Re: [Taps] AD review of draft-ietf-taps-transport-security-08

Colin Perkins <csp@csperkins.org> Thu, 26 September 2019 10:53 UTC

Return-Path: <csp@csperkins.org>
X-Original-To: taps@ietfa.amsl.com
Delivered-To: taps@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 180A41208A9; Thu, 26 Sep 2019 03:53:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id f0W86PJIYzZv; Thu, 26 Sep 2019 03:53:10 -0700 (PDT)
Received: from haggis.mythic-beasts.com (haggis.mythic-beasts.com [IPv6:2a00:1098:0:86:1000:0:2:1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 959FA1208A7; Thu, 26 Sep 2019 03:53:06 -0700 (PDT)
Received: from [130.209.247.112] (port=51140 helo=mangole.dcs.gla.ac.uk) by haggis.mythic-beasts.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92.2) (envelope-from <csp@csperkins.org>) id 1iDROP-00041k-15; Thu, 26 Sep 2019 11:53:05 +0100
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: Colin Perkins <csp@csperkins.org>
In-Reply-To: <DB7PR07MB57363FEBD350EBB0A73A7F9695860@DB7PR07MB5736.eurprd07.prod.outlook.com>
Date: Thu, 26 Sep 2019 11:52:58 +0100
Cc: "draft-ietf-taps-transport-security.all@ietf.org" <draft-ietf-taps-transport-security.all@ietf.org>, "taps@ietf.org" <taps@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <C902DCC6-C1AA-4F83-916D-3A4C5C47C321@csperkins.org>
References: <DB7PR07MB57363FEBD350EBB0A73A7F9695860@DB7PR07MB5736.eurprd07.prod.outlook.com>
To: Magnus Westerlund <magnus.westerlund@ericsson.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-BlackCat-Spam-Score: 4
Archived-At: <https://mailarchive.ietf.org/arch/msg/taps/qjnvpUNUvgbPOfzjVffRvA3U7F4>
Subject: Re: [Taps] AD review of draft-ietf-taps-transport-security-08
X-BeenThere: taps@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IETF Transport Services \(TAPS\) Working Group" <taps.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/taps>, <mailto:taps-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/taps/>
List-Post: <mailto:taps@ietf.org>
List-Help: <mailto:taps-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/taps>, <mailto:taps-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Sep 2019 10:53:12 -0000

Hi Magnus,

Responses to some of this inline.

> On 26 Sep 2019, at 09:01, Magnus Westerlund <magnus.westerlund@ericsson.com> wrote:
> 
> Hi,
>  
> Sorry about the delay in getting the AD review done. Below are my comments and questions. Note the questions are truly questions and after answering we can discuss if there needed to be any changes or not. 
>  
>  
> 1. Section 4.1: Is there a reason to use TLS 1.2 specification (RFC5246) rather than TLS 1.3 as the general reference? 
>  
> 2. Comment on the writeup: Considering that ID nits results in the below relevant references warning I would expect some comment in the writeup if they are intentional. If not please update the references. If they are intentional, please update the writeup to note them. 
>  
>  
>  
>   -- Obsolete informational reference (is this intentional?): RFC 2385
>      (Obsoleted by RFC 5925)
>  
>   -- Obsolete informational reference (is this intentional?): RFC 4474
>      (Obsoleted by RFC 8224)
>  
>   -- Obsolete informational reference (is this intentional?): RFC 5246
>      (Obsoleted by RFC 8446)
>  
>   -- Obsolete informational reference (is this intentional?): RFC 7539
>      (Obsoleted by RFC 8439)
>  
> 3.  Section 4.1.2: Is there a point to mention that TLS forward secrecy are dependent on cipher suit for the key exchange and not ensured prior to 1.3? 
>  
> 4. Section 4.1.2: Second to last paragraph: Broken reference to DTLS 1.3 draft: “(Note that this extension is only supported in
>    DTLS 1.2 and 1.3 {{?I-D.ietf-tls-dtls13}.)”
>  
> 5. Section 4.3.3: “QUIC transport relies on UDP.” Although QUIC is targeting UDP as its main deployment vessel, isn’t QUIC in fact dependent on a unreliable datagram service. But, maybe writing UDP is more straightforward?
>  
> 6. Section 4.5.4: When it comes to variants of SRTP. I think referencing RFC 7201 would actually be reasonable, as in the many different options hide some transport security options that so far is not discussed in this document. Like securing multicasted / broadcasted RTP. 

Most of the additional security options described in RFC 7201 add little, if anything, to the other security protocols already discussed in the draft. We don’t mention that RTP can run over TLS over TCP, for example, but we already discuss TLS. The interesting protocol to mention is likely RTP with MIKEY for group communication, although bringing in group security might significantly widen the scope.

> 7. Section 4.5.4: So are ZRTP included as variant because it provides new security features? Is that session continuity, or something else? 

The use of the short authentication string and key continuity.

> 8. Section 11: There are a number of references here that I don’t think meets the requirement for references. These are the ones that only have a title and n.d. All these could include a URL a date when these pages was visited and contained the information you want to reference. 
>  
>  
> Cheers
>  
> Magnus Westerlund



-- 
Colin Perkins
https://csperkins.org/