Re: [secdir] Security review of draft-ietf-rtcweb-fec-08 (was Re: Security review of draft-ietf-perc-srtp-ekt-diet-08)
Sean Turner <sean@sn3rd.com> Wed, 13 February 2019 02:38 UTC
Return-Path: <sean@sn3rd.com>
X-Original-To: secdir@ietfa.amsl.com
Delivered-To: secdir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D164E130F27 for <secdir@ietfa.amsl.com>; Tue, 12 Feb 2019 18:38:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=sn3rd.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X00NHB6Rk719 for <secdir@ietfa.amsl.com>; Tue, 12 Feb 2019 18:38:17 -0800 (PST)
Received: from mail-qt1-x844.google.com (mail-qt1-x844.google.com [IPv6:2607:f8b0:4864:20::844]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 87527130F21 for <secdir@ietf.org>; Tue, 12 Feb 2019 18:38:17 -0800 (PST)
Received: by mail-qt1-x844.google.com with SMTP id j36so955467qta.7 for <secdir@ietf.org>; Tue, 12 Feb 2019 18:38:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sn3rd.com; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=7T3XzyHoqWMoI2E8O5ZaNXjT9RRNcCsj4WltHwJQLMU=; b=LiCnE+jV9m05ZO81BOZvvuSqCM+KoBhN2rLPQO9EKjEMb67h7NDF4A0Eodotu7+Wyf IseVb5+dp6rQrxQ39kjsL+y2pFhR5pJ9bbG0s7ZstzfRmoOvBjO1vYa+lmCaEq5S4j// D1B1H6WhXe+L5Nz6NOezbGLE2nmXMqEUOsqmQ=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=7T3XzyHoqWMoI2E8O5ZaNXjT9RRNcCsj4WltHwJQLMU=; b=k2xJ2+EmCdBEUHlgxj7gyNDXMul4F4FpTrwlR8EU5ARe/1XaWIvu5vfEkrQ14iqDWp 5lkHvdemTPvta5FgndYFTIAp//TiIHMLJOOLHEMk+UvqGFG9C2K8gKjz2K1ht6J5gg6X O7uiljRtK127x+L7U/R6MPbiD98mYPB5PLtK4GkUghKtPV7H4PMlcOtR5qIqT63mfDQD zzIxA7HOb3XRRgOjvD93Mse3rQQ7YeMsHxSvvO+ZXdDs/j7DfvNe9zUFt7rJa6ZvXXn3 D8J7UDgwCqU4+Xlfrqe6ahS9wuhqgVhjohTlBgr+OX4MJaY222V7d7CwrYVUwXjfNY4t Zt2g==
X-Gm-Message-State: AHQUAubpMVz4UahZOmoSfa9jdrT1ye3zeBy2wvtw7G2T1N7fTUrbm3X2 9VOoCoymmNabbng9a+IRmMOxQrSNuUs=
X-Google-Smtp-Source: AHgI3IaN713Zv5b7uVWfwUqbev+9AVY3FnsqYuR8LT6IBYmMSDtb+F7ClkJjF5xGUhgtNHgwQipa0g==
X-Received: by 2002:a0c:9de0:: with SMTP id p32mr5084874qvf.120.1550025496635; Tue, 12 Feb 2019 18:38:16 -0800 (PST)
Received: from [172.16.0.18] ([96.231.217.246]) by smtp.gmail.com with ESMTPSA id q184sm13891220qkb.23.2019.02.12.18.38.15 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 12 Feb 2019 18:38:15 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
From: Sean Turner <sean@sn3rd.com>
In-Reply-To: <1466140720.170234113.1549687106882.JavaMail.zimbra@purplestreak.com>
Date: Tue, 12 Feb 2019 21:38:14 -0500
Cc: Justin Uberti <justin@uberti.name>, Ben Campbell <ben@nostrum.com>, draft-ietf-rtcweb-fec all <draft-ietf-rtcweb-fec.all@tools.ietf.org>, The IESG <iesg@ietf.org>, secdir@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <CE8CCE5D-F15B-4A15-9E66-538082416272@sn3rd.com>
References: <201902010742.x117gdGm030846@rumpleteazer.rhmr.com> <F44FA6A0-4599-4BFF-8BEB-C67774714762@nostrum.com> <CALe60zD=OeTfjof3Q5UqnJRHsAQC-kS1oZYaQZ5HahAVOJgVKQ@mail.gmail.com> <240284129.169422738.1549676775109.JavaMail.zimbra@purplestreak.com> <CALe60zA6qwLLHpHHDp4Y5_PAX-wfBUmqw3gd5OWGx0zFJ57tvw@mail.gmail.com> <1466140720.170234113.1549687106882.JavaMail.zimbra@purplestreak.com>
To: Hilarie Orman <hilarie@purplestreak.com>
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdir/pt2hcLoN4D2fkbDNsagyXZ9dop8>
Subject: Re: [secdir] Security review of draft-ietf-rtcweb-fec-08 (was Re: Security review of draft-ietf-perc-srtp-ekt-diet-08)
X-BeenThere: secdir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Directorate <secdir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdir>, <mailto:secdir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdir/>
List-Post: <mailto:secdir@ietf.org>
List-Help: <mailto:secdir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdir>, <mailto:secdir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Feb 2019 02:38:31 -0000
Hilarie, Justin produced this PR to address this: https://github.com/juberti/draughts/commit/6e991d1eeaf1e505bb89957319be38df4ada56f5 Cheers, spt > On Feb 8, 2019, at 23:38, Hilarie Orman <hilarie@purplestreak.com> wrote: > > OK, that's good. > > Hilarie > > -- > > > ----- Original Message ----- > From: Justin Uberti <justin@uberti.name> > To: Hilarie Orman <hilarie@purplestreak.com> > Cc: Ben Campbell <ben@nostrum.com>, The IESG <iesg@ietf.org>, secdir@ietf.org, draft-ietf-rtcweb-fec all <draft-ietf-rtcweb-fec.all@tools.ietf.org> > Sent: Fri, 08 Feb 2019 18:51:32 -0700 (MST) > Subject: Re: Security review of draft-ietf-rtcweb-fec-08 (was Re: Security review of draft-ietf-perc-srtp-ekt-diet-08) > > Any suggestions on the sort of text you would like to see? > > e.g. "In the WebRTC context, FEC is specifically concerned with recovering > data from lost packets; any corrupted packets will be discarded by the SRTP > decryption process. Therefore, as described in [RFC3711], Section 10..." > > On Fri, Feb 8, 2019 at 5:46 PM Hilarie Orman <hilarie@purplestreak.com> > wrote: > >> I think that the purpose of the FEC should be explicit, else the >> interaction with >> encryption will remain a source of confusion forever. >> >> Hilarie >> >> ----- Original Message ----- >> From: Justin Uberti <justin@uberti.name> >> To: Ben Campbell <ben@nostrum.com> >> Cc: Hilarie Orman <hilarie@purplestreak.com>, The IESG <iesg@ietf.org>, >> secdir@ietf.org, draft-ietf-rtcweb-fec all < >> draft-ietf-rtcweb-fec.all@tools.ietf.org> >> Sent: Fri, 08 Feb 2019 18:20:41 -0700 (MST) >> Subject: Re: Security review of draft-ietf-rtcweb-fec-08 (was Re: Security >> review of draft-ietf-perc-srtp-ekt-diet-08) >> >> On Fri, Feb 1, 2019 at 2:49 PM Ben Campbell <ben@nostrum.com> wrote: >> >>> Hi, >>> >>> Please note that this review is for draft-ietf-rtcweb-fec-08, not the >> PERC >>> draft referenced in the subject. >>> >>> Thanks! >>> >>> Ben. >>> >>> >>>> On Feb 1, 2019, at 1:42 AM, Hilarie Orman <hilarie@purplestreak.com> >>> wrote: >>>> >>>> Security Review of WebRTC Forward Error Correction Requirements >>>> draft-ietf-rtcweb-fec-08 >>>> >>>> Do not be alarmed. I have reviewed this document as part of the >>>> security directorate's ongoing effort to review all IETF documents >>>> being processed by the IESG. These comments were written primarily >>>> for the benefit of the security area directors. Document editors and >>>> WG chairs should treat these comments just like any other last call >>>> comments. >>>> >>>> The document describes the appropriate uses of FEC for web content when >>>> using WebRTC. It also describes how to indicate that FEC is being >> used. >>>> >>>> The Security Considerations mention the possibility of additional >> network >>>> congestion when using FEC. Although this can be a problem, I do not >>> think >>>> it is a security issue, thus it does not belong in this section. >>> >> >> Understood. I think this paragraph could easily be moved to the preceding >> section. >> >>>> >>>> There is a security-related issue wrt to FEC and encryption. If the >>>> error model is that message blocks may be lost but not altered in >>>> transit, then FEC with encryption is fine. But if FEC is added for >>>> the purpose of correcting corrupted bits in a message block, then it >>>> is important that FEC is done after encryption. The draft seems to >>>> ignore the issue, and it also seems to recommend a processing scheme >>>> that would result in encryption of the FEC data. If there is a body >>>> of practice for other IETF FEC protocols that explains these issues, >>>> an explicit reference to it in the Security Considerations would be >>>> very helpful. >>> >>> FEC is added specifically to protect against lost blocks. Any corruption >> of the blocks will be detected by the decryption procedure, and such blocks >> will be discarded. >> >> There is a reference to RFC 3711, which stipulates the fec-then-encrypt >> ordering. RFC 3711 is admittedly terse on this subject, but it is quite >> clear about the ordering. >> >> > > _______________________________________________ > secdir mailing list > secdir@ietf.org > https://www.ietf.org/mailman/listinfo/secdir > wiki: http://tools.ietf.org/area/sec/trac/wiki/SecDirReview
- [secdir] Security review of draft-ietf-perc-srtp-… Hilarie Orman
- [secdir] Security review of draft-ietf-rtcweb-fec… Ben Campbell
- Re: [secdir] Security review of draft-ietf-rtcweb… Justin Uberti
- Re: [secdir] Security review of draft-ietf-rtcweb… Justin Uberti
- Re: [secdir] Security review of draft-ietf-rtcweb… Hilarie Orman
- Re: [secdir] Security review of draft-ietf-rtcweb… Hilarie Orman
- Re: [secdir] Security review of draft-ietf-rtcweb… Sean Turner