Re: [secdir] SECDIR review of draft-ietf-mmusic-sdp-mux-attributes-13

"Suhas Nandakumar (snandaku)" <snandaku@cisco.com> Thu, 25 August 2016 18:07 UTC

Return-Path: <snandaku@cisco.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E7E512D563; Thu, 25 Aug 2016 11:07:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.068
X-Spam-Level:
X-Spam-Status: No, score=-15.068 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.548, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kYiFeRC14mGi; Thu, 25 Aug 2016 11:07:56 -0700 (PDT)
Received: from rcdn-iport-6.cisco.com (rcdn-iport-6.cisco.com [173.37.86.77]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8C11E12D575; Thu, 25 Aug 2016 11:07:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=8897; q=dns/txt; s=iport; t=1472148476; x=1473358076; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=ocL512yrKhDxJWjQEGHLZjk3aeu8SuCf62DEPqZxlOw=; b=dxaAWwe6W7yCoe90tGSPGTIQ1UTQLk5VWX4p7dEkjOF2DR1Ci0TSJHpY NEFKaaEPRTGtLAjPkNVHftJN/2LVRektjhQarMzxlRUZPgDtpi4+zYWQa ao9ZORKaffvlYU+CPlkDOaBgxM+mUDDXqx/o7ODjgXEjrQmJCo7+E53MR Y=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AGBAAuM79X/5JdJa1dgnYzAQEBAQEegVIHhgyhbgEEg2qHJoJ5gg+BfIYdAoFcOBQCAQEBAQEBAV4nhGEBAQV5EAIBCBEEAQEKJQ8SER0IAgQBDQWIGAMXu3cNg2wBAQEBAQEBAQEBAQEBAQEBAQEBAQEchi6ETYJDh1kFjB+CPIo7NAGMWoJLgW2EXYkHiDiECYN4AR42ghUcgUxwhB6BLxNsAQEB
X-IronPort-AV: E=Sophos;i="5.28,576,1464652800"; d="scan'208,217";a="141720159"
Received: from rcdn-core-10.cisco.com ([173.37.93.146]) by rcdn-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 25 Aug 2016 18:07:55 +0000
Received: from XCH-ALN-005.cisco.com (xch-aln-005.cisco.com [173.36.7.15]) by rcdn-core-10.cisco.com (8.14.5/8.14.5) with ESMTP id u7PI7teB008929 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 25 Aug 2016 18:07:55 GMT
Received: from xch-aln-008.cisco.com (173.36.7.18) by XCH-ALN-005.cisco.com (173.36.7.15) with Microsoft SMTP Server (TLS) id 15.0.1210.3; Thu, 25 Aug 2016 13:07:54 -0500
Received: from xch-aln-008.cisco.com ([173.36.7.18]) by XCH-ALN-008.cisco.com ([173.36.7.18]) with mapi id 15.00.1210.000; Thu, 25 Aug 2016 13:07:54 -0500
From: "Suhas Nandakumar (snandaku)" <snandaku@cisco.com>
To: Chris Lonvick <lonvick.ietf@gmail.com>, "iesg@ietf.org" <iesg@ietf.org>, "secdir@ietf.org" <secdir@ietf.org>, "draft-ietf-mmusic-sdp-mux-attributes.all@ietf.org" <draft-ietf-mmusic-sdp-mux-attributes.all@ietf.org>
Thread-Topic: SECDIR review of draft-ietf-mmusic-sdp-mux-attributes-13
Thread-Index: AQHR5bltj7pCDEeP606GPrcWxOR4VKBaJ8l1
Date: Thu, 25 Aug 2016 18:07:54 +0000
Message-ID: <1472148474472.98410@cisco.com>
References: <5794D308.7010401@gmail.com>,<5794D38E.90709@gmail.com>
In-Reply-To: <5794D38E.90709@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.24.64.93]
Content-Type: multipart/alternative; boundary="_000_147214847447298410ciscocom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/Q9WZI_vw0FNEGm0DMkdBkJ7-e00>
Cc: "Cullen Jennings (fluffy)" <fluffy@cisco.com>, "Flemming Andreasen (fandreas)" <fandreas@cisco.com>, Bo Burman <bo.burman@ericsson.com>, "Suhas Nandakumar (snandaku)" <snandaku@cisco.com>
Subject: Re: [secdir] SECDIR review of draft-ietf-mmusic-sdp-mux-attributes-13
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Aug 2016 18:07:58 -0000

?Hello Chris


   Apologies for the delayed response ( was on vacation :-) )



   Please see inline for responses to your review comments (marked with [[Suhas]] )?


Thanks

Suhas Nandakumar


________________________________
From: Chris Lonvick <lonvick.ietf@gmail.com>
Sent: Sunday, July 24, 2016 7:41 AM
To: iesg@ietf.org; secdir@ietf.org; draft-ietf-mmusic-sdp-mux-attributes.all@ietf.org
Subject: Re: SECDIR review of draft-ietf-mmusic-sdp-mux-attributes-13

Apologies for the duplication - resending to the right alias.

On 7/24/16 9:39 AM, Chris Lonvick wrote:
Hi,

I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments.

I've been rather busy and haven't had time to thoroughly review this document. But I did look at the Security Considerations section and will recommend that some additions be made. The Security Considerations section says, "This document does not add any new security considerations beyond the existing considerations in the RFCs for protocols that are being multiplexed together. " (First paragraph.) I believe that it would be helpful to readers and implementers if the specification were to give pointers to RFCs for protocols that are being multiplexed together, and their security considerations.

[[Suhas]] - On further internal discussions, we think the above paragraph needs to be rephrased as below to be specific on the goals of this specification.
"This document does not add any new security considerations beyond the existing considerations in the RTP  RFCs (RFC3550 and RFC3711) referenced by this specification."


The section continues by saying, "The ways that SRTP streams are keyed is not believed to create any two-time pad vulnerability for the currently defined SRTP keying mechanism." (Second paragraph.) I may not have seen it but I don't believe that this document specifies keying for SRTP streams, but only references RFC4567 (Section 5.35) and RFC4572 (Section 5.36). If that's the case, then this document doesn't need to opine about possible vulnerabilities in that area; leave it to those or subsequent documents to make that analysis.
[[Suhas]] - Agree with you. I will delete the sentence.

It would be appropriate to reiterate that the CAUTION category may produce some problems.
[[Suhas]] - Sure, will add something in the lines of below
"When multiplexing SDP attributes with the category "CAUTION", the implementations should be aware of possible issues as described in this specification"


For completeness, it may be good to include pointers to other mmusic and SDP documents that have addressed security aspects. A statement of how that may apply to this specification would be appropriate. I don't think this would need to be detailed.

[[Suhas]] How about something on the lines below.
"The primary security for RTP including the way it is used here is described in RC3550 and RFC3711" .

Best regards,
Chris