[rtcweb] Telling the user the connection is secure (Re: Resolving RTP/SDES question in Paris)

Harald Alvestrand <harald@alvestrand.no> Tue, 20 March 2012 10:53 UTC

Return-Path: <harald@alvestrand.no>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFA6021F86E3 for <rtcweb@ietfa.amsl.com>; Tue, 20 Mar 2012 03:53:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.599
X-Spam-Level:
X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XMxWOWMKzXPc for <rtcweb@ietfa.amsl.com>; Tue, 20 Mar 2012 03:53:00 -0700 (PDT)
Received: from eikenes.alvestrand.no (eikenes.alvestrand.no [158.38.152.233]) by ietfa.amsl.com (Postfix) with ESMTP id B56E721F86E1 for <rtcweb@ietf.org>; Tue, 20 Mar 2012 03:52:59 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by eikenes.alvestrand.no (Postfix) with ESMTP id BC75139E132; Tue, 20 Mar 2012 11:52:58 +0100 (CET)
X-Virus-Scanned: Debian amavisd-new at eikenes.alvestrand.no
Received: from eikenes.alvestrand.no ([127.0.0.1]) by localhost (eikenes.alvestrand.no [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GpLNm5LMIM+4; Tue, 20 Mar 2012 11:52:57 +0100 (CET)
Received: from [78.65.120.97] (host-78-65-120-97.homerun.telia.com [78.65.120.97]) by eikenes.alvestrand.no (Postfix) with ESMTPSA id C58AA39E0E7; Tue, 20 Mar 2012 11:52:57 +0100 (CET)
Message-ID: <4F686183.6040201@alvestrand.no>
Date: Tue, 20 Mar 2012 11:52:51 +0100
From: Harald Alvestrand <harald@alvestrand.no>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.27) Gecko/20120216 Thunderbird/3.1.19
MIME-Version: 1.0
To: igor.faynberg@alcatel-lucent.com
References: <4F4759DC.7060303@ericsson.com> <CAD5OKxvYOY5JZ2mYNGiH1poUBQkyOOycePFijH5H+SxtcdqujQ@mail.gmail.com> <CABkgnnVe-b6Sv=R67bMJk_NQqQwdrRUn6rBm7Gu_CMcfPQwtEg@mail.gmail.com> <CAD5OKxvZbEJ7sV4WPAYoQapzMR_QwAftj-oKg=ioMKHNT792wQ@mail.gmail.com> <6F428EFD2B8C2F49A2FB1317291A76C113563C5A92@USNAVSXCHMBSA1.ndc.alcatel-lucent.com> <CALiegf=jtkDCS_D0ZFe9UpbiadQ0vsJ+4MppQSbLr-wbaXNrfQ@mail.gmail.com> <BLU169-W29E5B86F9E2C6F3126961C93420@phx.gbl> <CALiegfk2aT+6Psr4nT-hG1G7eYRBfFCcT+25On2O4HfUXJ6-ng@mail.gmail.com> <CAD6AjGSmi9j+sdGWPts20-iwGvGij05ek0OKYEPULC6B=aFpQg@mail.gmail.com> <6F428EFD2B8C2F49A2FB1317291A76C113564482A7@USNAVSXCHMBSA1.ndc.alcatel-lucent.com> <ADBB75F3-E20C-4EC4-B9C3-EF2E4BFF409C@phonefromhere.com> <CAD5OKxvuEV8Vbq3h7=ZgcKmREjmguvz5n-SpXr2n-EY7a_ddxg@mail.gmail.com> <CALiegfk1ozOKPcDjbd3H_z2Edzh4RcZpYyJSWdw_1DJ04muQXA@mail.gmail.com> <CAD5OKxu8-+0O0=eE7mD1hi=nPUpEXczGj=bRNQCQL1BW8c-c-Q@mail.gmail.com> <4F677F3B.3040407@alcatel-lucent.com>
In-Reply-To: <4F677F3B.3040407@alcatel-lucent.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: rtcweb@ietf.org
Subject: [rtcweb] Telling the user the connection is secure (Re: Resolving RTP/SDES question in Paris)
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Mar 2012 10:53:01 -0000

I believe I have said this before, but...

We should never tell the user the connection is secure.
We should tell the user when we know he's exposed to risks that he 
usually isn't.

Thus - we should not give any indication that we're using DTLS-SRTP with 
verified identities (if that's what we normally support). We SHOULD give 
a warning saying "hey, since the gateway you've connected to isn't doing 
normal authentication procedures, but instead insists on exchanging keys 
on the signalling channel, you are less sure who you're talking to than 
usual, and there are more boxes that might record your call in the way, 
but the script kiddie on your hotel WLAN still can't see your packets 
(translation: legacy SDES key exchange is in use, but SRTP is still on).

All this will of course be iconified into a single cryptic graphic 
probably involving a padlock :-)

On 03/19/2012 07:47 PM, Igor Faynberg wrote:
> This is the question that I have been asking for a while...  I don't 
> expect a complete fireproof answer, of course, and I also understand 
> that the browser today is telling me a few things about the security 
> of a site and warns me when "the site is trying to access the data it 
> should not be accessing."
>
> But I  also imagine that a rogue site could display a message 
> mimicking the security assurance as though it comes from the browser.
>
> So it would be good to have a very clear idea when  the determination 
> about the security of the connection and such is made and how the end 
> user can verify that it actually comes from the browser.
>
> (To this end, the user MUST trust the browser, of course.)
>
> Igor
>
> On 3/19/2012 2:15 PM, Roman Shpount wrote:
>> I guess my question is, when are we going to tell the user that 
>> connection is "secure"?...
> _______________________________________________
> rtcweb mailing list
> rtcweb@ietf.org
> https://www.ietf.org/mailman/listinfo/rtcweb
>