Re: [Sipbrandy] Benjamin Kaduk's Discuss on draft-ietf-sipbrandy-rtpsec-07: (with DISCUSS and COMMENT)

Ben Campbell <ben@nostrum.com> Thu, 07 March 2019 14:57 UTC

Return-Path: <ben@nostrum.com>
X-Original-To: sipbrandy@ietfa.amsl.com
Delivered-To: sipbrandy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 33D3112788F; Thu, 7 Mar 2019 06:57:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.679
X-Spam-Level:
X-Spam-Status: No, score=-1.679 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=fail (1024-bit key) reason="fail (message has been altered)" header.d=nostrum.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tpokuJgdzX6A; Thu, 7 Mar 2019 06:57:01 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 994A11277D0; Thu, 7 Mar 2019 06:57:01 -0800 (PST)
Received: from bens-macbook.lan (cpe-66-25-20-105.tx.res.rr.com [66.25.20.105]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id x27Eut3L075636 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Thu, 7 Mar 2019 08:56:56 -0600 (CST) (envelope-from ben@nostrum.com)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nostrum.com; s=default; t=1551970617; bh=yFmrruvXoWpdzq8lfc8J7UYiXx6Kw3JHgpCV1zcBNUg=; h=From:Subject:Date:In-Reply-To:Cc:To:References; b=CBNhtzXnOplLGfKkMZx/1R7SQsC7sakbeCJvRb6coN+7qhm4oRty8bOw5HMEb9jjx eUict+TWp2aHqEtuw3FTc57VLDNY6cvI2zayP3Mv0AqPudWM9TIWttLHcdT0EyckkJ HLzezgfogL0vlvqQml9zGCO6TSHZNip/61LGRGWI=
X-Authentication-Warning: raven.nostrum.com: Host cpe-66-25-20-105.tx.res.rr.com [66.25.20.105] claimed to be bens-macbook.lan
From: Ben Campbell <ben@nostrum.com>
Message-Id: <6066419A-7D0F-4A7E-80B7-340E1EB3A73A@nostrum.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_55C8B0D4-12D7-49F0-8052-70CA1236E59D"; protocol="application/pgp-signature"; micalg="pgp-sha512"
Mime-Version: 1.0 (Mac OS X Mail 12.2 \(3445.102.3\))
Date: Thu, 07 Mar 2019 08:56:48 -0600
In-Reply-To: <155196717799.15946.16638039906082946561.idtracker@ietfa.amsl.com>
Cc: The IESG <iesg@ietf.org>, draft-ietf-sipbrandy-rtpsec@ietf.org, sipbrandy@ietf.org, sipbrandy-chairs@ietf.org, Gonzalo Camarillo <gonzalo.camarillo@ericsson.com>
To: Datatracker on behalf of Benjamin Kaduk <noreply@ietf.org>
References: <155196717799.15946.16638039906082946561.idtracker@ietfa.amsl.com>
X-Mailer: Apple Mail (2.3445.102.3)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipbrandy/N9gMvL7BtzaRD4YrS5pVQxPBIjM>
Subject: Re: [Sipbrandy] Benjamin Kaduk's Discuss on draft-ietf-sipbrandy-rtpsec-07: (with DISCUSS and COMMENT)
X-BeenThere: sipbrandy@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIPBRANDY working group discussion list <sipbrandy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipbrandy>, <mailto:sipbrandy-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipbrandy/>
List-Post: <mailto:sipbrandy@ietf.org>
List-Help: <mailto:sipbrandy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipbrandy>, <mailto:sipbrandy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Mar 2019 14:57:05 -0000

Hi Benjamin,

One comment inline:

Thanks!

Ben.

> On Mar 7, 2019, at 7:59 AM, Datatracker on behalf of Benjamin Kaduk <noreply@ietf.org> wrote:
> 
> Benjamin Kaduk has entered the following ballot position for
> draft-ietf-sipbrandy-rtpsec-07: Discuss
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
> for more information about IESG DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-sipbrandy-rtpsec/
> 
> 
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> I think we need to have a bit more clarity on exactly how/what parts of
> 4916 are updated (per Section 4.3).  Thta is, we have some text that's
> indented as if it's supposed to be logically inserted into a "revised
> 4916", but no indication of where or whether anything else is removed.
> Furthermore, that text includes section references to portions of 4916
> that are incorrect; normally an Update: would point to such text and say
> "this is removed" or "this is replaced by <x>", and the current
> formulation looks like it's constructing a virtual document that is
> internally inconsistent.

I m willing to believe the draft needs more detail on what changes in 4916. But if you are asking that it be in the form of patches, that is, “old text” to be removed and “new text” that replaces it, then I don’t think that’s ever been a hard requirement. I think it’s perfectly okay to discuss the update conceptually.

I personally prefer the latter in a lot of cases, but I think both approaches are okay. The patch approach would make sense if we actually rendered patched RFCs, but we don’t.


> 
> 
> ----------------------------------------------------------------------
> COMMENT:
> ----------------------------------------------------------------------
> 
> Thanks to the authors for putting together this comprehensive treatment
> of what we need for full-stack media protection via SIP/SDP/etc.; it's a
> pleasure to read.
> 
> That said, I'm a little confused at whether I signal in-band that I'm using the
> Section 3.1 Comprehensive Protection vs. Section 3.2 Opportunistic Security.
> Does the "msec" type get used in both cases?
> 
> Section 3.1
> 
>               Broadly, it is the responsibility of SIP to provide
>   integrity protection for the media keying attributes conveyed by SDP,
>   and those attributes will in turn identify the keys used by endpoints
>   in the RTP media session(s) that SDP negotiates.  Note that this
>   framework does not apply to keys that also require confidentiality
>   protection in the signaling layer, such as the SDP "k=" line, which
>   MUST NOT be used in conjunction with this profile.  In that way, once
> 
> Maybe s/keys/key exchange mechanisms/?  I misread this the first time around.
> 
>   SIP and SDP have exchanged the necessary information to initiate a
>   session, media endpoints will have a strong assurance that the keys
>   they exchange have not been tampered with by third parties, and that
>   end-to-end confidentiality is available.
> 
> I think I'm missing a step in the reasoning here.  Just because the keys
> themselves don't go in cleartext we're confident there's no tampering?
> 
>   To establishing the identity of the endpoints of a SIP session, this
>   specification uses STIR [RFC8224].  The STIR Identity header has been
> 
> nit: 8224 doesn't really call itself "STIR" anywhere.
> 
>   STIR generates a signature over certain features of SIP requests,
>   including header field values that contain an identity for the
>   originator of the request, such as the From header field or P-
>   Asserted-Identity field, and also over the media keys in SDP if they
>   are present.  As currently defined, STIR only provides a signature
>   over the "a=fingerprint" attribute, which is a key fingerprint
>   utilized by DTLS-SRTP [RFC5763]; consequently, STIR only offers
>   comprehensive protection for SIP sessions, in concert with SDP and
>   SRTP, when DTLS-SRTP is the media security service.  [...]
> 
> I think that "over the media keys" is potentially confusing.  What seems
> to be signed here is the [fingerprint of the] asymmetric keys used as
> intput to a key-exchange mechanism that is used to generate the
> (symmetric) media keys.
> 
> Section 3.2
> 
>   Opportunistic encryption approaches typically have no integrity
>   protection for the keying material in SDP.  Sending SIP over TLS hop-
>   by-hop between user agents and any intermediaries will reduce the
>   prospect that active attackers can alter keys for session requests on
>   the wire.  However, opportunistic confidentiality for media will
>   prevent passive attacks of the form most common in the threat of
>   pervasive monitoring.
> 
> I'm a little confused by this statement.  How is the capability of
> active attackers reduced?
> 
> Section 4
> 
> "SIP UAS" (or even "UAS") are not listed as "well-known" at
> https://www.rfc-editor.org/materials/abbrev.expansion.txt, so UAS should
> be expanded on first use (or the terminology section expanded to note
> documents with which the reader is assumed to be familiar).
> 
>   The SIPBRANDY deployment profile of STIR for media confidentiality
>   thus shifts these responsibilities to the endpoints rather than the
>   intermediaries.  [...]
> 
> Which responsibilities?
> 
>   When generating either an offer or an answer [RFC3264], compliant
>   implementations MUST include an "a=fingerprint" attribute containing
>   the fingerprint of an appropriate key (see Section 4.1).
> 
> nit: since this stuff crosses many different layers, is it friendly to
> the reader to be explicit about "SDP offer or answer"?
> 
> Section 4.2
> 
>   Even for anonymous sessions, providing media confidentiality and
>   partial SDP integrity is still desirable.  This specification
>   RECOMMENDS using one-time self-signed certificates for anonymous
>   communications, with a subjectAltName of
>   "sip:anonymous@anonymous.invalid".  [...]
> 
> Should we recommend that the commonName be absent?
> 
>                This signature only provides protection against non-
>   Identity aware entities that might modify SDP without altering the
>   PASSporT conveyed in the Identity header.
> 
> It also protects against passive observers, right?
> 
> Section 4.4
> 
>   For this profile, however, a compliant verification service that
>   receives a dialog-forming SIP request containing an Identity header
>   with a PASSporT type of "msec", after validating the request per the
>   steps described in Section 6.2 of [RFC8224], MUST reject the request
>   if there is any failure in that validation process with the
>   appropriate status code per Section 6.2.2.  [...]
> 
> nit: that's 6.2.2 of RFC8224 still, but the tooling (and arguably some
> readers as well) will pick it up as section 6.2.2 of the current
> document (which does not exist).
> 
>                    As any verification service that receives an
>   Identity header in a SIP request with an unrecognized PASSporT type
>   will simply ignore that Identity header, an authentication service
>   will know whether or not the terminating side supports "msec" based
>   on whether or not its user agent receives a signed request in the
>   backwards direction per Section 4.3.  [...]
> 
> Is this actually the case?  My understanding was that an active MITM
> could drop the authentication bits and obscure whether the actual
> peer supports "msec".
> 
> Section 6
> 
>                  In many such implementations, only hop-by-hop media
>   confidentiality is possible.  Work is ongoing to specify a means to
>   encrypt both the hop-by-hop media between a user agent and a
>   centralized server as well as the end-to-end media between user
>   agents, but is not sufficiently mature at this time to make a
>   recommendation for a best practice here.  [...]
> 
> Tantalizing, but you're not going to give an informative reference?
> 
> Section 7
> 
>   Note that in the comprehensive protection case, the use of Connected
>   Identity [RFC4916] with ICE entails that the answer containing the
>   key fingerprints, and thus the STIR signature, will come in an UPDATE
>   sent in the backwards direction a provisional response and
>   acknowledgment (PRACK), rather than in any earlier SDP body.  [...]
> 
> nit: there seems to be a missing word here.
> 
> Section 12.2
> 
> It looks like trickle ICE should be normative (as we RECOMMEND its
> implementation).
> 
> 
> _______________________________________________
> Sipbrandy mailing list
> Sipbrandy@ietf.org
> https://www.ietf.org/mailman/listinfo/sipbrandy