Re: [tram] signature based 3rd party scheme

Stephen Farrell <stephen.farrell@cs.tcd.ie> Wed, 29 April 2015 09:07 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: tram@ietfa.amsl.com
Delivered-To: tram@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BAE071A9077 for <tram@ietfa.amsl.com>; Wed, 29 Apr 2015 02:07:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level:
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jz6jXq0IhHwB for <tram@ietfa.amsl.com>; Wed, 29 Apr 2015 02:07:37 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F389A1A8750 for <tram@ietf.org>; Wed, 29 Apr 2015 02:07:36 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id B00E1BE2F; Wed, 29 Apr 2015 10:07:34 +0100 (IST)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j02LgMWLRMtD; Wed, 29 Apr 2015 10:07:34 +0100 (IST)
Received: from [134.226.36.180] (stephen-think.dsg.cs.tcd.ie [134.226.36.180]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 8865FBDCB; Wed, 29 Apr 2015 10:07:34 +0100 (IST)
Message-ID: <55409F56.3090003@cs.tcd.ie>
Date: Wed, 29 Apr 2015 10:07:34 +0100
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0
MIME-Version: 1.0
To: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>, "tram@ietf.org" <tram@ietf.org>
References: <913383AAA69FF945B8F946018B75898A47821E90@xmb-rcd-x10.cisco.com>
In-Reply-To: <913383AAA69FF945B8F946018B75898A47821E90@xmb-rcd-x10.cisco.com>
OpenPGP: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/tram/QumjSYSELgaYH4Fn322NUrmzS0g>
Subject: Re: [tram] signature based 3rd party scheme
X-BeenThere: tram@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussing the creation of a Turn Revised And Modernized \(TRAM\) WG, which goal is to consolidate the various initiatives to update TURN and STUN." <tram.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tram>, <mailto:tram-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tram/>
List-Post: <mailto:tram@ietf.org>
List-Help: <mailto:tram-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tram>, <mailto:tram-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Apr 2015 09:07:39 -0000

Hiya,

On 29/04/15 03:59, Tirumaleswar Reddy (tireddy) wrote:
> Passive attacks could occur in TURN due to lack of integrity
> protection. For example, a passive attacker could monitor Allocate
> request/response between the client and TURN server and make a
> Refresh request with a requested lifetime of 0 to delete the
> allocation. 

Well, that'd be an active attack as the adversary is
sending messages, but that's a minor point of
terminology only.

> Message integrity of TURN messages ensures that passive
> attacker cannot spoof TURN messages. TURN client and server can
> compute message integrity using [2], but it is not possible with the
> signature based scheme. However signature scheme could work if (D)TLS
> is used b/w TURN client and server.

Yes, it is the case that [2] (the current draft) does
provide a key to the browser and TURN server that can
be used for that. Getting that key to the TURN server
however, requires the pre-arrangement stuff, including
TLS client auth between the TURN server and WebRTC
server (with the TURN server as TLS client), and doing
that requires the TURN server to have signed up with a
CA that the WebRTC server can verify, so that really
is quite a lot of organisation (essentially a whole new
thing like, but smaller than, the Web PKI just for
TURN servers to authenticate themselves to the WebRTC
servers).

So what you consider a downside may actually be another
advantage of a signature based scheme - if you need to
worry about attacks on the STUN protocol, then you can
choose how you handle that "locally" (between the browser
and TURN server, e.g. using DTLS as you suggest) and not
have to depend on the establishment of yet another Web
PKI equivalent.

Cheers,
S.