Re: [Rum] RUM security model

"Olle E. Johansson" <oej@edvina.net> Tue, 29 September 2020 06:08 UTC

Return-Path: <oej@edvina.net>
X-Original-To: rum@ietfa.amsl.com
Delivered-To: rum@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC8873A07BD for <rum@ietfa.amsl.com>; Mon, 28 Sep 2020 23:08:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KJ_zsnKzN-fJ for <rum@ietfa.amsl.com>; Mon, 28 Sep 2020 23:08:00 -0700 (PDT)
Received: from smtp7.webway.se (smtp7.webway.se [212.3.14.205]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 098793A0822 for <rum@ietf.org>; Mon, 28 Sep 2020 23:07:59 -0700 (PDT)
Received: from macbook-pro.webway.org (h-205-16.A165.corp.bahnhof.se [176.10.205.16]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp7.webway.se (Postfix) with ESMTPSA id 7795B2361; Tue, 29 Sep 2020 08:07:46 +0200 (CEST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\))
From: "Olle E. Johansson" <oej@edvina.net>
In-Reply-To: <bafc0030-53c6-bb93-cdb1-587b042e78f5@alum.mit.edu>
Date: Tue, 29 Sep 2020 08:07:36 +0200
Cc: Olle E Johansson <oej@edvina.net>, rum@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <EEABE6F0-1720-4279-AC4F-3DCB10B6724C@edvina.net>
References: <159838856681.32208.2945571627178413540@ietfa.amsl.com> <E4141C48-64A1-4A34-81CD-2AFB098E411C@brianrosen.net> <eee4a662-9ccd-0ded-4639-76f5be34924b@alum.mit.edu> <a4a62f53-1571-56ec-35b9-7faecd4fa480@alum.mit.edu> <303CFB8D-1323-4237-8D84-91BF6201B6F5@brianrosen.net> <ce9be41c-381e-81c5-6b8d-e1feb34291ee@alum.mit.edu> <bafc0030-53c6-bb93-cdb1-587b042e78f5@alum.mit.edu>
To: Paul Kyzivat <pkyzivat@alum.mit.edu>
X-Mailer: Apple Mail (2.3608.120.23.2.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/rum/GpZ9iHE3UajSv3Yk_OSjqU3JhRM>
Subject: Re: [Rum] RUM security model
X-BeenThere: rum@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Relay User Machine <rum.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rum>, <mailto:rum-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rum/>
List-Post: <mailto:rum@ietf.org>
List-Help: <mailto:rum-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rum>, <mailto:rum-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 29 Sep 2020 06:08:03 -0000


> On 28 Sep 2020, at 21:33, Paul Kyzivat <pkyzivat@alum.mit.edu> wrote:
> 
> On 9/27/20 12:35 AM, Paul Kyzivat wrote:
>> On 9/26/20 8:58 PM, Brian Rosen wrote:
>>> I think we do want the spec to support multiple providers on one device/user.  I think that’s the point of having the file.  If it wasn’t them the user could just use the password for the single provider directly and not need any other mechanism.
>>> 
>>> ISTM that if the user has a password (and possibly a second factor like a USB security device), then it can securely unlock a local resource that contains the credentials.  They can be stored encrypted, where the decrypt requires the passwords at least initially.
>>> 
>>> The simplest model is perhaps too simple: a local encrypted file containing sign-on credentials that is decrypted with the user entering a password.  That is one password per user regardless of how many providers they use.
>> Yes, I think it is too simple. The RUE needs access to those sign-on credentials in situations where the user isn't present. For instance, suppose it is restarted due to power failure. Then it must reregister ASAP in order to be available to receive incoming calls. There are lots of other cases as well.
> 
> I definitely am not up to speed on the state of the art in this area. I wonder if we can recruit an expert to help. Perhaps request a security review.
> 
I think RUM is a perfect use-case for the new Oauth2/OpenID Connect auth mechanism in SIP.

/O