Re: [secdir] secdir review of draft-ietf-avt-register-srtp-01

"Dan Wing" <dwing@cisco.com> Tue, 20 April 2010 19:13 UTC

Return-Path: <dwing@cisco.com>
X-Original-To: secdir@core3.amsl.com
Delivered-To: secdir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id C002F3A6BB3; Tue, 20 Apr 2010 12:13:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -10.138
X-Spam-Level:
X-Spam-Status: No, score=-10.138 tagged_above=-999 required=5 tests=[AWL=0.461, BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E3VvKxz2pohI; Tue, 20 Apr 2010 12:13:27 -0700 (PDT)
Received: from sj-iport-4.cisco.com (sj-iport-4.cisco.com [171.68.10.86]) by core3.amsl.com (Postfix) with ESMTP id A605F3A68F6; Tue, 20 Apr 2010 12:13:27 -0700 (PDT)
Authentication-Results: sj-iport-4.cisco.com; dkim=neutral (message not signed) header.i=none
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: AhsHANaZzUurR7H+/2dsb2JhbACHWoEUkxlxolGaSIUPBIM0HQ
X-IronPort-AV: E=Sophos;i="4.52,244,1270425600"; d="scan'208";a="118102645"
Received: from sj-core-2.cisco.com ([171.71.177.254]) by sj-iport-4.cisco.com with ESMTP; 20 Apr 2010 19:13:18 +0000
Received: from dwingwxp01 (dhcp-128-107-109-1.cisco.com [128.107.109.1]) by sj-core-2.cisco.com (8.13.8/8.14.3) with ESMTP id o3KJDIfS000522; Tue, 20 Apr 2010 19:13:18 GMT
From: Dan Wing <dwing@cisco.com>
To: 'Sandra Murphy' <sandra.murphy@sparta.com>, secdir@ietf.org, iesg@ietf.org
References: <Pine.WNT.4.64.1004201135160.3436@SMURPHY-LT.columbia.ads.sparta.com>
Date: Tue, 20 Apr 2010 12:13:19 -0700
Message-ID: <02f801cae0bd$897075d0$c3f0200a@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook 11
Thread-Index: AcrgoHlsVNnbn8mpQMOjMblSdXcWgQAHOLeQ
X-Mimeole: Produced By Microsoft MimeOLE V6.00.2900.3350
In-Reply-To: <Pine.WNT.4.64.1004201135160.3436@SMURPHY-LT.columbia.ads.sparta.com>
Cc: draft-ietf-avt-register-srtp@tools.ietf.org, avt-chairs@tools.ietf.org
Subject: Re: [secdir] secdir review of draft-ietf-avt-register-srtp-01
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Apr 2010 19:13:29 -0000

 

> -----Original Message-----
> From: Sandra Murphy [mailto:sandra.murphy@sparta.com] 
> Sent: Tuesday, April 20, 2010 8:45 AM
> To: secdir@ietf.org; iesg@ietf.org
> Cc: avt-chairs@tools.ietf.org; 
> draft-ietf-avt-register-srtp@tools.ietf.org
> Subject: secdir review of draft-ietf-avt-register-srtp-01
> 
> 
> I have reviewed this document as part of the security directorate's 
> ongoing effort to review all IETF documents being processed 
> by the IESG. 
> These comments were written primarily for the benefit of the 
> security area 
> directors.  Document editors and WG chairs should treat these 
> comments 
> just like any other last call comments.
> 
> This document resolves a conflict between IETF process and SRTP 
> registration process, wrt country specific cryptographic 
> transforms.  The 
> IETF process requires that such transforms be published as 
> informational 
> rfcs, but the SRTP documentation requires a standards track RFC for 
> extensions to SRTP.
> 
> This document modifies RFC3711 and RFC4568 to allow either 
> informational 
> RFCs or standards RFCs as the basis of registration in IANA's 
> SRTP Cyrpto 
> Suite Registrations.
> 
> There are no security concerns that I can see that would 
> result from this modification.

Thanks for your review.

> (I have one idle question.  If the crypto suites are only 
> required to be 
> informational, does that mean that the interoperability 
> requirement for 
> standards progress would not apply to the crypto transforms?  
> I do not 
> suggest that this is a problem that needs to be addressed.)

There are mandatory-to-implement standards track SRTP crypto 
suites [RFC3711], which would progress through the standards 
process.

It is true that the informational SRTP crypto suites would not
be progressed.

-d


> --Sandy
>