Re: [secdir] Secdir last call review of draft-ietf-ice-rfc5245bis-16

Christer Holmberg <christer.holmberg@ericsson.com> Sun, 28 January 2018 12:57 UTC

Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41EA812EBCC; Sun, 28 Jan 2018 04:57:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c9JxMJJ3W51I; Sun, 28 Jan 2018 04:57:29 -0800 (PST)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 938AB12EBC6; Sun, 28 Jan 2018 04:57:28 -0800 (PST)
X-AuditID: c1b4fb25-48bff7000000341b-35-5a6dc8b6b585
Received: from ESESSHC012.ericsson.se (Unknown_Domain [153.88.183.54]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id FB.83.13339.6B8CD6A5; Sun, 28 Jan 2018 13:57:26 +0100 (CET)
Received: from ESESSMB109.ericsson.se ([169.254.9.195]) by ESESSHC012.ericsson.se ([153.88.183.54]) with mapi id 14.03.0352.000; Sun, 28 Jan 2018 13:57:25 +0100
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, "secdir@ietf.org" <secdir@ietf.org>
CC: "draft-ietf-ice-rfc5245bis.all@ietf.org" <draft-ietf-ice-rfc5245bis.all@ietf.org>, "ietf@ietf.org" <ietf@ietf.org>, "ice@ietf.org" <ice@ietf.org>
Thread-Topic: Secdir last call review of draft-ietf-ice-rfc5245bis-16
Thread-Index: AQHTlsWSdlXqvNmVDEWzQ6CHG1vNgKOG2Qlg
Date: Sun, 28 Jan 2018 12:57:24 +0000
Message-ID: <7594FB04B1934943A5C02806D1A2204B6C143E76@ESESSMB109.ericsson.se>
References: <151698534014.492.17944720668568287169@ietfa.amsl.com>
In-Reply-To: <151698534014.492.17944720668568287169@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [153.88.183.154]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupkkeLIzCtJLcpLzFFi42KZGbHdTHfbidwog5OX+C2O//jDbvHtQq3F s43zWSw+LHzIYjF97zV2B1aPtd1X2TyWLPnJFMAUxWWTkpqTWZZapG+XwJWx+NlZpoJ3SRUr Zu1ib2BckdDFyMkhIWAisW9KJ0sXIxeHkMBhRokD0z4yQThLGCUOP1zF3sXIwcEmYCHR/U8b pEFEIEzi/vtDrCA1zAIzGSVe/3zJCJIQFnCRePmtjRWiyFVi5aYfTBC2kcSh1w3MIDaLgKrE rAULwGp4BXwldh6YBBYXEnCSePp6FhuIzSngLNG7oJkdxGYUEJP4fmoN2BxmAXGJW0/mM0Fc LSCxZM95ZghbVOLl43+sELaSxKLbn5lAbmYW0JRYv0sfolVRYkr3Q3aItYISJ2c+YZnAKDoL ydRZCB2zkHTMQtKxgJFlFaNocWpxUm66kbFealFmcnFxfp5eXmrJJkZgBB3c8lt1B+PlN46H GAU4GJV4eCfszo0SYk0sK67MPcQowcGsJMJ7bDpQiDclsbIqtSg/vqg0J7X4EKM0B4uSOO9J T94oIYH0xJLU7NTUgtQimCwTB6dUA2OAa92DZ3OXf6vM8vy/+1j5+Vu6fcYnmrRTZl090TKB 1fuHVafEDd2vYfUCUlNNkhtP7H915brJXS7TB6v4K45ev1DtvVNY5F7NwU7WhvN3AlJPHjBS KOu/9yb5TDDLg9wgm7cK/RaHIz4ZVuc+EdkeulKKpVjy/tUZLfe9X7X7Rr/+JZQvKaHEUpyR aKjFXFScCADbg0U4nAIAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/4hPuw2lzohk6bGotPsa6tlUyzzs>
Subject: Re: [secdir] Secdir last call review of draft-ietf-ice-rfc5245bis-16
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 28 Jan 2018 12:57:32 -0000

Hi Stephen,

Thank You for your review! Please see inline.

>Reviewer: Stephen Farrell
>Review result: Has Issues
>
>(1) I think a bit more work on the security and privacy issues around ICE would improve >the document, and hopefully, ICE implementations.
>
>- There has been (IMO somewhat justified) concern [1] about exposing all possible >addresses, for example where one is from a VPN intended to preserve privacy, say if a >user is aiming to circumvent local censorship or surveillance.  5.1.1.1 has a SHOULD that, >as I read it, says to always include such addresses.  
>
>   [1] https://www.w3.org/wiki/Privacy/IPAddresses
>
>(Note: I'm not claiming [1] is authoritative, it's just a page I found that describes the issue reasonably well.)
>
>There is a bit of text about this (1st para in section 19), but IMO it's a bit weak. 
>
>- Did the WG consider REQUIRING or RECOMMENDING agent implementations
>  provide some local interface that allows the host or an application to say "Don't use 
> <this> interface to generate any candidates until I tell you otherwise"?  That might be 
> better than having VPN operators recommending to turn off WebRTC entirely for 
> example. (Note: this is my main comment, the rest are mostly suggested things to think 
> about, if you've not already.)
>
> - Even if the text isn't changed, a reference to [2] would I think be
>  useful. (Assuming [2] is still being worked on in rtcweb, though mind you, I don't like 
> how [2] refers to "consent" as I doubt a random person can really provide meaningful 
> consent for things like this.)
>
>   [2] https://tools.ietf.org/html/draft-ietf-rtcweb-ip-handling-04

I would not want to REQUIRE implementing a local interface for controlling the candidates, as ICE is also used by different types of network entities (gateways etc). But, I am ok to RECOMMEND.

What about:

OLD:

   "Individual implementations may also have implementation-specific rules for controlling which
   addresses are revealed."

NEW:

   "Individual implementations may also have implementation-specific rules for controlling which
   addresses are revealed. It is RECOMMENDED that applications interacting with human users provide 
   a user interfaces that allows the users to control which interfaces are used to generate candidates, or 
   when to use candidates generated for the interfaces.

   [REF-to- draft-ietf-rtcweb-ip-handling] provide additional information and
   Requirements regarding the handing of IP addresses for WebRTC applications."

> - Separately [1] also describes another potential privacy issue with
>  STUN urls. I think it'd be worthwhile noting such issues that have been found with deployments of 
> ICE here, as any protocol using ICE and accepting non locally configured STUN/TURN URLs may have 
> issues like that. For example, a recent paper [3] also describes some attacks (in section 4.2 mostly) that 
> could (I guess) be mounted against any ICE agent and not only WebRTC clients. That'd be worth a reference 
> and maybe thinking about which attacks are generic ICE issues and don't only affect WebRTC.
>
>   [3] https://doi.org/10.1145/3019612.3019844

I am struggling to figure out exactly what to do here... I really hope we don't have to perfom a study on [3], and see what is general, and what is WebRTC-specific. Are we even allowed to reference [3], as it's not freely available?

Some help and guidance would be appreciated :)

---

> - I also wondered if I can fingerprint a host based on how it does ICE?  
>  I  suspect that might work, but haven't tried to figure out details.
>
> - Could I probe an internal network based on feeding it candidates to
>  check? E.g. checking timing of reactions.  If I could that seems noteworthy.

Something like?

"Based on the types of candidates provided by the peer, and the results of the connectivity tests performed 
Against those candidates, an agent might be able to determine characteristics of the peer network."

---

> (2) 5.3: "...MUST contain ... <foo> bits of randomness" Don't you need to say when these values MUST be different and when they're ok to be re-used? I forget if STUN/TURN do that. 

Section 7.2.2 says:

"A connectivity check Binding request MUST utilize the STUN short-term credential mechanism."

RFC 5389 (STUN) says:

      "Short-Term Credential:  A temporary username and associated password
      that represent a shared secret between client and server.  Short-
      term credentials are obtained through some kind of protocol
      mechanism between the client and server, preceding the STUN
      exchange.  A short-term credential has an explicit temporal scope,
      which may be based on a specific amount of time (such as 5
      minutes) or on an event (such as termination of a SIP dialog).
      The specific scope of a short-term credential is defined by the
      application usage."

If anything extra is needed, I think that should be done as an update to STUN.

 > (Also - the phrasing isn't that great - how do I "contain" randomness? But that's just a nit.)

Do you have a suggestion for a better word?

========================

Nits:

> I took a look at the diff [4] between this and 5245, but that wasn't really that useful, so this review is based on
> a read of the draft without comparing it to 5245. Apologies if that causes me to comment on text that's
> unchanged - in such cases, I think it's fine to not heed those particular comments. 
>
>   [4] https://tools.ietf.org/rfcdiff?url1=rfc5245&url2=draft-ietf-ice-rfc5245bis-16.txt
>
> - 2.1: Why "only UDP specified here"? Does that include QUIC which is
>   UDP-based, but not UDP? I assume so.

There is a separate specification, RFC 6544, for TCP based candidates.

Regarding QUIC, I don't know. QUIC wasn't discussed during the work, but how/if the procedures also apply to QUIC without any modifications etc I don't know.

> - 2.3: how the controlling/controlled stuff works isn't clear from
>  this, nor even (as I was reading it) in section 7.3.1.1 - I wasn't clear how the tie-breaker value is initialised until I got to 16.1.
> In any case I think a bit more explanatory text in 2.3 might be good.
> (But if implementers haven't had a problem with this, maybe it's just me.)

In general, one of the tasks of the bis work was to *simplify* section 2, because the previous version was too detailed for non-implementers who just want to figure out what ICE is all about (in order to  actually implement ICE, reading section 2 is obviously not enough). For that reason, my opinion was that section 2 doesn't really need to talk about role conflicts and tie-breaker values, as it's not essential for a high-level description of ICE.

---

> - 5.2: "The procedures in this section is common across the initiating
>  and responding agents." s/is/are/ I guess?

Yes. I will fix as suggested.

---

> - 6.1.1: What is "3PCC"? That note could maybe also do with a
>  reference, as I at least don't get what you're trying to tell me. Ah
> - it's 3rd party call control (mentioned in 7.3.1.1).

I can use "3PCC (3rd Party Call Control)" in section 6.1.1.

As the spec is protocol independent, I don't think there are any references that can be added.

---

> - 16.1: For a given ICE session, are the random numbers in the
>  ICE-CONTROLLED and ICE-CONTROLLING attributes sent by the same agent supposed to have
> the same value? I wasn't clear. If they are the same, I understand how tie-breaking happens. 
> If they can differ, I'm not sure. (But I didn't go back and re-read 7.3.1.1, so it may be ok either 
> way:-) 

It is covered in the 2nd paragraph of section 7.2.5.1, which says that the agent MAY change the value when it switches role.

> In any case saying "referred to as the tie-breaker value" twice seems odd. 

I'll remove it from the ICE-CONTROLLING definition.

---

> - 16.1: (mega-mega-nit:-) the fact that tie-breaker is split over a
>  line-breaker here is why I didn't find this when I was reading
> 2.3/7.3.1.1 - maybe tweak the words so a grep will find it?)

Good catch. I'll fix it.

It would be really cool if search functions could discard line-breaks when searching for strings.

---

> - 17: "looking to deploy ICE" is a bit confusing - do you mean
>  "looking to be nice to ICE"? My assumption is that endpoints deploy ICE agents but 
> network operators don't, though they might deploy STUN/TURN servers I guess. But 
> maybe I'm thinking too much about WebRTC there.

Perhaps something like:

   "This section discusses issues relevant to operators operating networks where ICE will be used by endpoints."

---

> - 18: I wondered if this is still needed, given that 5245 already said
>  it (I didn't check if the text has been updated). Saying this once would seem sufficient 
> to me anyway. I guess leaving it in is the easier path.

I'll leave it :)

---

> - 19: s/DNS-SEC/DNSSEC/ would be more common

I will fix as suggested.

---

> - 19.4.1: 1st sentence if missing a "T" - s/he/The/

I will fix as suggested.

---

Regards,

Christer