Re: [rtcweb] IP handling: Using mDNS names for host candidates

youenn fablet <yfablet@apple.com> Tue, 12 June 2018 15:45 UTC

Return-Path: <yfablet@apple.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFCEE130E61 for <rtcweb@ietfa.amsl.com>; Tue, 12 Jun 2018 08:45:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.309
X-Spam-Level:
X-Spam-Status: No, score=-4.309 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=apple.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xy6YkFimWxYS for <rtcweb@ietfa.amsl.com>; Tue, 12 Jun 2018 08:45:00 -0700 (PDT)
Received: from mail-in7.apple.com (mail-out7.apple.com [17.151.62.29]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D5AC130E62 for <rtcweb@ietf.org>; Tue, 12 Jun 2018 08:45:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=apple.com; s=mailout2048s; c=relaxed/simple; q=dns/txt; i=@apple.com; t=1528818299; x=2392731899; h=From:Sender:Reply-To:Subject:Date:Message-id:To:Cc:MIME-version:Content-type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-reply-to:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=BcKxfbpamLIr/J4JzidyfWabzx0zE2NKzpIEXoEOZs0=; b=fBJwoFre3u14fxY3ivWHrcF+2j7F2bglqPOz1vnr6QBYwxRPmp1BYNNkAqvIVFpj 1Eji3zd8OTWy8YczFHhoe6pN774OKFglK+RVSKXfJXShv8oIYtvOpW+pI9sQGZwh 4pvm/KyOTSnE97ODwrG7OFtm62ZGFN7ulhlaVcAs5vZ2d9gbsHkqpR4ayMpjUs9J dRUnBksCgkqlUCH1Sjo1Gel+qus0tTC6V66QdItZbPfLTZStB3cAEa05FFUxnTJ4 g0mN0PTTHzOQCUNx/40ZbFTv3ZkV/I0f844GEQDNGeeqP4/GDJ8BlfQhd+aXsRkI 1CjZZLE7Q80nSqRj+etN8g==;
X-AuditID: 11973e16-6d9ff7000000740c-4a-5b1fea7aaa11
Received: from mr2-mtap-s01.rno.apple.com (mr2-mtap-s01.rno.apple.com [17.179.226.133]) (using TLS with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mail-in7.apple.com (Apple Secure Mail Relay) with SMTP id 08.26.29708.A7AEF1B5; Tue, 12 Jun 2018 08:44:59 -0700 (PDT)
MIME-version: 1.0
Content-type: multipart/alternative; boundary="Boundary_(ID_VqZZi4CxMs/utpwpPVybMg)"
Received: from ma1-mmpp-sz07.apple.com (ma1-mmpp-sz07.apple.com [17.171.128.149]) by mr2-mtap-s01.rno.apple.com (Oracle Communications Messaging Server 8.0.2.2.20180329 64bit (built Mar 29 2018)) with ESMTPS id <0PA70063CVQYIR00@mr2-mtap-s01.rno.apple.com>; Tue, 12 Jun 2018 08:44:58 -0700 (PDT)
Received: from [17.192.25.194] (unknown [17.192.25.194]) by ma1-mmpp-sz07.apple.com (Oracle Communications Messaging Server 8.0.2.2.20180403 64bit (built Apr 3 2018)) with ESMTPSA id <0PA700L1RVQX7U80@ma1-mmpp-sz07.apple.com>; Tue, 12 Jun 2018 08:44:58 -0700 (PDT)
X-Va-A:
X-Va-T-CD: d1542198541ccb2ed9731e9c7cba448a
X-Va-E-CD: e2f1231772ca3dd6d9060cb8380bca67
X-Va-R-CD: 7e0ecfc399d2e63c65dae0115042fc2f
X-Va-CD: 0
X-Va-ID: fa59b5b1-489f-4a81-adbc-3b050322abc4
X-V-A:
X-V-T-CD: 89ad7b32b7f661dc2401e6afbd0aabcc
X-V-E-CD: e2f1231772ca3dd6d9060cb8380bca67
X-V-R-CD: 7e0ecfc399d2e63c65dae0115042fc2f
X-V-CD: 0
X-V-ID: b385cf11-de65-4c0f-8c18-530e26b8b042
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-06-12_01:,, signatures=0
Sender: youenn@apple.com
From: youenn fablet <yfablet@apple.com>
Message-id: <4C3DAC42-0F1B-4393-A2B7-40F6D226CF8B@apple.com>
Date: Tue, 12 Jun 2018 08:44:41 -0700
In-reply-to: <CAOJ7v-0Wk2O=mE_Dtyu3h=EargHNAdQpmk9J6pLm65icLQEiCw@mail.gmail.com>
To: RTCWeb IETF <rtcweb@ietf.org>
References: <CAOJ7v-2FQ3yfyfmFY8MT17nTFUvsNyixKuXXeT-Rq7zVQKBMnA@mail.gmail.com> <436903fe-1ec7-e595-7733-0cc2f9c3a53d@gmail.com> <CAOJ7v-0Wk2O=mE_Dtyu3h=EargHNAdQpmk9J6pLm65icLQEiCw@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.100.9.7)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrHIsWRmVeSWpSXmKPExsUiuPlRq271K/logzOzmSy2ThWy+HB8KavF 2n/t7A7MHjtn3WX3WLCp1GPJkp9MAcxRXDYpqTmZZalF+nYJXBm/e70LOqIrnp//x9bAuNun i5GTQ0LARGLZx+NMXYxcHEICB5gkzr/+xgSS4BUQlPgx+R4LiM0sECZx8PkzqKL1TBJtDROY IZyJTBK9j34yQYxil/jzawcLhK0t8erNKTYYu3/vKSYYu2viSVYIm0tiwdbTULauxMaX36F6 2STWn1gCVM8BZGtJvD4lDBHWkri3ZSErjH1gcg8zhM0pcf7LRHYIW0fi6Z1zjBB2tsSj3lVg trCAhMSer51g49kE1CX2Xp/ADPGkjcSf7W9YIGrcJfr/vwCbzyKgKvFk4Rwwm1MgWGLf+tVM kIDwl9jX/xtsl4iAIlDNEkZIOJxhlJi57B7UEaoSH/quMU9glJ2FFJCzkAJyFtBrzEB3TJmS CxHWlnjy7gIrhK0msfD3IiZk8QWMbKsYhXITM3N0M/PM9RILCnJS9ZLzczcxghLEdDuxHYwP V1kdYhTgYFTi4bW4Ih8txJpYVlyZe4hRmoNFSZz3tTpQSCA9sSQ1OzW1ILUovqg0J7X4ECMT B6dUA+PBq1bLoiJyLaNt40LCzweZ2Ny2u3JoCW+Tatj/jrbVpQzXuXc4WSrms6m9ED1pwpCc FZ1oeiqcQ7n6xHvRNblxZ+4VSMnlxj2fqcjwzO53KJ+N46N9/JfN0vW44+6kppTuEFgoxm2y 3eHXW4HPZ+49k9LQ/2Vp6DjZof7hD8bvwfNM/gUZK7EUZyQaajEXFScCAMy3g4zxAgAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtcweb/g1JfN9UJnUBYwLoOgP46IY40n6k>
X-Mailman-Approved-At: Fri, 15 Jun 2018 08:35:00 -0700
Subject: Re: [rtcweb] IP handling: Using mDNS names for host candidates
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 12 Jun 2018 17:00:41 -0000

Hi all,

Would it make sense to reserve a time slot at next IETF 102 meeting to discuss this?
Apparently, the RTCWeb WG is not meeting there.
Maybe MMUSIC session would be a good place?

Thanks,
	Y

> Le 12 juin 2018 à 8:39 AM, Justin Uberti <juberti@google.com> a écrit :
> 
> 
> 
> On Tue, Jun 12, 2018 at 4:15 AM Lennart Grahl <lennart.grahl@gmail.com <mailto:lennart.grahl@gmail.com>> wrote:
> On 12.06.2018 02:40, Justin Uberti wrote:
> > The Safari team has come up with a clever approach to avoid disclosing
> > private IP addresses for host candidates. As discussed in this WebKit bug
> > <https://bugs.webkit.org/show_bug.cgi?id=174500 <https://bugs.webkit.org/show_bug.cgi?id=174500>>, the technique works as
> > follows:
> > 
> >    1. Register a random UUID-based mDNS name when ICE gathering starts
> >    2. Replace the private IP address by a "{UUID}.local" string in each
> >    host candidate (and set raddr to 0.0.0.0 for other candidates)
> >    3. The other party will do mDNS resolution on any candidate having a
> >    .local suffix, similar to how hostnames in candidates are handled in RFC
> >    5245, Section 15.1.
> > 
> > This technique is relevant to the IP handling document, as it addresses one
> > of the lesser problems (private IP disclosure) from the overall problem
> > statement. While I don't think this will have a large impact on the
> > document, including the default mode selection, incorporating this
> > technique would result in some moderate changes:
> > 
> >    - Section 5.1 would mention concealing private IPs in the default case
> >    as an explicit goal.
> >    - In Section 6, Mode 2 would change from handling out private IPs to
> >    handing out mDNS names.
> 
> IMHO that would create a large gap between mode 1 and 2. Instead, I
> would suggest using mDNS *in addition* to mode 2 and 3. For mode 2 this
> would mean that only the default private IP is being transmitted but all
> other interfaces are hidden by UUID-based hostnames. For mode 3, all
> private IPs are hidden by UUID-based hostnames.
> 
> I don't see a clear benefit of doing that. If you have the mDNS hostnames, you don't need the private IPs.
> 
> Or, looking at it a different way, if mode 3 is as you describe, why would we ever use mode 2? 
> 
> >    - This document would have to describe the technique or point to another
> >    document that describes the technique. mmusic-ice-sip-sdp, Section 4.1
> >    <https://tools.ietf.org/html/draft-ietf-mmusic-ice-sip-sdp-20#section-4.1 <https://tools.ietf.org/html/draft-ietf-mmusic-ice-sip-sdp-20#section-4.1>>
> > seems
> >    like a good option, as it already covers how to handle DNS names in ICE
> >    candidates.
> 
> Since this will be useful for ORTC as well, I would not tie that to an
> SDP-specific document.
> 
> ORTC already depends on this document (it explains ICE restarts, amongst other things), so I don't see this as an issue. The nice thing about this document is that it's nearing last call, but we still have time to make edits like the ones suggested.
> 
> > This is a significant improvement and I think we will want to incorporate
> > this suggestion. Is this something we could do as part of this WGLC, or
> > should we look for another option?
> I haven't seen a better solution than mDNS so far to prevent IPs from
> leaking and I would appreciate having this to fix the following issues:
> 
> - Allowing browsers to use stricter modes by default without significant
> drawbacks,
> - establishing direct connections even in case no "consent" has been
> given because the devices are in fact in the same network segment (with
> the exception of mode 4), and
> - use cases where gUM cannot be applied and no other way of expressing
> consent has been provided (which is the status quo).
> 
> Noted. Thanks.