[secdir] review of draft-ietf-mediactrl-architecture-04

"Scott G. Kelly" <scott@hyperthought.com> Thu, 12 February 2009 21:43 UTC

Return-Path: <scott@hyperthought.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 83A2B3A6982 for <secdir@core3.amsl.com>; Thu, 12 Feb 2009 13:43:08 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.599
X-Spam-Level:
X-Spam-Status: No, score=-3.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sYkoQfGglWlH for <secdir@core3.amsl.com>; Thu, 12 Feb 2009 13:43:07 -0800 (PST)
Received: from smtp152.sat.emailsrvr.com (smtp152.sat.emailsrvr.com [66.216.121.152]) by core3.amsl.com (Postfix) with ESMTP id A36F93A6BDF for <secdir@ietf.org>; Thu, 12 Feb 2009 13:43:07 -0800 (PST)
Received: from relay15.relay.sat.mlsrvr.com (localhost [127.0.0.1]) by relay15.relay.sat.mlsrvr.com (SMTP Server) with ESMTP id 32B9B1C3DB3; Thu, 12 Feb 2009 16:43:12 -0500 (EST)
Received: by relay15.relay.sat.mlsrvr.com (Authenticated sender: scott-AT-hyperthought.com) with ESMTPSA id A6B751D0804; Thu, 12 Feb 2009 16:43:11 -0500 (EST)
Message-ID: <4994981B.2000907@hyperthought.com>
Date: Thu, 12 Feb 2009 13:43:55 -0800
From: "Scott G. Kelly" <scott@hyperthought.com>
User-Agent: Thunderbird 2.0.0.19 (Windows/20081209)
MIME-Version: 1.0
To: secdir@ietf.org, iesg@ietf.org, tim.melanchuk@gmail.com, mediactrl-chairs@tools.ietf.org
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Subject: [secdir] review of draft-ietf-mediactrl-architecture-04
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 12 Feb 2009 21:43:08 -0000

I have reviewed this document as part of the security directorate's 
ongoing effort to review all IETF documents being processed by the IESG. 
  These comments were written primarily for the benefit of the security 
area directors.  Document editors and WG chairs should treat these 
comments just like any other last call comments.

This is an architecture document describing a framework for media server 
control which combines elements from several related working groups and 
protocols. The framework described in this document consists of 3 
elements: the application server, the media server, and the user agent. 
The document focuses on the interactions between the application server 
and the media server, and declares the user agent interactions to be out 
of scope.

The security considerations section says that media servers use the 
security mechanisms of SIP to authenticate requests from application 
servers, and to ensure the integrity of those requests, and says that 
this ensures that only authorized application servers may access the 
media server and impact its resources.

I have two concerns: first, the current security considerations section 
focuses on the media server and how to protect against malicious 
application servers (or AS impersonators) -- it should also address the 
flip side of this, i.e. what happens if someone impersonates the media 
server, and what, if anything, should be done? If this is addressed in 
some other related document, then perhaps a pointer to that other 
document would be helpful.

My other concern is a bit more nebulous: this work seems to cut across 
multiple other efforts (more than I have time to seriously review right 
now), and while I think it makes sense to reference the security 
considerations of other documents when they adequately address the 
problems at hand, I think the wg (and security ADs) will want to be sure 
that the particular threats of this framework are explicitly called out 
and completely addressed. This architecture document may or may not be 
the right place to do that.

--Scott