Re: [Sframe] Adoption call for draft-omara-sframe-01

Eric Rescorla <ekr@rtfm.com> Fri, 15 October 2021 21:16 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: sframe@ietfa.amsl.com
Delivered-To: sframe@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9DA93A0B6C for <sframe@ietfa.amsl.com>; Fri, 15 Oct 2021 14:16:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CSPbeLOnlluS for <sframe@ietfa.amsl.com>; Fri, 15 Oct 2021 14:16:44 -0700 (PDT)
Received: from mail-io1-xd29.google.com (mail-io1-xd29.google.com [IPv6:2607:f8b0:4864:20::d29]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B03783A0B6B for <sframe@ietf.org>; Fri, 15 Oct 2021 14:16:44 -0700 (PDT)
Received: by mail-io1-xd29.google.com with SMTP id 188so9179340iou.12 for <sframe@ietf.org>; Fri, 15 Oct 2021 14:16:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=HC42Qb9mcLDS63kcMX27rfynYz0X0yU3Y1k36v+0HPE=; b=21Ydgv2pIr7e+cazTlOCUcUSUpIDhSWDit1eZcHd3JvoSxyzkLif3lpKJX0OHDaq1k 2xNwYL+f+DzhOQD/YmMQxTCLaNVmhqXdNmAiAhw7uEZ8yiVL8fjlPdTkXhmGPZt6NChJ IauihlCAEIOTDQqBA8W3G5jr6rbr0yVdRf0o9KlgXCxMlzb2/cKdk5oyhOFzRNAipRfh xN+X7e6DGUBTxDLzOPWbX+vkCnCiqzcvmKx5q2fuNzkq5YUCq2l2uYtR1vodtbK/VHAk zdw73D+zKhjhIVhBntnGimQt+4NCviW6SiFtW+loJZkXHWcw7fHSK/zdjAHciOWpy3lm PFIw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=HC42Qb9mcLDS63kcMX27rfynYz0X0yU3Y1k36v+0HPE=; b=uiCCQqvoW9bxUDPVyHVrEUuKipAat3V4EUO1DO5PoTImzXoPHoCHwoWBu0HAbRideS aSNKdqLNmJNhratnb2bRyTWDnCe0VhP7EG5mi59VKY5kNn3VjDNYxd2lhinOPlAucDwu 24QnRWIo9AYYEjyFqPjukNICPyH2DYLNX+r3Tnfx1NByUQQfTXy/7mJ0V5hiqLeZ59fy k/6HyIZIFrollbBNCZw8vR0Sdyo+WyJsOw1EW5nhgkVW/JoAGC8WASlLFN9joflVaIP3 6mrKzgsgfoj/ByFBYS3yFf05BqPN5OxCQjwYm914iPlvwPHRx18/aqWIwZZ7Z7/DzIKj oZyA==
X-Gm-Message-State: AOAM532PmpSJsf6RjEyRjS2B7p757uLiCj894JeOv7eJ+gHankbm3WUO OFDsHpS8KZ/LNy3vEwb1wIMbw/zNiuXWvsDDY0/82Et9lt34DA==
X-Google-Smtp-Source: ABdhPJyiIpU0xVfbtLRPkpuTzqhXZghR3jmB9QOiyv5erVyVPmd4SY3Ou7VhVO8PlDneNtSJD9lYcEm1GYSAfcjI1tU=
X-Received: by 2002:a6b:db0d:: with SMTP id t13mr5369795ioc.149.1634332603790; Fri, 15 Oct 2021 14:16:43 -0700 (PDT)
MIME-Version: 1.0
References: <7e721f57-e7ee-4f47-8663-2b485aeabd1a@www.fastmail.com>
In-Reply-To: <7e721f57-e7ee-4f47-8663-2b485aeabd1a@www.fastmail.com>
From: Eric Rescorla <ekr@rtfm.com>
Date: Fri, 15 Oct 2021 14:16:07 -0700
Message-ID: <CABcZeBP2RpUKTa22Am4gXdm7h1t+ij0F3cNYtGhnsWTJtrysiw@mail.gmail.com>
To: Martin Thomson <mt@lowentropy.net>
Cc: sframe@ietf.org
Content-Type: multipart/alternative; boundary="0000000000004b4eb705ce6ab61d"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sframe/yWMP6BRT_SGlhjTiaOmgfBVTVmw>
Subject: Re: [Sframe] Adoption call for draft-omara-sframe-01
X-BeenThere: sframe@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Secure Media Frames <sframe.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sframe>, <mailto:sframe-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sframe/>
List-Post: <mailto:sframe@ietf.org>
List-Help: <mailto:sframe-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sframe>, <mailto:sframe-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Oct 2021 21:16:50 -0000

TL;DR. This document needs a fair bit of work but I think
we should adopt it and work on it in the WG rather than
making the authors do a pile of work beforehand.

At the high level, I tend to agree with Bernard that this is
doing a bit too much. Specifically, while SFrame is designed
to be embedded in an E2E keying system, there's not much
about it that requires E2E. I would consider breaking that
material out into a different document or perhaps moving
it into an appendix as stage setting.

I also think it would be good if the document were somewhat
more agnostic about SPacket and SFrame; it seems like each
version has advantages in some cases.


DETAILED COMMENTS
S 4.

The stuff here 4. seems informational.

   We propose a frame level encryption mechanism that provides effective
   end-to-end encryption, is simple to implement, has no dependencies on
   RTP, and minimizes encryption bandwidth overhead.  Because SFrame
   encrypts the full frame, rather than individual packets, bandwidth
   overhead is reduced by having a single IV and authentication tag for
   each media frame.

As noted above, there's nothing E2E about this. It's just designed to
it into a certain setting. I *do* think it would be useful to explain
the extent to which this depends on SRTP for security, if at all.


S 4.2.
   Since each endpoint can send multiple media layers, each frame will
   have a unique frame counter that will be used to derive the
   encryption IV.  The frame counter must be unique and monotonically
   increasing to avoid IV reuse.


   Reserved (R): 1 bit This field MUST be set to zero on sending, and
   MUST be ignored by receivers.  Counter Length (LEN): 3 bits This
   field indicates the length of the CTR fields in bytes (1-8).

I am having trouble reading this text. Is it saying that the CTR field
can be 1-8 bytes long? But of course, 3 bits can only encode 0-7, so
you need to explain it's +1, I guess?


S 4.3.5.

   Unlike messaging application, in video calls, receiving a duplicate
   frame doesn't necessary mean the client is under a replay attack,
   there are other reasons that might cause this, for example the sender
   might just be sending them in case of packet loss.

This is true for messaging as well.

   SFrame decryptors
   use the highest received frame counter to protect against this.  It
   allows only older frame pithing a short interval to support out of
   order delivery.

Should this say "within". You will eventually need more detail here
about how this works. In particular, you shouldn't update until you
have decrypted.


S 4.4.

     +========+==========================+====+====+====+===========+
     | Value  | Name                     | Nh | Nk | Nn | Reference |
     +========+==========================+====+====+====+===========+
     | 0x0001 | AES_CM_128_HMAC_SHA256_8 | 32 | 16 | 12 | RFC XXXX  |
     +--------+--------------------------+----+----+----+-----------+
     | 0x0002 | AES_CM_128_HMAC_SHA256_4 | 32 | 16 | 12 | RFC XXXX  |
     +--------+--------------------------+----+----+----+-----------+
     | 0x0003 | AES_GCM_128_SHA256       | 32 | 16 | 12 | RFC XXXX  |
     +--------+--------------------------+----+----+----+-----------+
     | 0x0004 | AES_GCM_256_SHA512       | 64 | 32 | 12 | RFC XXXX  |
     +--------+--------------------------+----+----+----+-----------+

A 4 byte tag is pretty short.

What's the reason for specifyin anything with SHA-512 as the
KDF?


   In a session that uses multiple media streams, different ciphersuites
   might be configured for different media streams.  For example, in
   order to conserve bandwidth, a session might use a ciphersuite with
   80-bit tags for video frames and another ciphersuite with 32-bit tags
   for audio frames.

A little weird to say this when you don't specify anything with 80 bit
tags.








On Sun, Oct 10, 2021 at 4:36 PM Martin Thomson <mt@lowentropy.net> wrote:

> https://datatracker.ietf.org/doc/html/draft-omara-sframe-01
>
> Please respond to this email before AOE 31 October 2021 if you support
> adopting draft-omara-sframe (currently -01) as a working group item.  If
> you would prefer we not adopt this work, please respond with an explanation
> of why and ideally what you would like to see addressed before we do that.
>
> We're running this a tiny bit longer than a typical adoption call.  Last
> time we talked about adoption there were a few concerns raised about the
> draft.  We want to make sure those concerns are addressed, or at least
> those with concerns are satisfied that their concerns could be addressed.
>
> Martin, for the chairs
>
> --
> Sframe mailing list
> Sframe@ietf.org
> https://www.ietf.org/mailman/listinfo/sframe
>