is terminated at a gateway, there is a real problem ensuring that the user knows the call is not necessarily secure end-to-end. Perhaps this argues towards option B, since if DTLS-SRTP is not used from browser to gateway, at least the browser should know to indicate a lesser level of security to the user.
>> 
>> If you are sitting in an Internet cafe using someone else's unencrypted wifi and a telephony service provider you trust would you rather 1) use DTLS-SRTP between you and the telephony provider and plain RTP past their gateway inside their internal network, or 2) use plain RTP on the wifi network and all the way to the telephony provider?
> 
> I would be perfectly happy with using sdes-based SRTP.  But if the call would otherwise fail altogether, I'd like the option to make the call no matter what (ie, even if it ends up being cleartext).

Why would the call "otherwise fail altogether"?

> 
> (And since you're sitting in an Internet cafe in hearing distance of everyone, any sense of privacy is gone anyway. ;)
> 

Have you ever called into a conference call from a public place, with your microphone muted?

> 
>> I agree that we can't display "this connection is secured everywhere" to the user... but look, HTTPS is the same. When I see a lock icon on my screen and click to see that yes, I'm really talking to who it says in the address bar, I still can't tell if they're terminating my HTTPS session in a front-end box and then using HTTP beyond it, or if the HTTPS really goes all the way to the server.
> 
> But the browser ties the identity of the name I typed in the address bar to the cert, so that if I typed "https://mybank.com", I know it's secure to mybank.com.  Of course it could be cleartext after whomever has a cert for mybank.com, and may even end up triggering protocols that exit mybank.com and go to evil.com, but I implicitly trust mybank.com to be careful with bank info.  

Ok, so you trust your "banking service".

> That's not the same for DTLS-SRTP; until and unless the human being verifies the keys/SAS with the far end, nothing is known.

If you trust your "calling service" (and are connected to it with HTTPS) then you can use that trusted service to exchange the fingerprints and verify the keys of the far end to prevent MITM.

(You can also add a browser extension that uses a service that you trust but that isn't your calling service, and when you're calling other people with the same extension you can check the fingerprints in an automated way using that.)

If you *don't* trust your "calling service", then that's just like not trusting your banking service when you type in passwords.

>  The DTLS-SRTP may only reach the NAT-router in the Internet Cafe, for example, be terminated by it and a separate DTLS-SRTP between it and the bank.  And if I'm talking to an IVR system (as one frequently does with banks), there is no human to verify the keys/SAS with.

Correct. But there is a signaling channel, and if you trust it you can assure that there is no router doing MITM at the cafe. Perhaps you'll even be calling your bank's IVR using *their* calling service...

Matthew Kaufman