[secdir] Secdir review of draft-ietf-xrblock-rtcp-xr-pdv-03

Vincent Roca <vincent.roca@inria.fr> Wed, 01 August 2012 21:31 UTC

Return-Path: <vincent.roca@inria.fr>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C38711E8183; Wed, 1 Aug 2012 14:31:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -110.248
X-Spam-Level:
X-Spam-Status: No, score=-110.248 tagged_above=-999 required=5 tests=[AWL=0.001, BAYES_00=-2.599, HELO_EQ_FR=0.35, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SvAOdOmPcS4w; Wed, 1 Aug 2012 14:31:46 -0700 (PDT)
Received: from mail1-relais-roc.national.inria.fr (mail1-relais-roc.national.inria.fr [192.134.164.82]) by ietfa.amsl.com (Postfix) with ESMTP id 511B011E817B; Wed, 1 Aug 2012 14:31:45 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.77,696,1336341600"; d="scan'208";a="168833452"
Received: from ral054r.vpn.inria.fr ([128.93.178.54]) by mail1-relais-roc.national.inria.fr with ESMTP/TLS/AES128-SHA; 01 Aug 2012 23:31:43 +0200
From: Vincent Roca <vincent.roca@inria.fr>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Date: Wed, 1 Aug 2012 23:31:44 +0200
Message-Id: <47091871-198D-4C5C-953A-919696F8CAFC@inria.fr>
To: The IESG <iesg@ietf.org>, secdir@ietf.org, draft-ietf-xrblock-rtcp-xr-pdv.all@tools.ietf.org
Mime-Version: 1.0 (Apple Message framework v1084)
X-Mailer: Apple Mail (2.1084)
Subject: [secdir] Secdir review of draft-ietf-xrblock-rtcp-xr-pdv-03
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Aug 2012 21:31:47 -0000

Hello,

I have reviewed this document as part of the security directorate's
ongoing effort to review all IETF documents being processed by the
IESG.  These comments were written primarily for the benefit of the
security area directors. Document editors and WG chairs should treat
these comments just like any other last call comments.


The authors explain this document introduces no new security
considerations beyond those described in [RFC3611].
I agree there is no privacy risk, but a question I'd like the authors
to discuss a little bit concerns the case where an attacker sends
forged RTCP XR reports, with erroneous Packet Delay Variation values
(e.g. the attacker may pretend the PDV are much smaller than the reality).
I assume this may result in back playout buffer setups, isn't it? This
looks like a cool way to create a DoS.

Is the PDV used for other purposes, like imminent congestion detection?
In that case there could be other incentives for an attacker to fake XR
packets, with possible additional damages. 

I think a paragraph on these risks should be added.

Cheers,

   Vincent