Re: [tram] signature based 3rd party scheme

"Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com> Thu, 30 April 2015 13:14 UTC

Return-Path: <tireddy@cisco.com>
X-Original-To: tram@ietfa.amsl.com
Delivered-To: tram@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 030EC1B29D8 for <tram@ietfa.amsl.com>; Thu, 30 Apr 2015 06:14:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G1IjghO5Kdok for <tram@ietfa.amsl.com>; Thu, 30 Apr 2015 06:14:55 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3FF641B29D4 for <tram@ietf.org>; Thu, 30 Apr 2015 06:14:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=3564; q=dns/txt; s=iport; t=1430399695; x=1431609295; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=W1vX9lzgElEcWfpayXDUT5n5mOdGq8ce8LhZLpvtOS4=; b=kHgDx3empxzbG3qWjwxUp4lL7coOH65Ls/V4OhPGEU/xFSBGp5j8elma DWtetURahmW47OyGI1ZVrFXHmrr2vfzsxctNK0CdxWIMLnzUz8IqIo36v GEPSXtOoUgWPpkABu8G0lk1jMESqpzRppXn5YrgTXjjBDiokSNQr9tS2p g=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0C3BAC8KUJV/4kNJK1cgwxTXAWDFsFOZgmBU4YEAhyBNDgUAQEBAQEBAYEKhCABAQEDASMRUQQCAQgRBAEBAQICBh0DAgICMBQBCAgBAQQBEgiIGwgNtBWTSgEBAQEBAQEBAQEBAQEBAQEBAQEBARMEgSGKF4Q6GhYiBoJiL4EWBZFqhAmcPCOBZYIPb4FEgQEBAQE
X-IronPort-AV: E=Sophos;i="5.11,677,1422921600"; d="scan'208";a="145948766"
Received: from alln-core-4.cisco.com ([173.36.13.137]) by alln-iport-5.cisco.com with ESMTP; 30 Apr 2015 13:14:54 +0000
Received: from xhc-aln-x01.cisco.com (xhc-aln-x01.cisco.com [173.36.12.75]) by alln-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id t3UDEsxu024191 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Thu, 30 Apr 2015 13:14:54 GMT
Received: from xmb-rcd-x10.cisco.com ([169.254.15.218]) by xhc-aln-x01.cisco.com ([173.36.12.75]) with mapi id 14.03.0195.001; Thu, 30 Apr 2015 08:14:54 -0500
From: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, "tram@ietf.org" <tram@ietf.org>
Thread-Topic: [tram] signature based 3rd party scheme
Thread-Index: AdCCKHW9CjsMzThwTKab4ELJ3vVgMQAXWEQAADAwUsA=
Date: Thu, 30 Apr 2015 13:14:53 +0000
Message-ID: <913383AAA69FF945B8F946018B75898A47822B94@xmb-rcd-x10.cisco.com>
References: <913383AAA69FF945B8F946018B75898A47821E90@xmb-rcd-x10.cisco.com> <55409F56.3090003@cs.tcd.ie>
In-Reply-To: <55409F56.3090003@cs.tcd.ie>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.65.36.242]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/tram/48K85Ymh_ivaDNMhh8k2blev65c>
Subject: Re: [tram] signature based 3rd party scheme
X-BeenThere: tram@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussing the creation of a Turn Revised And Modernized \(TRAM\) WG, which goal is to consolidate the various initiatives to update TURN and STUN." <tram.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tram>, <mailto:tram-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tram/>
List-Post: <mailto:tram@ietf.org>
List-Help: <mailto:tram-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tram>, <mailto:tram-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 Apr 2015 13:14:57 -0000

> -----Original Message-----
> From: Stephen Farrell [mailto:stephen.farrell@cs.tcd.ie]
> Sent: Wednesday, April 29, 2015 2:38 PM
> To: Tirumaleswar Reddy (tireddy); tram@ietf.org
> Subject: Re: [tram] signature based 3rd party scheme
> 
> 
> Hiya,
> 
> On 29/04/15 03:59, Tirumaleswar Reddy (tireddy) wrote:
> > Passive attacks could occur in TURN due to lack of integrity
> > protection. For example, a passive attacker could monitor Allocate
> > request/response between the client and TURN server and make a Refresh
> > request with a requested lifetime of 0 to delete the allocation.
> 
> Well, that'd be an active attack as the adversary is sending messages, but
> that's a minor point of terminology only.
> 
> > Message integrity of TURN messages ensures that passive attacker
> > cannot spoof TURN messages. TURN client and server can compute
> message
> > integrity using [2], but it is not possible with the signature based
> > scheme. However signature scheme could work if (D)TLS is used b/w TURN
> > client and server.
> 
> Yes, it is the case that [2] (the current draft) does provide a key to the
> browser and TURN server that can be used for that. Getting that key to the
> TURN server however, requires the pre-arrangement stuff, including TLS
> client auth between the TURN server and WebRTC server (with the TURN
> server as TLS client), and doing that requires the TURN server to have signed
> up with a CA that the WebRTC server can verify, so that really is quite a lot
> of organisation (essentially a whole new thing like, but smaller than, the
> Web PKI just for TURN servers to authenticate themselves to the WebRTC
> servers).

TURN server and AS could be in the same administrative domain and pre-arrangement is simple in this case. The other deployment scenario is WebRTC service provider has tie-up with TURN service provider to use its service; pre-arrangement helps accounting and in future support for token introspection https://tools.ietf.org/html/draft-ietf-oauth-introspection-08.
(There is no WG consensus yet if token introspection is required)

> 
> So what you consider a downside may actually be another advantage of a
> signature based scheme - if you need to worry about attacks on the STUN
> protocol, then you can choose how you handle that "locally" (between the
> browser and TURN server, e.g. using DTLS as you suggest) and not have to
> depend on the establishment of yet another Web PKI equivalent.

Yes and in this scenario WebRTC server must force the client to pick DTLS.

-Tiru
> 
> Cheers,
> S.