Re: [rtcweb] End-to-end encryption vs end-to-end authentication (DTLS-SRTP / SDES-SRTP)

"Ravindran, Parthasarathi" <pravindran@sonusnet.com> Fri, 06 April 2012 06:23 UTC

Return-Path: <pravindran@sonusnet.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 02B9011E8091 for <rtcweb@ietfa.amsl.com>; Thu, 5 Apr 2012 23:23:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.449
X-Spam-Level:
X-Spam-Status: No, score=-6.449 tagged_above=-999 required=5 tests=[AWL=0.150, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5V93cDlS6CbE for <rtcweb@ietfa.amsl.com>; Thu, 5 Apr 2012 23:23:42 -0700 (PDT)
Received: from na3sys010aog102.obsmtp.com (na3sys010aog102.obsmtp.com [74.125.245.72]) by ietfa.amsl.com (Postfix) with ESMTP id 9A8CF11E8085 for <rtcweb@ietf.org>; Thu, 5 Apr 2012 23:23:41 -0700 (PDT)
Received: from USMA-EX-HUB2.sonusnet.com ([69.147.176.212]) (using TLSv1) by na3sys010aob102.postini.com ([74.125.244.12]) with SMTP ID DSNKT36L7KT6lvv8xAUW1+IziGJvIsBGFr++@postini.com; Thu, 05 Apr 2012 23:23:41 PDT
Received: from INBA-HUB02.sonusnet.com (10.70.51.87) by USMA-EX-HUB2.sonusnet.com (66.203.90.17) with Microsoft SMTP Server (TLS) id 14.2.247.3; Fri, 6 Apr 2012 02:24:04 -0400
Received: from INBA-MAIL01.sonusnet.com ([fe80::8d0f:e4f9:a74f:3daf]) by inba-hub02.sonusnet.com ([fe80::80b9:dc60:caf7:7dfc%11]) with mapi id 14.01.0355.002; Fri, 6 Apr 2012 11:53:35 +0530
From: "Ravindran, Parthasarathi" <pravindran@sonusnet.com>
To: "Fabio Pietrosanti (naif)" <lists@infosecurity.ch>, "rtcweb@ietf.org" <rtcweb@ietf.org>
Thread-Topic: [rtcweb] End-to-end encryption vs end-to-end authentication (DTLS-SRTP / SDES-SRTP)
Thread-Index: AQHNExU2rLdj93x8tkit4g2OJGitOJaNUhqQ
Date: Fri, 06 Apr 2012 06:24:02 +0000
Message-ID: <387F9047F55E8C42850AD6B3A7A03C6C0E225544@inba-mail01.sonusnet.com>
References: <4F7D7103.6040102@infosecurity.ch>
In-Reply-To: <4F7D7103.6040102@infosecurity.ch>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.70.54.83]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Subject: Re: [rtcweb] End-to-end encryption vs end-to-end authentication (DTLS-SRTP / SDES-SRTP)
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Apr 2012 06:23:43 -0000

Fabio,

End-to-end looks misnomer to me as the maximum media security/authentication provided shall be between two media hops. The media hops in the RTCWeb are web-browser. So, the aim of the media security/authentication mechanism has to between two web-browsers. The intermediate elements like http proxy should not be in a position to perform MITM attack or atleast, web-browser should have the mechanism to perform post-mortem analysis that man-in-the-middle exist as HTTP proxy. I wish to see the discussion for media security/authentication between web-browser to web-browser first.

Please note that web-browser is not required to standard browser like Chrome, IE, Mozilla but web-browser shall be custom-made which is RTCWeb compliant.

AFAIK, SDES-SRTP does not provide web-browser to web-browser authentication and it shall mimic web-browser to web-browser security. I agree with Hadriel that SDES-SRTP mechanism provides marketing advance as most of the user atleast believes that the session is secured :-) but it should not be criteria for selecting key mechanism.  We shall discuss in detail about DTLS-SRTP or zRTP or any other mechanism if exists for web-browser to web-browser media security.

Thanks
Partha

>-----Original Message-----
>From: rtcweb-bounces@ietf.org [mailto:rtcweb-bounces@ietf.org] On Behalf
>Of Fabio Pietrosanti (naif)
>Sent: Thursday, April 05, 2012 3:47 PM
>To: rtcweb@ietf.org
>Subject: [rtcweb] End-to-end encryption vs end-to-end authentication
>(DTLS-SRTP / SDES-SRTP)
>
>Hi,
>
>i've been discussing with several friends about the current discussion
>on the security standard in this mailing lists, in particular regarding
>the topic of DTLS-SRTP trust model posted there
>http://www.ietf.org/mail-archive/web/rtcweb/current/msg04007.html .
>
>I found that there is no common definition for the concept of "end-to-
>end encryption" and there are a lot of misunderstanding about it.
>
>In particular, the fact that two peer can community by exchanging keys
>directly among them, tend to typically to be defined as end-to-end
>encryption.
>
>However the term "end-to-end encryption" have also a general
>misconception that's something that "no one can intercept" .
>
>Unfortunately this is not true for DTLS-SRTP, while for example it's
>true for OpenPGP/MIME or for ZRTP with SAS.
>
>We need to separate the 4 concepts:
>
>- end-to-end encryption
>Ability for a key management system to exchange keys directly without
>relying on intermediate server actively involved in encryption process.
>
>- end-to-end authentication
>Ability for end-user to authenticate the end-to-end encryption process
>without the need to rely on a single or multiple set of trusted third
>parties
>
>- end-to-site encryption
>Ability for a key management system to exchange keys with/trough the
>server with which data are exchanged, involving it in the authentication
>process.
>
>- end-to-site authentication
>Ability for end-user to authenticate the end-to-site encryption process
>based on the same security mechanism used to establish trust with the
>server with which data are exchanged.
>
>
>What i would like to focus is that:
>
>- DTLS does provide end-to-end encryption (in specific context of use)
>- DTLS does provide end-to-site authentication (rely on third party
>trust)
>
>- ZRTP does provide end-to-end encryption (in all context of use)
>- ZRTP does provide end-to-end authentication (does not rely on third
>party trust)
>
>- SDES-SRTP does provide end-to-site encryption (encryption with/trough
>your server)
>- SDES-SRTP does provide end-to-site authentication (you trust your
>server involved in key exchange)
>
>So when we tend to think about the "how much security a technology
>provide" we should probably compare in a scale:
>
>- ZRTP
>  - end-to-end encryption
>  - end-to-end authentication
>- DTLS-SRTP
>  - end-to-end encryption
>  - end-to-site authentication
>- SDES-SRTP
>  - end-to-site encryption
>  - end-to-site authentication
>
>So currently we can affirm that:
>
>- ZRTP does not rely on third party trust for effective security
>- DTLS-SRTP rely on third party trust for effective security
>- SDES-SRTP rely on third party trust for effective security
>
>This is the *MOST IMPORTANT* distinction for an encryption technology:
>			WHO SHOULD I TRUST?
>
>Well, basically it seems to me that DTLS-SRTP and SDES-SRTP both require
>
>So, my point are to:
>
>- Introduce SDES-SRTP for compatibility and simplicity
>  - Specify that the Browser will need to provide indicate the security
>level to the user (like the lock of HTTPS, same security model)
>
>- Introduce end-to-end authentication support for DTLS-SRTP via SAS
>  - Specify that the browser will need to to provide the end-user way to
>use end-to-end authentication and indicate the security level to the
>user.
>
>Then it will be up to the signaling server and/or to the browser
>settings to specificy the required security model:
>- end-to-end encryption + end-to-end authentication or
>- end-to-site encryption + end-to-site authentication
>
>But please don't mix those two as it will be *Very difficult, near to
>impossible* to explain to the user "WHO SHOULD HE TRUST" .
>
>Fabio
>_______________________________________________
>rtcweb mailing list
>rtcweb@ietf.org
>https://www.ietf.org/mailman/listinfo/rtcweb