Re: [Sip] RE: Review of draft-ietf-sip-media-security-requirements-00

Matt Lepinski <mlepinski@bbn.com> Tue, 06 November 2007 15:25 UTC

Return-path: <sip-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IpQJT-0003Z4-Pu; Tue, 06 Nov 2007 10:25:59 -0500
Received: from sip by megatron.ietf.org with local (Exim 4.43) id 1IpQJR-0003YE-KA for sip-confirm+ok@megatron.ietf.org; Tue, 06 Nov 2007 10:25:57 -0500
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IpQJR-0003Y4-8k for sip@ietf.org; Tue, 06 Nov 2007 10:25:57 -0500
Received: from mx11.bbn.com ([128.33.0.80]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IpQJQ-0002Fd-NH for sip@ietf.org; Tue, 06 Nov 2007 10:25:57 -0500
Received: from mail.bbn.com ([128.33.1.19]) by mx11.bbn.com with esmtp (Exim 4.60) (envelope-from <mlepinski@bbn.com>) id 1IpQJQ-0000iJ-4L; Tue, 06 Nov 2007 10:25:56 -0500
Received: from dhcp89-089-119.bbn.com ([128.89.89.119] helo=[127.0.0.1]) by mail.bbn.com with esmtp (Exim 4.67) (envelope-from <mlepinski@bbn.com>) id 1IpQJN-00046v-31; Tue, 06 Nov 2007 10:25:54 -0500
Message-ID: <47308710.3040807@bbn.com>
Date: Tue, 06 Nov 2007 10:24:00 -0500
From: Matt Lepinski <mlepinski@bbn.com>
Organization: BBN
User-Agent: Mozilla Thunderbird 1.0.2 (Windows/20050317)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Dan Wing <dwing@cisco.com>
Subject: Re: [Sip] RE: Review of draft-ietf-sip-media-security-requirements-00
References: <47080AF8.9060303@bbn.com> <033c01c81fe7$cffe11e0$c4f0200a@cisco.com>
In-Reply-To: <033c01c81fe7$cffe11e0$c4f0200a@cisco.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 25620135586de10c627e3628c432b04a
Cc: 'IETF SIP List' <sip@ietf.org>, 'Francois Audet' <audet@nortel.com>, "'Fries, Steffen'" <steffen.fries@siemens.com>
X-BeenThere: sip@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Session Initiation Protocol <sip.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:sip@ietf.org>
List-Help: <mailto:sip-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=subscribe>
Errors-To: sip-bounces@ietf.org

Dan,

Thanks for moving quickly towards a -01 version of the draft.

I couple of comments R23, R24, and R25:

>For reference in this response, R23, R24, and R25 are:
>
>  R23:   The media security key management protocol SHOULD support
>          recording of decrypted media.
>
>          Media recording may be realized by an intermediate nodes.  An
>          example for those intermediate nodes are devices, which could
>          be used in banking applications or for quality monitoring in
>          call centers.  Here, it must be ensured, that the media
>          security is ensured by the intermediate nodes on the
>          connections to the involved endpoints as originally
>          negotiated.  The endpoints need to be informed that there is
>          an intermediate device and need to cooperate.  A solution
>          approach for this is described in [I-D.wing-sipping-srtp-key].
>
>R23 refers only to recording of media.  This is necessary in many 
>business environments such as banks, stock brokers, catalog ordering call
>centers, and so on.  This is a requirement for many businesses.  It
>is not yet clear if draft-wing-sipping-srtp-key (or something like it) 
>meets requirement R23.
>  
>
[MBL]: I understand the need for media recording (with the concent and 
cooperation of the end-point) in many environments. However, it is not 
clear to me that the media security key management protocol is the right 
place to solve the media recording problem. That is, regardless of which 
key management protocol I use between the endpoints, each endpoint is 
going to end up with the SRTP key. Once an endpoint who consents to 
media recording has the SRTP key, he can use a separate mechanism to 
support media recording. My fear is that integrating the media recording 
as part of the key management protocol will add significant complexity 
to the key management protocol to solve a problem that could easily be 
solved with a separate protocol mechanism.

>   R24:   The media security key management protocol SHOULD NOT allow
>          end users to determine whether their end-to-end interaction is
>          subject to lawful interception.
>
>I agree R24 refers to lawful intercept.  This is a requirement from
>other SDOs that need to provide lawful intercept with their solutions.
>  
>
[MBL]: I understand that other SDOs have requirements for lawful 
intercept. However, my understanding from reading RFC 2804 is that the 
IETF does not include such requirements in its documents.

>Another email on R24 lawful intercept will be forthcoming shortly.
>
>   R25:   The media security key management protocol MUST work when
>          there are intermediate nodes, terminating or processing media,
>          between the end points."
>
>R25 reference to 'intermediate nodes' is to transcoders and SBCs which
>handle signaling and media traffic.  It seems important that any keying
>mechanism work with such intermediate nodes, as those intermediate nodes
>are common on many SIP networks.
>  
>
[MBL]: I am confused by this requirement. Clearly, in many environments 
SBCs (and other intermediate nodes) are used to terminate and process 
media (e.g. to translate between two different codecs). However, in any 
environment where an intermediate node is processing the media, there is 
no way that end-to-end security of media can be achieved. (Indeed, from 
a security point of the view, the intermediate node who that processes 
the media stream is playing the role of a man-in-the-middle.) Therefore, 
I'm not sure what R25 is trying to require.




_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use sip-implementors@cs.columbia.edu for questions on current sip
Use sipping@ietf.org for new developments on the application of sip