Re: [rtcweb] Security Architecture: SDES support is a MUST

"Dan Wing" <dwing@cisco.com> Fri, 20 July 2012 17:29 UTC

Return-Path: <dwing@cisco.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BEF2A21F85D2 for <rtcweb@ietfa.amsl.com>; Fri, 20 Jul 2012 10:29:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.496
X-Spam-Level:
X-Spam-Status: No, score=-110.496 tagged_above=-999 required=5 tests=[AWL=0.103, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aGPr9DIwPlBU for <rtcweb@ietfa.amsl.com>; Fri, 20 Jul 2012 10:29:09 -0700 (PDT)
Received: from mtv-iport-3.cisco.com (mtv-iport-3.cisco.com [173.36.130.14]) by ietfa.amsl.com (Postfix) with ESMTP id D628121F85D1 for <rtcweb@ietf.org>; Fri, 20 Jul 2012 10:29:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=dwing@cisco.com; l=3672; q=dns/txt; s=iport; t=1342805405; x=1344015005; h=from:to:cc:references:in-reply-to:subject:date: message-id:mime-version:content-transfer-encoding; bh=E+nnyeTHoW148Wg/z3tw5JQJ9s/RCvZmGHJPj46UMqE=; b=SATejClrOxthbb0nD2SH6E/OfnDTMBcggvU3+BmCqtA0ePP7WpC/+NVY /AQFNPCtja2irvvQe17w3KQ7LbKr0mq1L2prWRcNGvM6Fy8EWrNIQPLNv 8jip3cGn23KDo2neC0fwAPcZPTQU/q4LaaHqnjwtvOy4+tiRT3AK57ffX k=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AgUFAFCUCVCrRDoG/2dsb2JhbAA8CaoWjy6BB4IgAQEBBAEBAQUKARcQNAsMAQMCCQ8CAQMBAQEnBxkOFQoDBggBAQQTCQIXh2oMnl+gJItOEQmGRgOITYUMlhCBZoJ/gTgHHA
X-IronPort-AV: E=Sophos;i="4.77,623,1336348800"; d="scan'208";a="49956106"
Received: from mtv-core-1.cisco.com ([171.68.58.6]) by mtv-iport-3.cisco.com with ESMTP; 20 Jul 2012 17:30:03 +0000
Received: from dwingWS (sjc-vpn4-1264.cisco.com [10.21.84.239]) by mtv-core-1.cisco.com (8.14.5/8.14.5) with ESMTP id q6KHU3xd010131; Fri, 20 Jul 2012 17:30:03 GMT
From: Dan Wing <dwing@cisco.com>
To: rtcweb@ietf.org
References: <201207190742.q6J7glf6008744@vivaldi29.register.it> <500834FE.5040809@alcatel-lucent.com> <500835E1.2070502@infosecurity.ch> <50084717.7060301@alcatel-lucent.com> <BLU169-DS1488EF1F32A1EB2027582093D90@phx.gbl> <5008F7B9.7020804@infosecurity.ch> <500957ED.90807@alvestrand.no> <50095AAC.7030104@infosecurity.ch> <50095CE7.6030202@alvestrand.no> <CABcZeBM4BwtUyr=MTft0SXSwhUO0vczWd0jOVUO=ea2SYiEcZA@mail.gmail.com>
In-Reply-To: <CABcZeBM4BwtUyr=MTft0SXSwhUO0vczWd0jOVUO=ea2SYiEcZA@mail.gmail.com>
Date: Fri, 20 Jul 2012 10:30:03 -0700
Message-ID: <0ad001cd669d$4c5fae50$e51f0af0$@com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: Ac1mfrye1ldynRh+RnCrVrbT1B9vCAAHhlaw
Content-Language: en-us
Subject: Re: [rtcweb] Security Architecture: SDES support is a MUST
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 20 Jul 2012 17:29:09 -0000

> -----Original Message-----
> From: rtcweb-bounces@ietf.org [mailto:rtcweb-bounces@ietf.org] On
> Behalf Of Eric Rescorla
> Sent: Friday, July 20, 2012 6:50 AM
> To: Harald Alvestrand
> Cc: rtcweb@ietf.org
> Subject: Re: [rtcweb] Security Architecture: SDES support is a MUST
> 
> The draft currently states:
> 
>      *  The "security characteristics" MUST include some mechanism to
>          allow an out-of-band verification of the peer, such as a
>          certificate fingerprint or an SAS.
> 
> I'd be happy to have us specify a particular fingerprint algorithm
> (presumably
> SHA-256, potentially truncated) but I haven't seen any evidence that
> users savvy enough to inspect the fingerprint at all can't navigate
> more
> than one hash. For example, Chrome's SSL/TLS inspector currently
> displays
> MD5 and SHA-1. So I'm not sure something needs to be standardized here.

Users are unreliable to do this.  

I would look at TLS key pinning or similar techniques.  That is what 
ZRTP is doing to avoid speaking a SAS for every phone call.

Again (for the group), DTLS-SRTP allows us to build identity validation
such as key pinning or a SAS or third-party IdP, but SDESC does not 
allow us to build identity validation.

-d


> -Ekr
> 
> 
> On Fri, Jul 20, 2012 at 6:28 AM, Harald Alvestrand
> <harald@alvestrand.no> wrote:
> > On 07/20/2012 03:18 PM, Fabio Pietrosanti (naif) wrote:
> >>
> >> On 7/20/12 3:06 PM, Harald Alvestrand wrote:
> >>>>
> >>>> Current security definition of WebRTC does not support end-to-end
> >>>> security.
> >>>
> >>> The current security definition of WebRTC (with DTLS) provides
> >>> fingerprints.
> >>> If the application is able to verify those fingerprints, security
> is end
> >>> to end; if it isn't - it isn't.
> >>
> >> The security specification already does specify how the fingerprint
> must
> >> be checked, against a third party system that must be trusted
> (unless
> >> there is some recent update i didn't still checked).
> >>
> >> The way the specification describe fingerprint must be checked, does
> not
> >> enforce end-to-end security but always rely on trusted third party,
> >> being IdP (identity providers).
> >>
> >> The only way to achieve end-to-end security is not to have any kind
> of
> >> trusted third party, as has been already discussed on
> >> http://www.ietf.org/mail-archive/web/rtcweb/current/msg04043.html .
> >
> > That link is your request to have SAS considered mandatory.
> >
> > I believe you got some support for that proposal, or at least some
> kind of
> > availability of digest information that can be verified
> independently, but I
> > do not believe that you got any support for having SAS be the one and
> only
> > definition of "end to end security".
> >
> > Thus, you may get support for your real request, but not for the
> language
> > you use to describe it.
> >
> >>
> >> Until WebRTC security architecture specification does not clearly
> define
> >> a peer-to-peer fingerprint verification system that does not rely on
> >> trusted third party it cannot be considered to provide end-to-end
> >> security.
> >>
> >> Fabio
> >> _______________________________________________
> >> rtcweb mailing list
> >> rtcweb@ietf.org
> >> https://www.ietf.org/mailman/listinfo/rtcweb
> >
> >
> > _______________________________________________
> > rtcweb mailing list
> > rtcweb@ietf.org
> > https://www.ietf.org/mailman/listinfo/rtcweb
> _______________________________________________
> rtcweb mailing list
> rtcweb@ietf.org
> https://www.ietf.org/mailman/listinfo/rtcweb