Re: [rtcweb] Security implications of host candidates

Justin Uberti <juberti@google.com> Tue, 03 July 2018 00:32 UTC

Return-Path: <juberti@google.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9D0BB130E99 for <rtcweb@ietfa.amsl.com>; Mon, 2 Jul 2018 17:32:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.51
X-Spam-Level:
X-Spam-Status: No, score=-17.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yJrNmzI50HIX for <rtcweb@ietfa.amsl.com>; Mon, 2 Jul 2018 17:32:49 -0700 (PDT)
Received: from mail-it0-x243.google.com (mail-it0-x243.google.com [IPv6:2607:f8b0:4001:c0b::243]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 140B3130EBF for <rtcweb@ietf.org>; Mon, 2 Jul 2018 17:32:49 -0700 (PDT)
Received: by mail-it0-x243.google.com with SMTP id 188-v6so747103ita.5 for <rtcweb@ietf.org>; Mon, 02 Jul 2018 17:32:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Ge24ix+aOvY/tane0ojvi9dJs8LyD9nFLgOAnVkNsls=; b=DCzugxX4cgL5I51Nbf6BIK/pXaqN3RbjlYl78nSzbIhoCTjuJPe/9E0C75ROeLZ0mY KN8GvaObUJVCEx5ARfEPIVw0ewTAAhEyz2wvBYSI8CA/mcRgPb8GaJjepiB0GvrVUSkY oP2YdEERrpEvZ2GNsQGYaQnplQ0RUwWUmRtPEuGhxMv6tlkb+WIGyc/lWi7wySrYp26L f/hA7xxlCk+J0+CYanGMIvAP2dsKDOBcLtbQ12UmmouZwTKkv83OlDvdIGQqKFXM6LhS DmwFCPSc+nXW3dba1KzdaQek+4iVa34eW6iHu3e1LfprirteeUQU7TGg20FR+8p+t1jn oZoA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Ge24ix+aOvY/tane0ojvi9dJs8LyD9nFLgOAnVkNsls=; b=Pqb4wLbhPxLfj/m81a8GXk29hpksaHgREgNMEF/N+jt8ccqoUoz1lDfXoedo0p6eFD lrjsi9XQItUJLisi1ezBL3D++P5o5WsutbkKohrbaDkhYS2BiZTX9dft+dc07wITfwPS za+JFr1UN5GKNLJOOZGKAo5No+HlBah3BqxtH9H9qZr4RC7S6rayz35+UVduXYamcHdz O+ssFcki5W/NdS3RxIzXvO9waEg9KVH5VQoLU1xAowodJPVY/CzpkroANOKSmNAI/STH RyxRt7PhO83JCjDtDgNRAAdF09zaEaqDTMcibmqZMu9N6L72sP0V53qw+0ukXrec2M8E 6MnQ==
X-Gm-Message-State: APt69E3xi1Jiu5e7WnUERAxv/MyZt9g6E8pzVvKqHLSwJywmIiifq/Mj 1nAW4Rgs5F/nNjusyK1t4GR3ClnX6dQd5fW8zcqIbw==
X-Google-Smtp-Source: AAOMgpeT/txc19FcfUk3eLLrZiyj8zAdApRAXt45mlKdY2SKYhBQepOBDsBHFRlL2vz90GWbnfx6tVesS4C2sZTcYLU=
X-Received: by 2002:a24:2246:: with SMTP id o67-v6mr7430244ito.25.1530577968005; Mon, 02 Jul 2018 17:32:48 -0700 (PDT)
MIME-Version: 1.0
References: <CAOJ7v-1t_BDEEHmA4eqiS9ksYOOyHUz9LFLhQxs8FhjTdswP5w@mail.gmail.com> <CANN+akZLRdZdexjU44zPCA6vdQR0hVYT17_4P8DefC0JbRL5mA@mail.gmail.com>
In-Reply-To: <CANN+akZLRdZdexjU44zPCA6vdQR0hVYT17_4P8DefC0JbRL5mA@mail.gmail.com>
From: Justin Uberti <juberti@google.com>
Date: Mon, 02 Jul 2018 17:32:35 -0700
Message-ID: <CAOJ7v-2JdiMJ9iWE_cL8G7xDM6iekexJL8KLEbz0jD=p7hiGZg@mail.gmail.com>
To: youenn fablet <youennf@gmail.com>
Cc: youenn fablet <yfablet@apple.com>, RTCWeb IETF <rtcweb@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000016246705700d741c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rtcweb/k_hCCl3foA8yIJfCaj3M5NrgCD0>
Subject: Re: [rtcweb] Security implications of host candidates
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Jul 2018 00:32:52 -0000

On Mon, Jul 2, 2018 at 5:05 PM youenn fablet <youennf@gmail.com> wrote:

>
>
> Le lun. 2 juil. 2018 à 16:04, Justin Uberti <juberti=
> 40google.com@dmarc.ietf.org> a écrit :
>
>> https://tools.ietf.org/html/draft-mdns-ice-candidates-00 has a section
>> where it talks about the privacy implications of being able to determine
>> that two browser contexts are running on the same machine by making a
>> host-host connection and analyzing the connection RTT:
>>
>>    A successful WebRTC connection between two peers is also a potential
>>    thread to user privacy.  When a WebRTC connection latency is close to
>>    zero, the probability is high that the two peers are running on the
>>    same device.  Browsers often isolate contexts one from the other.
>>    Private browsing mode contexts usually do not share any information
>>    with regular browsing contexts.  The WebKit engine isolates third-
>>    party iframes in various ways (cookies, ITP) to prevent user
>>    tracking.  Enabling a web application to determine that two contexts
>>    run in the same device would defeat some of the protections provided
>>    by modern browsers.
>>
>>
>> I would think that this concern would still exist even without host candidates, through either
>>
>> a) IP matching + user-agent fingerprinting
>>
>>
> It is true that one can probably try breaking this protection using
> fingerprinting, and public IP is a great way to converge more quickly.
> That said, this is something we should try to fight against.
>
> b) srflx-srflx connections and NAT hairpinning
>>
>>
> Aren't the packets supposed to go through the router? In such a case, I
> would hope the latency to be roughly the same, no matter whether the
> devices are the same or not. That is indeed something that should be tested.
>

Maybe I don't understand the attack well enough, but if a page running in a
private browsing context tried to communicate with a page not running in a
private browsing context, they would probably see < 1ms RTTs for both
host-host and srflx-srflx candidates in many cases (including cases where
the contexts are on different machines).