Re: [rtcweb] How to determine TLS roles?

Tim Panton <tim@phonefromhere.com> Mon, 10 February 2014 14:24 UTC

Return-Path: <tim@phonefromhere.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED1141A086B for <rtcweb@ietfa.amsl.com>; Mon, 10 Feb 2014 06:24:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G53EdffVOfRI for <rtcweb@ietfa.amsl.com>; Mon, 10 Feb 2014 06:24:42 -0800 (PST)
Received: from smtp002.apm-internet.net (smtp002.apm-internet.net [85.119.248.221]) by ietfa.amsl.com (Postfix) with ESMTP id 670301A0887 for <rtcweb@ietf.org>; Mon, 10 Feb 2014 06:14:30 -0800 (PST)
Received: (qmail 26339 invoked from network); 10 Feb 2014 14:14:29 -0000
X-AV-Scan: clean
X-APM-Authkey: 83769 11689
Received: from unknown (HELO zimbra003.verygoodemail.com) (85.119.248.218) by smtp002.apm-internet.net with SMTP; 10 Feb 2014 14:14:29 -0000
Received: from zimbra003.verygoodemail.com (localhost [127.0.0.1]) by zimbra003.verygoodemail.com (Postfix) with ESMTP id 4397918A033B; Mon, 10 Feb 2014 14:14:29 +0000 (GMT)
Received: from limit.westhawk.co.uk (limit.westhawk.co.uk [192.67.4.33]) by zimbra003.verygoodemail.com (Postfix) with ESMTPSA id 0F8C918A0194; Mon, 10 Feb 2014 14:14:28 +0000 (GMT)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 7.1 \(1827\))
From: Tim Panton <tim@phonefromhere.com>
In-Reply-To: <7594FB04B1934943A5C02806D1A2204B1D1673C4@ESESSMB209.ericsson.se>
Date: Mon, 10 Feb 2014 14:14:19 +0000
Content-Transfer-Encoding: quoted-printable
Message-Id: <54B6400D-3753-4285-96DB-08EDB23BD03F@phonefromhere.com>
References: <7594FB04B1934943A5C02806D1A2204B1D1672FC@ESESSMB209.ericsson.se> <9ADA7473-1F36-4D96-A875-D2DC0762E9C2@phonefromhere.com> <7594FB04B1934943A5C02806D1A2204B1D1673C4@ESESSMB209.ericsson.se>
To: Christer Holmberg <christer.holmberg@ericsson.com>
X-Mailer: Apple Mail (2.1827)
Cc: "rtcweb@ietf.org" <rtcweb@ietf.org>
Subject: Re: [rtcweb] How to determine TLS roles?
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb/>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Feb 2014 14:24:44 -0000

On 10 Feb 2014, at 13:51, Christer Holmberg <christer.holmberg@ericsson.com> wrote:

> Hi,
> 
>>> If I understand correctly, in RTCWEB we are going to use a single DTLS association for two things:
>>> 
>>> 1)      Key exchange for SRTP
>>> 2)      The data channel
>>> 
>>> Now, this means that there needs to be a generic way to determine the TLS roles.
>>> 
>>> In WEBRTC, how are the TLS roles determined?
>> 
>> That was the subject of a rant of mine.
>> 
>> I think the correct answer is that the party that ends up being IceControlling then becomes the DTLS client. Typically the initiator of a session is IceControlling. 
>> 
>> However the recent addition of
>> a=setup:passive
>> to chrome's SDP clouds the story somewhat, allowing an IceController to say that it is DTLS passive and allow the non-initiator to be the DTLS client.
>> 
>> Ostensibly this is to support early media - where the receiver of a call wishes to send media before the initiator does.
>> 
>> As I said (rather intemperately) this added complexity is not worth the benefit.
> 
> I think that it should be possible for a JS App to explicitly set the roles.
> 
> Because, when SDP O/A is used on the wire, there are specified rules on how the roles are determined. But, some other on-the-wire protocol may have different rules.
> 
> Regards,
> 
> Christer
> 

There are many things that the JS app will need to do if we aren't bound by SDP O/A - but I agreed not to talk about that -
until after 1.0 gets out :-)

T.