Re: [Sframe] [dispatch] SFRame Next Steps (was SFrame proposed WG charter)
Emad Omara <emadomara@google.com> Mon, 31 August 2020 22:14 UTC
Return-Path: <emadomara@google.com>
X-Original-To: sframe@ietfa.amsl.com
Delivered-To: sframe@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EF533A092F for <sframe@ietfa.amsl.com>; Mon, 31 Aug 2020 15:14:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.599
X-Spam-Level:
X-Spam-Status: No, score=-17.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vfM5CMjvNMcx for <sframe@ietfa.amsl.com>; Mon, 31 Aug 2020 15:14:25 -0700 (PDT)
Received: from mail-vk1-xa2e.google.com (mail-vk1-xa2e.google.com [IPv6:2607:f8b0:4864:20::a2e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F1BAC3A0123 for <sframe@ietf.org>; Mon, 31 Aug 2020 15:14:24 -0700 (PDT)
Received: by mail-vk1-xa2e.google.com with SMTP id t189so1665059vka.10 for <sframe@ietf.org>; Mon, 31 Aug 2020 15:14:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=29FKiT3Guy44TmMTR5FyPow58HeKb7l/XnyrcQ5plQM=; b=HrGXALltT69zp+6XRX++7UcKJ1Cj/SYd0sa52pckq7BRpIKyHPh/IVXomU+B60cWjT uI+JeyedhY+v3ToBROcmLn5XxNlkkwK6gLZCha9l+vAvF8DftUSr4b7wCGj3Q7nJt7z5 YqaC36uEC8pNxF2DwjJWUESSgg7EPqGhpbGjkx7wE00qmoF/TWTmDHRK/SGon7bCHFvZ YbvwfBuIXyqn5uJWfgLsx1RVR+dPurFr5qPF+X+SpavqBhas868NsIyNqBiti8Vs4o7J CdTa7UBgK6uECUrLTdEgL47qo1JrVU7nvF2XTlIjrsIh+2rHYyd+rLfMuOqmX2LGRuXN 3pcA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=29FKiT3Guy44TmMTR5FyPow58HeKb7l/XnyrcQ5plQM=; b=SzdLXSU82WnUNSgCgX/jCDHxL6MCGRYj4fSc03y3emzuddkGoL7h8BzjwYSqn/KXbM 5QdmJsErxIlTgCrSCmx5mAEMzQpBU9YZm+F/9SwUIBgwWhTjBXcS4HcsTx9aEpwy+X3i Del8NDBKhA4oVdm4/27nmvXckom4i/6zZeDIw2iRDujGEC4OEBwtYw4eyxFbyAmWrKRE IDFRm6QDX8pnu+wN6cYLIyYvlt/VPUrVQa77FP/1HJk7rnn6U8+AatUkaAidgAez4bpK P07RIagrB587gNNzBlJJPC5WAZSEZXaClD9DSByOlyxQXiGbqpGJjBUWsajXyHH3hPkb M5hg==
X-Gm-Message-State: AOAM530p0fEKQfYurIvv5lH7HoRF4pMw0fz1KftBgx/yW7gzRYvftRRE ifBYNpakDp9ozVN67YKK33KOi9GapHHKyDsEdPPp
X-Google-Smtp-Source: ABdhPJxZfxNUzfW27NUix8mD1O92dBXlpd0xXgkaZRtAR0URBps6Irk0rtSMrwlCopRlGVy4MCm+bocuzOxDNJn5dDs=
X-Received: by 2002:a1f:286:: with SMTP id 128mr3102129vkc.96.1598912063660; Mon, 31 Aug 2020 15:14:23 -0700 (PDT)
MIME-Version: 1.0
References: <CAHo7dC91bvRHiYuRT63uJ=HeuFU9L7XXqTcG+za5xi_BbQ0G2w@mail.gmail.com> <E2072219-1B6E-4444-A39C-287842783DBF@nostrum.com> <CAL02cgT13rEnvaB9TFMci=N8OqO35qKHthPHhMCvAccZWhCu-Q@mail.gmail.com> <ca0a7472a86cf53c78779f6153a80dc096acc4e8.camel@ericsson.com> <69181ed1-d72a-99de-8b4d-9e10276ced91@gmail.com> <771e108a9f25c1bec04d5fcdad58eb55bbb1533d.camel@ericsson.com> <CAHo7dC_b_fvmq=FRK-DMFtOji_tCV3hAnEHr+P-CY7BHtPP+MA@mail.gmail.com> <CACtMSQWR0xxV_2Worc197Ftf7yTFhwrses+732vWN+fHjN4pkQ@mail.gmail.com> <CAL02cgRnfRoYfUu78hV7X2LV_GuhaHbZvC9vpgcnyzy4D2HPVw@mail.gmail.com> <fc46a290b86591e4e009f65f76c828028e06bd8b.camel@ericsson.com> <CAL02cgSp_r0Z9xF71yVLX5mpGK-B-OFDh2rC6oBxVFNAkvJ=mA@mail.gmail.com> <CAOW+2dvNG2T5wSCg-12ou04NzgBPJTc5ry-j0ydRQqPhs49W1A@mail.gmail.com>
In-Reply-To: <CAOW+2dvNG2T5wSCg-12ou04NzgBPJTc5ry-j0ydRQqPhs49W1A@mail.gmail.com>
From: Emad Omara <emadomara@google.com>
Date: Mon, 31 Aug 2020 15:14:11 -0700
Message-ID: <CAHo7dC-hVFVG90SZ=oub-h4uza_Geej9JZEsGpeY4FJcP=cCyQ@mail.gmail.com>
To: Bernard Aboba <bernard.aboba@gmail.com>
Cc: Richard Barnes <rlb@ipv.sx>, Magnus Westerlund <magnus.westerlund@ericsson.com>, "ben@nostrum.com" <ben@nostrum.com>, "dispatch@ietf.org" <dispatch@ietf.org>, "sframe@ietf.org" <sframe@ietf.org>, "sergio.garcia.murillo@gmail.com" <sergio.garcia.murillo@gmail.com>, "Alex.GOUAILLARD@cosmosoftware.io" <Alex.GOUAILLARD@cosmosoftware.io>
Content-Type: multipart/alternative; boundary="00000000000095450005ae33b9b2"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sframe/7EFW6vpqeg_lUhkKuf8-kqi1gTo>
Subject: Re: [Sframe] [dispatch] SFRame Next Steps (was SFrame proposed WG charter)
X-BeenThere: sframe@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <sframe.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sframe>, <mailto:sframe-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sframe/>
List-Post: <mailto:sframe@ietf.org>
List-Help: <mailto:sframe-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sframe>, <mailto:sframe-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 31 Aug 2020 22:14:28 -0000
Thanks Bernard. The SFrame draft intentionally avoided any RTP dependencies, but as referenced a generic frame marking extension could be used to pass the media metadata in plaintext (but authenticated). Of course the RTP header ext should be HBH encrypted. Regarding packetization, yes a generic RTP packetizer will be used since the media will be encrypted. The frame marking ext will be used to define the frame boundaries. That being said, we need a 2nd draft for SFrame-RTP integration to cover this topic and potentially other topics as well, which I promised I will work on sometime soon :-) On Mon, Aug 31, 2020 at 12:27 PM Bernard Aboba <bernard.aboba@gmail.com> wrote: > Richard said: > > "in the most obvious SFrame+SRTP case, there's a division of labor between > the two protocols, " > > [BA] There is also an interaction between E2E encryption and packetization > that needs to be captured somewhere. In SFrame, the packetization model is > potentially different from PERC, because the SFrame packetizer may not have > visibility into the E2E encrypted payload (e.g. the packetizer may not have > access to the cleartext payload). The implication is that the information > needed to packetize the E2E encrypted frame (e.g. the metadata) needs to be > provided to the packetizer. This info must be sufficient to fill in the > RTP header fields as well as RTP header extensions, including those RTP > header extensions used by an SFU for forwarding (e.g. frame-marking or > Dependency Descriptor). > > I'd note that the current SFrame draft does not address this yet, except > for a figure including a "payload header" in section 1. It is my > understanding that the "Payload Header" represents info provided in the > clear (such as the VP8 header), which is needed by the packetizer. > Implementations that have encrypted this field or have not provided what > was expected (e.g. attempts to utilize the H.264/AVC codec) have > encountered E2E encryption failures. > > One approach to addressing this is to define a "generic packetizer" for a > transport that will be able to packetize and depacketize the E2E encrypted > frame in any codec. If that work is indeed needed, then it should be > described somewhere. > > On Mon, Aug 31, 2020 at 8:41 AM Richard Barnes <rlb@ipv.sx> wrote: > >> Hi Magnus, >> >> I think the intent here is to have a mechanism that provides a subset of >> the security properties required for a given scenario, but which can be >> augmented with additional mechanisms to provide the rest. For example, >> even in the most obvious SFrame+SRTP case, there's a division of labor >> between the two protocols, where SFrame only protects content, and SRTP >> also protects the RTP header and guards against reply by network attackers. >> >> So in a sense it is an intersection (in that it does something that is >> needed by all the use cases), but it might need other things to provide all >> the properties you need in a given scenario. >> >> --Richard >> >> On Mon, Aug 31, 2020 at 10:06 AM Magnus Westerlund < >> magnus.westerlund@ericsson.com> wrote: >> >>> Hi, >>> >>> Thanks for working on addressing my comments when on vacation. >>> >>> I think you mostly arravied at a good place. However, I would like to >>> make one >>> remark about the added language. >>> >>> When it comes to threat models it can't be the intersection of threats >>> across >>> those that occur in the intended usages, it needs to be the union of >>> threats. >>> The formulation added implies intersection to me. >>> >>> Cheers >>> >>> Magnus >>> >>> On Wed, 2020-08-12 at 11:11 -0400, Richard Barnes wrote: >>> > Hey all, >>> > >>> > I agree that all of this stuff is valuable to capture somewhere. In >>> the >>> > interest of keeping the charter fairly succinct, I've added the >>> following: >>> > >>> > """ >>> > The SFrame specification will detail the specific security properties >>> that the >>> > encapsulation provides, and discuss their implications under common >>> usage >>> > scenarios / threat models. >>> > """ >>> > >>> > With that, I think that all the comments we've gotten so far have been >>> > addressed. >>> > >>> > --Richard >>> > >>> > >>> > On Fri, Aug 7, 2020 at 11:51 PM Alexandre GOUAILLARD < >>> > Alex.GOUAILLARD@cosmosoftware.io> wrote: >>> > > guys, >>> > > >>> > > sorry for jumping in so late, quarantine here is very strict. >>> > > >>> > > We had long discussions about this specific point ahead of the draft >>> > > submission. >>> > > We had reached the following consensus: >>> > > - there are multiple usage of media over the internet, e.g. >>> conferencing and >>> > > streaming/broadcast >>> > > - they have very different threat/trust models, with different >>> solutions >>> > > implemented today (transport layer E / E2EE / DRM / Encrypted Media >>> > > Extentions / ...) >>> > > - they all can benefit from SFrame >>> > > >>> > > PERC was, by design, limited to RTP and to Conferencing. Many other >>> use case >>> > > coul benefit from Enhanced Privacy. >>> > > >>> > > We concluded that it would be better to keep SFrame (the media >>> encryption >>> > > part, equivalent to PERC double conceptually), and to have separated >>> > > documents that describe the threat models and the corresponding key >>> > > exchange, signaling and system level decision for each use case. >>> Emad had >>> > > taken an action item for example to make two additional documents to >>> > > describe the Video Conferencing use case, and how SFrame could be >>> used in >>> > > conjunction with MLS to address that specific use case. Someone else >>> could >>> > > take the different use case of the Browsers (which have a specific >>> trust >>> > > model) and make a document showing how SFrame con work with >>> Insertable Frame >>> > > API (and likely some more) to address that use case. CoSMo is >>> interested in >>> > > doing the same thing for Real-Time streaming/Broadcasting. >>> > > >>> > > I think it is a more reasonable approach as, even spending a lot of >>> time >>> > > brainstorming with everyone around the tabel including bernard, we >>> couldn't >>> > > think about one solution to fit all the different "media over >>> internet"'s >>> > > threat model. In my mind, each case should first have an informal >>> document >>> > > to define scope and threat model, and subsequent document to define >>> the >>> > > corresponding specifications. >>> > > - Secure Conferencing Threat model (emad and co.) >>> > > - Secure Conferencing Signalling using MLS (emad and co.) >>> > > - Secure Conferencing using MLS In the browser (contributed by w3c >>> people) >>> > > >>> > > Magnus, what do you think? >>> > > >>> > > Regards, >>> > > >>> > > Dr. ALex. >>> > > >>> > > >>> > > >>> > > On Fri, Aug 7, 2020 at 2:02 AM Emad Omara < >>> > > emadomara=40google.com@dmarc.ietf.org> wrote: >>> > > > Thanks Magnus. I like the idea to explicitly call out the threat >>> model, I >>> > > > think it will be good foundations that control all future design >>> > > > decisions, however I'm not sure if the charter is the right place >>> to call >>> > > > this out. I'd recommend having a separate document that describes >>> the >>> > > > system architecture, goals and threat model. What do you think? >>> > > > >>> > > > Emad >>> > > > >>> > > > On Thu, Aug 6, 2020 at 1:56 AM Magnus Westerlund < >>> > > > magnus.westerlund@ericsson.com> wrote: >>> > > > > Hi, >>> > > > > >>> > > > > On Wed, 2020-08-05 at 22:15 +0200, Sergio Garcia Murillo wrote: >>> > > > > > But shouldn't the "delayed media" attack still be transport >>> agnostic? >>> > > > > I >>> > > > > > mean, this can happen on QUIC and WebRTC SFUs. >>> > > > > >>> > > > > Sorry if I gave the impression that it is not transport >>> agnostic. It is >>> > > > > use case >>> > > > > dependent, any use case that isn't point to point, where there >>> is more >>> > > > > than one >>> > > > > entity that can intentionally remove SFRAME creating gaps in the >>> SFRAME >>> > > > > sequence. In a point to point scenario one can correlate >>> transport >>> > > > > losses with >>> > > > > SFRAME gaps to know give a reasonably strong mitigation against >>> any >>> > > > > third party >>> > > > > removing SFRAMEs or delaying them. That is much harder in a >>> centralized >>> > > > > conference with one or more SFU. >>> > > > > >>> > > > > > >>> > > > > > Anyway, I agree that while SFrame is transport agnostic, the >>> chapter >>> > > > > > should not ignore the interactions with webrtc/quic and we must >>> > > > > ensure >>> > > > > > that we provide a complete working solution regardless of the >>> > > > > transport. >>> > > > > > If we identify that any further working items are required for >>> a >>> > > > > > particular transport, we should at liaise with the appropriate >>> > > > > working >>> > > > > > group for providing a solution. >>> > > > > >>> > > > > My main point is that SFRAME actually needs to discuss the >>> threat model >>> > > > > for the >>> > > > > use cases it intendes to solve. And the mitigation can >>> potentially >>> > > > > include >>> > > > > functionality on the transport level. But the risks to media >>> security in >>> > > > > centralized conferencing needs to be discussed. And centralized >>> > > > > conferencing >>> > > > > will still have the semi-trusted SFUs and all the rest of the >>> third >>> > > > > parties in >>> > > > > addition to the end-points. >>> > > > > >>> > > > > Also what properties one have around end-points invited into the >>> > > > > conference has >>> > > > > a number of question around security properties that needs to be >>> > > > > discussed and >>> > > > > documented. Some examples that I know are relevant: >>> > > > > >>> > > > > - Source authentication: SRTP unless one use TESLA (which isn't >>> really >>> > > > > used) >>> > > > > does only provided the property: Someone that has the key sent >>> this. One >>> > > > > don't >>> > > > > know that it comes from a particular endpoint. >>> > > > > >>> > > > > - Confidentiality when group membership changes: So will SFRAME >>> keying >>> > > > > support a >>> > > > > use case where only the current set of members in a conference >>> can >>> > > > > decrypt the >>> > > > > media and one rekey the media session key for each time the >>> membership >>> > > > > changes? >>> > > > > PERC do support this, will SFRAME? >>> > > > > >>> > > > > There are likely more questions that needs discussion. The PERC >>> > > > > discussion is a >>> > > > > good starting point, but I think when going transport agnostic >>> some of >>> > > > > the >>> > > > > issues needs to be more clearly discussed as the RTP transport >>> can have >>> > > > > affected >>> > > > > how it was discussed, and what reliance on existing mechanism. >>> Which for >>> > > > > SFRAME >>> > > > > likely require a general discussion and then requirements on the >>> > > > > transport and >>> > > > > invovled endpoints and SFU to accomplish mitigations. And thus >>> also what >>> > > > > the >>> > > > > risks are of having no mitigation in place. >>> > > > > >>> > > > > I would really propose that SFRAME is chartered with publishing a >>> > > > > security >>> > > > > consideration and threat model document that is seperate from the >>> > > > > solution to >>> > > > > give this topic full focus. The solution will of necessity need >>> to >>> > > > > reference >>> > > > > that and document what migitagtions that exists in the SFRAME >>> layer and >>> > > > > what >>> > > > > becomes requirements on the transport. >>> > > > > >>> > > > > Cheers >>> > > > > >>> > > > > Magnus Westerlund >>> > > > > >>> > > > > >>> > > > > >>> ---------------------------------------------------------------------- >>> > > > > Networks, Ericsson Research >>> > > > > >>> ---------------------------------------------------------------------- >>> > > > > Ericsson AB | Phone +46 10 7148287 >>> <+46%2010%20714%2082%2087> >>> > > > > Torshamnsgatan 23 | Mobile +46 73 0949079 >>> <+46%2073%20094%2090%2079> >>> > > > > SE-164 80 Stockholm, Sweden | mailto: >>> magnus.westerlund@ericsson.com >>> > > > > >>> ---------------------------------------------------------------------- >>> > > > > >>> > > > > >>> -- >>> Cheers >>> >>> Magnus Westerlund >>> >>> >>> ---------------------------------------------------------------------- >>> Networks, Ericsson Research >>> ---------------------------------------------------------------------- >>> Ericsson AB | Phone +46 10 7148287 >>> <+46%2010%20714%2082%2087> >>> Torshamnsgatan 23 | Mobile +46 73 0949079 >>> <+46%2073%20094%2090%2079> >>> SE-164 80 Stockholm, Sweden | mailto: magnus.westerlund@ericsson.com >>> ---------------------------------------------------------------------- >>> >>> >>> -- >> Sframe mailing list >> Sframe@ietf.org >> https://www.ietf.org/mailman/listinfo/sframe >> >
- [Sframe] SFrame proposed WG charter Emad Omara
- [Sframe] SFRame Next Steps (was Re: [dispatch] SF… Ben Campbell
- Re: [Sframe] [dispatch] SFRame Next Steps (was Re… Richard Barnes
- Re: [Sframe] [dispatch] SFRame Next Steps (was Re… Magnus Westerlund
- Re: [Sframe] [dispatch] SFRame Next Steps (was SF… Sergio Garcia Murillo
- Re: [Sframe] [dispatch] SFRame Next Steps (was SF… Magnus Westerlund
- Re: [Sframe] [dispatch] SFRame Next Steps (was SF… Emad Omara
- Re: [Sframe] [dispatch] SFRame Next Steps (was SF… Alexandre GOUAILLARD
- Re: [Sframe] [dispatch] SFRame Next Steps (was SF… Richard Barnes
- Re: [Sframe] [dispatch] SFRame Next Steps (was SF… Magnus Westerlund
- Re: [Sframe] [dispatch] SFRame Next Steps (was SF… Richard Barnes
- Re: [Sframe] [dispatch] SFRame Next Steps (was SF… Bernard Aboba
- Re: [Sframe] [dispatch] SFRame Next Steps (was SF… Emad Omara
- Re: [Sframe] [dispatch] SFRame Next Steps (was SF… Magnus Westerlund