[rtcweb] OPS-Dir review of draft-ietf-rtcweb-stun-consent-freshness-13

"Black, David" <david.black@emc.com> Thu, 14 May 2015 23:21 UTC

Return-Path: <david.black@emc.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com []) by ietfa.amsl.com (Postfix) with ESMTP id 104E51B2D10; Thu, 14 May 2015 16:21:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.311
X-Spam-Status: No, score=-4.311 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([]) by localhost (ietfa.amsl.com []) (amavisd-new, port 10024) with ESMTP id Q6Rm6-bBs8-2; Thu, 14 May 2015 16:21:33 -0700 (PDT)
Received: from mailuogwhop.emc.com (mailuogwhop.emc.com []) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7198C1B2D05; Thu, 14 May 2015 16:21:33 -0700 (PDT)
Received: from maildlpprd05.lss.emc.com (maildlpprd05.lss.emc.com []) by mailuogwprd04.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id t4ENLSmw025081 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 14 May 2015 19:21:29 -0400
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd04.lss.emc.com t4ENLSmw025081
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1431645689; bh=fz/+r8IBtyp3wSr/KffPFGCvYn8=; h=From:To:CC:Subject:Date:Message-ID:Content-Type: Content-Transfer-Encoding:MIME-Version; b=LbonngiXRpfy1c87sOKv9h3vEBfmjmo13qJ6I2YjD3ysDC4MnQ+I72dnclLzegRyO +jgW5CRhrIfZjniNCqedvf+GAOGcXrhO0uEKtf1/nz1XtYzSrp/GcB8uhdmoC3FQQm z2WPaFbTNau0o4GWYgSO8U5nQtxwP9nq7L+w7cxM=
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd04.lss.emc.com t4ENLSmw025081
Received: from mailusrhubprd03.lss.emc.com (mailusrhubprd03.lss.emc.com []) by maildlpprd05.lss.emc.com (RSA Interceptor); Thu, 14 May 2015 19:20:59 -0400
Received: from mxhub34.corp.emc.com (mxhub34.corp.emc.com []) by mailusrhubprd03.lss.emc.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.0) with ESMTP id t4ENLDev025807 (version=TLSv1 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 14 May 2015 19:21:14 -0400
Received: from MXHUB108.corp.emc.com ( by mxhub34.corp.emc.com ( with Microsoft SMTP Server (TLS) id 8.3.327.1; Thu, 14 May 2015 19:21:13 -0400
Received: from MX104CL02.corp.emc.com ([]) by MXHUB108.corp.emc.com ([]) with mapi id 14.03.0224.002; Thu, 14 May 2015 19:21:13 -0400
From: "Black, David" <david.black@emc.com>
To: "muthu.arul@gmail.com" <muthu.arul@gmail.com>, "dwing@cisco.com" <dwing@cisco.com>, "rmohanr@cisco.com" <rmohanr@cisco.com>, "tireddy@cisco.com" <tireddy@cisco.com>, "martin.thomson@gmail.com" <martin.thomson@gmail.com>, "ops-dir@ietf.org" <ops-dir@ietf.org>
Thread-Topic: OPS-Dir review of draft-ietf-rtcweb-stun-consent-freshness-13
Thread-Index: AdCOnKf3lsrra0GlRrmLRbgZJ92NVg==
Date: Thu, 14 May 2015 23:21:11 +0000
Message-ID: <CE03DB3D7B45C245BCA0D2432779493649720F@MX104CL02.corp.emc.com>
Accept-Language: en-US
Content-Language: en-US
x-originating-ip: []
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd03.lss.emc.com
X-RSA-Classifications: DLM_1, public, Resumes
Archived-At: <http://mailarchive.ietf.org/arch/msg/rtcweb/n0Fap8o0PkZ4JKl5MS9rtOXcWMY>
Cc: "Black, David" <david.black@emc.com>, "rtcweb@ietf.org" <rtcweb@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>
Subject: [rtcweb] OPS-Dir review of draft-ietf-rtcweb-stun-consent-freshness-13
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 May 2015 23:21:36 -0000

I have reviewed this document as part of the Operational directorate's
ongoing effort to review all IETF documents being processed by the IESG.
These comments were written with the intent of improving the operational
aspects of the IETF drafts. Comments that are not addressed in last call
may be included in AD reviews during the IESG review.  Document editors
and WG chairs should treat these comments just like any other last call

Document: draft-ietf-rtcweb-stun-consent-freshness-13
Reviewer: David Black
Review Date: May 14, 2015
IETF LC End Date: May 15, 2015 (on -11)

Summary: This draft is on the right track, but has open issues
 		described in the review.

This draft describes use of STUN to obtain ongoing consent to send in
a fashion that is secured by the use of cryptographically strong nonces
as STUN transaction IDs.

-- Major issues --

[1] The draft seems to be missing discussion of applicability - what
environments and/or protocols is this mechanism intended for or applicable
to?  Is this generally applicable wherever ICE and STUN are used?  I don't
see any RFCs listed as updated by this draft, so I'm guessing that this
is not intended to promulgate new requirements for all uses of ICE and
STUN, but this should be clarified.  The shepherd writeup implies that
this draft is intended primarily for WebRTC.

[2] The security considerations appear to be incomplete.
There should be an explanation of why cryptographically strong STUN
transaction IDs are required (e.g., there are no cryptographically
strong IDs in the TCP consent mechanism noted on p.4), and there should
be a discussion of how and why replays of previous consent responses
are harmless (will be ignored by the recipient).  The mechanism design
appears to be ok, but this rationale should be provided in terms of
attacks that are of concern and how they are prevented - a primary
intent appears to be to resisting off-path attacks.

-- Minor Issues --

[3] In Section 1, please explain what ICE-lite is.  A suitable reference
should suffice.

[4] In Section 4.1, please explain or provide a reference for what "paced"
means in "paced STUN connectivity checks or responses."

-- Nits/Editorial Comments --

The SRTP paragraph in Section 8 (Security Considerations) feels out of place
- this looks like design rationale material that would be better located in
Section 3.

idnits 2.13.02 found an unused reference:

  == Unused Reference: 'I-D.ietf-rtcweb-overview' is defined on line 320, but
     no explicit reference was found in the text

That reference is likely to be useful to address the absence of discussion of
applicability (major issue [1], above).

--- Selected RFC 5706 Appendix A Q&A for OPS-Dir review ---

This mechanism is an incremental modification to the STUN and ICE protocols,
and can be implemented by one party to a communication session; ordinary
response generation behavior (already required) reflects the cryptographically
strong STUN transaction IDs on which the mechanism is based.  As a result, the
mechanism can be deployed at one end of a two-party communication session
without impact on the other party.  This is implied by section 3 of the draft,
but would be useful to state explicitly.  [A.1.1 - deployment]

The mechanism has been defined to limit the amount of added traffic and to
shut down unwanted traffic, plus contains a facility to desynchronize
independent users of this protocol.  Some rationale should be added for
the choice of the 30 second timeout period.  [A.1.5 - network impact]

There is an obvious fault condition, namely that consent is lost or revoked
causing immediate cessation of traffic.  While the details depend on the
environment in which this mechanism is used, it'd be helpful to add a sentence
or two on reporting of the state of STUN consent-based connectivity and how
that reporting should or may relate to reporting of the state of other forms
of connectivity (e.g., TCP, SRTP/SRTCP) that are mentioned in this draft.
[A.1.8 - fault and threshold conditions]

This mechanism is a simple extension to existing protocols, and should fit
into existing configuration and management for those protocols. [A.1.9 -
configuration, A.2 - Management (in general)]

It might be useful to mention the utility of tracking frequency and duration
of loss and re-establishment of consent-based connectivity, as such information
has operational value.  In particular, a discussion of how a server could infer
loss of connectivity with a client that is using this mechanism might be useful
to add, as the operational concerns may be more significant for servers and
related networks than clients. [A.2.2 - management information, A.2.3 - fault

The primary operational impact of this protocol should be reduction in unwanted
traffic, which is a benefit - the consent check traffic added by this protocol
should not have significant impacts.  The writeup indicates that implementers
have reviewed the draft and implementations are in progress. [A.3 - Documentation]

David L. Black, Distinguished Engineer
EMC Corporation, 176 South St., Hopkinton, MA  01748
+1 (508) 293-7953             FAX: +1 (508) 293-7786
david.black@emc.com        Mobile: +1 (978) 394-7754