Re: [tram] signature based 3rd party scheme
Stephen Farrell <stephen.farrell@cs.tcd.ie> Wed, 29 April 2015 09:07 UTC
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: tram@ietfa.amsl.com
Delivered-To: tram@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BAE071A9077 for <tram@ietfa.amsl.com>; Wed, 29 Apr 2015 02:07:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level:
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jz6jXq0IhHwB for <tram@ietfa.amsl.com>; Wed, 29 Apr 2015 02:07:37 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F389A1A8750 for <tram@ietf.org>; Wed, 29 Apr 2015 02:07:36 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id B00E1BE2F; Wed, 29 Apr 2015 10:07:34 +0100 (IST)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j02LgMWLRMtD; Wed, 29 Apr 2015 10:07:34 +0100 (IST)
Received: from [134.226.36.180] (stephen-think.dsg.cs.tcd.ie [134.226.36.180]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 8865FBDCB; Wed, 29 Apr 2015 10:07:34 +0100 (IST)
Message-ID: <55409F56.3090003@cs.tcd.ie>
Date: Wed, 29 Apr 2015 10:07:34 +0100
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0
MIME-Version: 1.0
To: "Tirumaleswar Reddy (tireddy)" <tireddy@cisco.com>, "tram@ietf.org" <tram@ietf.org>
References: <913383AAA69FF945B8F946018B75898A47821E90@xmb-rcd-x10.cisco.com>
In-Reply-To: <913383AAA69FF945B8F946018B75898A47821E90@xmb-rcd-x10.cisco.com>
OpenPGP: id=D66EA7906F0B897FB2E97D582F3C8736805F8DA2; url=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/tram/QumjSYSELgaYH4Fn322NUrmzS0g>
Subject: Re: [tram] signature based 3rd party scheme
X-BeenThere: tram@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Discussing the creation of a Turn Revised And Modernized \(TRAM\) WG, which goal is to consolidate the various initiatives to update TURN and STUN." <tram.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tram>, <mailto:tram-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tram/>
List-Post: <mailto:tram@ietf.org>
List-Help: <mailto:tram-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tram>, <mailto:tram-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Apr 2015 09:07:39 -0000
Hiya, On 29/04/15 03:59, Tirumaleswar Reddy (tireddy) wrote: > Passive attacks could occur in TURN due to lack of integrity > protection. For example, a passive attacker could monitor Allocate > request/response between the client and TURN server and make a > Refresh request with a requested lifetime of 0 to delete the > allocation. Well, that'd be an active attack as the adversary is sending messages, but that's a minor point of terminology only. > Message integrity of TURN messages ensures that passive > attacker cannot spoof TURN messages. TURN client and server can > compute message integrity using [2], but it is not possible with the > signature based scheme. However signature scheme could work if (D)TLS > is used b/w TURN client and server. Yes, it is the case that [2] (the current draft) does provide a key to the browser and TURN server that can be used for that. Getting that key to the TURN server however, requires the pre-arrangement stuff, including TLS client auth between the TURN server and WebRTC server (with the TURN server as TLS client), and doing that requires the TURN server to have signed up with a CA that the WebRTC server can verify, so that really is quite a lot of organisation (essentially a whole new thing like, but smaller than, the Web PKI just for TURN servers to authenticate themselves to the WebRTC servers). So what you consider a downside may actually be another advantage of a signature based scheme - if you need to worry about attacks on the STUN protocol, then you can choose how you handle that "locally" (between the browser and TURN server, e.g. using DTLS as you suggest) and not have to depend on the establishment of yet another Web PKI equivalent. Cheers, S.
- [tram] signature based 3rd party scheme Stephen Farrell
- Re: [tram] signature based 3rd party scheme Tirumaleswar Reddy (tireddy)
- Re: [tram] signature based 3rd party scheme Stephen Farrell
- Re: [tram] signature based 3rd party scheme Tirumaleswar Reddy (tireddy)
- Re: [tram] signature based 3rd party scheme Stephen Farrell
- Re: [tram] signature based 3rd party scheme Tirumaleswar Reddy (tireddy)
- Re: [tram] signature based 3rd party scheme Stephen Farrell
- Re: [tram] signature based 3rd party scheme Tirumaleswar Reddy (tireddy)
- Re: [tram] signature based 3rd party scheme Stephen Farrell
- Re: [tram] signature based 3rd party scheme Tirumaleswar Reddy (tireddy)
- Re: [tram] signature based 3rd party scheme Brandon Williams