Re: [secdir] [payload] sec-dir review of draft-ietf-payload-rtp-opus-08

"Derek Atkins" <derek@ihtfp.com> Thu, 09 April 2015 14:19 UTC

Return-Path: <derek@ihtfp.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A64AC1A6F02; Thu, 9 Apr 2015 07:19:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.289
X-Spam-Level:
X-Spam-Status: No, score=-1.289 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_MISMATCH_ORG=0.611] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lhqOe9T9nh37; Thu, 9 Apr 2015 07:19:39 -0700 (PDT)
Received: from mail2.ihtfp.org (MAIL2.IHTFP.ORG [204.107.200.7]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6BB7B1A1F00; Thu, 9 Apr 2015 07:19:39 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail2.ihtfp.org (Postfix) with ESMTP id 31EB8E2036; Thu, 9 Apr 2015 10:19:38 -0400 (EDT)
Received: from mail2.ihtfp.org ([127.0.0.1]) by localhost (mail2.ihtfp.org [127.0.0.1]) (amavisd-maia, port 10024) with ESMTP id 17099-01; Thu, 9 Apr 2015 10:19:35 -0400 (EDT)
Received: by mail2.ihtfp.org (Postfix, from userid 48) id A0B74E2038; Thu, 9 Apr 2015 10:19:35 -0400 (EDT)
Received: from 192.168.248.204 (SquirrelMail authenticated user warlord) by mail2.ihtfp.org with HTTP; Thu, 9 Apr 2015 10:19:35 -0400
Message-ID: <f609a3a3528c26aa832927bfeb78e978.squirrel@mail2.ihtfp.org>
In-Reply-To: <E4980EE8-5CBE-46D1-9B39-BE97B041B148@nostrum.com>
References: <sjmoaosz53h.fsf@securerf.ihtfp.org> <551EFB9C.4040504@xiph.org> <sjmy4m5grwp.fsf@securerf.ihtfp.org> <269A06E2-6704-4E5E-BBFD-92F157639261@nostrum.com> <5522D40E.8040402@nostrum.com> <73626E80-1EBA-4A85-83DD-32423649DBD1@csperkins.org> <035501d0711a$7856b0a0$690411e0$@gmail.com> <5523C5AE.7040108@mozilla.com> <sjmpp7ggft8.fsf@securerf.ihtfp.org> <CAHbuEH63BtaENfm6-_itp1eLtSCyC8LRvGbGPbKVAR-k6GQdZA@mail.gmail.com> <927CC992-13D7-41B9-A9AF-7F4E31905DF2@csperkins.org> <sjmd23ehf4o.fsf@securerf.ihtfp.org> <402C1C17-65A1-4461-9CA8-D7035022DEFE@csperkins.org> <759691e866a2fc8c41aa43acc18cbd19.squirrel@mail2.ihtfp.org> <B9A87595-5AAF-47CA-B898-8C8601D3B8C1@nostrum.com> <8D455380-E490-4026-8485-4CE05F345E7F@nostrum.com> <82197574-D574-45C1-BFCF-0826E0037ED3@csperkins.org> <sjm8ue1h1hc.fsf@securerf.ihtfp.org> <D8C8B618-E131-4F64-BFAC-CA62F7A354B8@nostrum.com> <92033c98980490d44f219907a64e6434.squirrel@mail2.ihtfp.org> <E4980EE8-5CBE-46D1-9B39-BE97B041B148@nostrum.com>
Date: Thu, 09 Apr 2015 10:19:35 -0400
From: Derek Atkins <derek@ihtfp.com>
To: Ben Campbell <ben@nostrum.com>
User-Agent: SquirrelMail/1.4.22-14.fc20
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
X-Virus-Scanned: Maia Mailguard 1.0.2a
Archived-At: <http://mailarchive.ietf.org/arch/msg/secdir/jpcYaDA7pHQC6hwTe0oqkzCNXC4>
Cc: "secdir@ietf.org" <secdir@ietf.org>, payload@ietf.org, jspittka@gmail.com, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, "iesg@ietf.org" <iesg@ietf.org>, payload-chairs@tools.ietf.org, koenvos74@gmail.com, Colin Perkins <csp@csperkins.org>
Subject: Re: [secdir] [payload] sec-dir review of draft-ietf-payload-rtp-opus-08
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Apr 2015 14:19:40 -0000

On Thu, April 9, 2015 10:07 am, Ben Campbell wrote:
> On 9 Apr 2015, at 9:00, Derek Atkins wrote:
>
>> Ben,
>>
[snip]
>> So you're suggesting (and would be okay with) this text:
>>
>>  RTP packets using the payload format defined in this specification
>>  are subject to the security considerations discussed in the RTP
>>  specification RFC3550, and in any applicable RTP profile such as
>>  RTP/AVP [RFC3551], RTP/AVPF [RFC4585], RTP/SAVP [RFC3711] or RTP/
>>  SAVPF [RFC5124].  However, as "Securing the RTP Protocol Framework:
>>  Why RTP Does Not Mandate a Single Media Security Solution"
>>  [I-D.ietf-avt-srtp-not-mandatory] discusses it is not an RTP payload
>>  formats responsibility to discuss or mandate what solutions are used
>>  to meet the basic security goals like confidentiality, integrity and
>>  source authenticity for RTP in general.  This responsibility lays on
>>  anyone using RTP in an application.  They can find guidance on
>>  available security mechanisms and important considerations in Options
>>  for Securing RTP Sessions [I-D.ietf-avtcore-rtp-security-options].
>>  Applications SHOULD use an appropriate strong security mechanism.
>>
>
> I am okay with that text.
>
>> I think I'm okay with this.  (I kind of prefer my previous wording,
>> "Applications SHOULD implement at least one of the strong security
>> measures suggested by those references" only because it suggests that
>> multiple mechanisms are okay, whereas this new wording seems to imply
>> choosing only one).
>
> How about "Applications SHOULD use one or more strong security
> mechanisms, as appropriate"?

Clearly now we're just getting down to wordsmithing..  :)

How about "Applications SHOULD use one or more appropriate strong security
mechanisms"?  (The subclause "as apporpriate" feels to me like it could be
ignored, as in "well, using a strong security mechanism isn't
appropriate").  I think the goal is to make sure that "appropriate"
modifies the "strong security mechanism" and not the "SHOULD use"  ;)

What say you?

-derek

-- 
       Derek Atkins                 617-623-3745
       derek@ihtfp.com             www.ihtfp.com
       Computer and Internet Security Consultant