Re: [rtcweb] draft-ietf-rtcweb-rtp-usage-12 Client-to-Mixer Audio Level

tim panton <tim@phonefromhere.com> Wed, 05 March 2014 13:59 UTC

Return-Path: <tim@phonefromhere.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 153231A00A8 for <rtcweb@ietfa.amsl.com>; Wed, 5 Mar 2014 05:59:14 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dEjpeqBpA39f for <rtcweb@ietfa.amsl.com>; Wed, 5 Mar 2014 05:59:12 -0800 (PST)
Received: from smtp001.apm-internet.net (smtp001-out.apm-internet.net [85.119.248.222]) by ietfa.amsl.com (Postfix) with ESMTP id 71F471A0080 for <rtcweb@ietf.org>; Wed, 5 Mar 2014 05:59:11 -0800 (PST)
Received: (qmail 39714 invoked from network); 5 Mar 2014 13:59:06 -0000
X-AV-Scan: clean
X-APM-Authkey: 83769 8759
Received: from unknown (HELO zimbra003.verygoodemail.com) (85.119.248.218) by smtp001.apm-internet.net with SMTP; 5 Mar 2014 13:59:06 -0000
Received: from zimbra003.verygoodemail.com (localhost [127.0.0.1]) by zimbra003.verygoodemail.com (Postfix) with ESMTP id 6920F18A0534; Wed, 5 Mar 2014 13:59:06 +0000 (GMT)
Received: from dhcp-a471.meeting.ietf.org (dhcp-a471.meeting.ietf.org [31.133.164.113]) by zimbra003.verygoodemail.com (Postfix) with ESMTPSA id 43BDE18A03A0; Wed, 5 Mar 2014 13:59:06 +0000 (GMT)
Content-Type: text/plain; charset="windows-1252"
Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\))
From: tim panton <tim@phonefromhere.com>
In-Reply-To: <1BC59A5D-D1C9-4E3F-ABFB-C1D664CD7ACF@cisco.com>
Date: Wed, 05 Mar 2014 13:59:05 +0000
Content-Transfer-Encoding: quoted-printable
Message-Id: <EEF5B1D0-7782-4EB8-90DF-F1D56B2D2ADC@phonefromhere.com>
References: <1BC59A5D-D1C9-4E3F-ABFB-C1D664CD7ACF@cisco.com>
To: "Cullen Jennings (fluffy)" <fluffy@cisco.com>
X-Mailer: Apple Mail (2.1874)
Archived-At: http://mailarchive.ietf.org/arch/msg/rtcweb/rxcnXnf4vV6By_Y9pnMgrP3SA3w
Cc: "rtcweb@ietf.org" <rtcweb@ietf.org>
Subject: Re: [rtcweb] draft-ietf-rtcweb-rtp-usage-12 Client-to-Mixer Audio Level
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Mar 2014 13:59:14 -0000

On 5 Mar 2014, at 12:32, Cullen Jennings (fluffy) <fluffy@cisco.com> wrote:

> 
> I am opposed to mandating that Client-to-Mixer Audio Level RTP header is REQUIRED to be encrypted. It means that we can not really build conferencing system where the mixers do not have access to decrypt the media.

I have to ask:
Does that matter enough to weaken user security for everyone else? 


> 
> I would like to propose that the JS application can control  if the header is encrypted or not.  

I am deeply uncomfortable about that. I am not a good enough cryptographer to know, but my instinct
is that exposing the fact that (for example) most of the top bits of the ulaw data are zeros in this packet
must be a risk.

I’m pretty confident that one could detect the pitch of the speaker and probably fingerprint that down
to individuals or languages with enough data.

> 
> I am aware of the paper that suggests these audio levels can reveal the contents of the conversation. There is some element of truth to this. There is also some element of truth to the point that if this was true, speech recognition system would work better than they do. Encrypting this or not is a risk that the application using the header extension needs to evaluate, and WebRTC system needs to provide the applications with a control surfaces that allows them to use this in the way the applications desires.

I am also uncomfortable about the number of little ad-hoc control surfaces that we seem to be mandating
without an overall design.

My take is that we should push this out to 2.0 when hopefully we will have a designed control surface in place.

> 
> I will note that an normal application that used this header could decide if it was encrypted or not, what is different in RTCWeb is that we are building a platform and my view is that this platform should allow the applications build on the platform to decide the tradeoffs of risk for encrypting this or not. 

That isn’t the line we have taken in any other encryption discussion.

Tim.