Re: [secdir] Security review of draft-ietf-rtcweb-fec-08 (was Re: Security review of draft-ietf-perc-srtp-ekt-diet-08)

Hilarie Orman <hilarie@purplestreak.com> Sat, 09 February 2019 01:46 UTC

Return-Path: <hilarie@purplestreak.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EE0B1310B5; Fri, 8 Feb 2019 17:46:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level:
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uGv1tgBwuEWL; Fri, 8 Feb 2019 17:46:19 -0800 (PST)
Received: from out02.mta.xmission.com (out02.mta.xmission.com [166.70.13.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 38885130E8B; Fri, 8 Feb 2019 17:46:18 -0800 (PST)
Received: from in02.mta.xmission.com ([166.70.13.52]) by out02.mta.xmission.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.87) (envelope-from <hilarie@purplestreak.com>) id 1gsHij-0005Tk-SV; Fri, 08 Feb 2019 18:46:17 -0700
Received: from mta1.zcs.xmission.com ([166.70.13.65]) by in02.mta.xmission.com with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.87) (envelope-from <hilarie@purplestreak.com>) id 1gsHih-0007B7-LJ; Fri, 08 Feb 2019 18:46:17 -0700
Received: from localhost (localhost [127.0.0.1]) by mta1.zcs.xmission.com (Postfix) with ESMTP id 651E51C426F; Fri, 8 Feb 2019 18:46:15 -0700 (MST)
Received: from mta1.zcs.xmission.com ([127.0.0.1]) by localhost (mta1.zcs.xmission.com [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id PpWY9NKW452O; Fri, 8 Feb 2019 18:46:15 -0700 (MST)
Received: from zms04.zcs.xmission.com (zms04.zcs.xmission.com [166.70.13.74]) by mta1.zcs.xmission.com (Postfix) with ESMTP id 346A21C4023; Fri, 8 Feb 2019 18:46:15 -0700 (MST)
Date: Fri, 08 Feb 2019 18:46:15 -0700
From: Hilarie Orman <hilarie@purplestreak.com>
To: Justin Uberti <justin@uberti.name>
Cc: Ben Campbell <ben@nostrum.com>, The IESG <iesg@ietf.org>, secdir@ietf.org, draft-ietf-rtcweb-fec all <draft-ietf-rtcweb-fec.all@tools.ietf.org>
Message-ID: <240284129.169422738.1549676775109.JavaMail.zimbra@purplestreak.com>
In-Reply-To: <CALe60zD=OeTfjof3Q5UqnJRHsAQC-kS1oZYaQZ5HahAVOJgVKQ@mail.gmail.com>
References: <201902010742.x117gdGm030846@rumpleteazer.rhmr.com> <F44FA6A0-4599-4BFF-8BEB-C67774714762@nostrum.com> <CALe60zD=OeTfjof3Q5UqnJRHsAQC-kS1oZYaQZ5HahAVOJgVKQ@mail.gmail.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
X-Originating-IP: [72.250.219.84]
X-Mailer: Zimbra 8.8.11_GA_3737 (zclient/8.8.11_GA_3737)
Thread-Topic: Security review of draft-ietf-rtcweb-fec-08 (was Re: Security review of draft-ietf-perc-srtp-ekt-diet-08)
Thread-Index: DdFd3PqzOZiRYIKogCzHR/HUnmbKXQ==
X-XM-SPF: eid=1gsHih-0007B7-LJ; ; ; mid=<240284129.169422738.1549676775109.JavaMail.zimbra@purplestreak.com>; ; ; hst=in02.mta.xmission.com; ; ; ip=166.70.13.65; ; ; frm=hilarie@purplestreak.com; ; ; spf=none
X-SA-Exim-Connect-IP: 166.70.13.65
X-SA-Exim-Mail-From: hilarie@purplestreak.com
X-Spam-DCC: XMission; sa04 1397; Body=1 Fuz1=1 Fuz2=1
X-Spam-Combo: ******;Justin Uberti <justin@uberti.name>
X-Spam-Relay-Country: US
X-Spam-Timing: total 1935 ms - load_scoreonly_sql: 0.05 (0.0%), signal_user_changed: 3.4 (0.2%), b_tie_ro: 2.3 (0.1%), parse: 1.80 (0.1%), extract_message_metadata: 39 (2.0%), get_uri_detail_list: 4.1 (0.2%), tests_pri_-1000: 21 (1.1%), tests_pri_-950: 1.16 (0.1%), tests_pri_-900: 1.23 (0.1%), tests_pri_-90: 30 (1.5%), check_bayes: 28 (1.4%), b_tokenize: 11 (0.6%), b_tok_get_all: 8 (0.4%), b_comp_prob: 3.6 (0.2%), b_tok_touch_all: 3.5 (0.2%), b_finish: 0.70 (0.0%), tests_pri_0: 839 (43.4%), check_dkim_signature: 0.68 (0.0%), check_dkim_adsp: 164 (8.5%), poll_dns_idle: 1109 (57.3%), tests_pri_10: 1.90 (0.1%), tests_pri_500: 987 (51.0%), rewrite_mail: 0.00 (0.0%)
X-SA-Exim-Version: 4.2.1 (built Thu, 05 May 2016 13:38:54 -0600)
X-SA-Exim-Scanned: Yes (on in02.mta.xmission.com)
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/7lc8Os5yi8TO5T7J6VXofDsr39U>
Subject: Re: [secdir] Security review of draft-ietf-rtcweb-fec-08 (was Re: Security review of draft-ietf-perc-srtp-ekt-diet-08)
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 09 Feb 2019 01:46:22 -0000

I think that the purpose of the FEC should be explicit, else the interaction with
encryption will remain a source of confusion forever.

Hilarie  

----- Original Message -----
From: Justin Uberti <justin@uberti.name>
To: Ben Campbell <ben@nostrum.com>
Cc: Hilarie Orman <hilarie@purplestreak.com>, The IESG <iesg@ietf.org>, secdir@ietf.org, draft-ietf-rtcweb-fec all <draft-ietf-rtcweb-fec.all@tools.ietf.org>
Sent: Fri, 08 Feb 2019 18:20:41 -0700 (MST)
Subject: Re: Security review of draft-ietf-rtcweb-fec-08 (was Re: Security review of draft-ietf-perc-srtp-ekt-diet-08)

On Fri, Feb 1, 2019 at 2:49 PM Ben Campbell <ben@nostrum.com> wrote:

> Hi,
>
> Please note that this review is for draft-ietf-rtcweb-fec-08, not the PERC
> draft referenced in the subject.
>
> Thanks!
>
> Ben.
>
>
> > On Feb 1, 2019, at 1:42 AM, Hilarie Orman <hilarie@purplestreak.com>
> wrote:
> >
> > Security Review of WebRTC Forward Error Correction Requirements
> > draft-ietf-rtcweb-fec-08
> >
> > Do not be alarmed.  I have reviewed this document as part of the
> > security directorate's ongoing effort to review all IETF documents
> > being processed by the IESG.  These comments were written primarily
> > for the benefit of the security area directors.  Document editors and
> > WG chairs should treat these comments just like any other last call
> > comments.
> >
> > The document describes the appropriate uses of FEC for web content when
> > using WebRTC.  It also describes how to indicate that FEC is being used.
> >
> > The Security Considerations mention the possibility of additional network
> > congestion when using FEC.  Although this can be a problem, I do not
> think
> > it is a security issue, thus it does not belong in this section.
>

Understood. I think this paragraph could easily be moved to the preceding
section.

> >
> > There is a security-related issue wrt to FEC and encryption.  If the
> > error model is that message blocks may be lost but not altered in
> > transit, then FEC with encryption is fine.  But if FEC is added for
> > the purpose of correcting corrupted bits in a message block, then it
> > is important that FEC is done after encryption.  The draft seems to
> > ignore the issue, and it also seems to recommend a processing scheme
> > that would result in encryption of the FEC data.  If there is a body
> > of practice for other IETF FEC protocols that explains these issues,
> > an explicit reference to it in the Security Considerations would be
> > very helpful.
>
> FEC is added specifically to protect against lost blocks. Any corruption
of the blocks will be detected by the decryption procedure, and such blocks
will be discarded.

There is a reference to RFC 3711, which stipulates the fec-then-encrypt
ordering. RFC 3711 is admittedly terse on this subject, but it is quite
clear about the ordering.