[VIPR] Minutes for 2011/10/07 conference call
Marc Petit-Huguenin <petithug@acm.org> Mon, 10 October 2011 15:28 UTC
Return-Path: <petithug@acm.org>
X-Original-To: vipr@ietfa.amsl.com
Delivered-To: vipr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix)
with ESMTP id 7E87B21F8C42 for <vipr@ietfa.amsl.com>;
Mon, 10 Oct 2011 08:28:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -98.374
X-Spam-Level:
X-Spam-Status: No, score=-98.374 tagged_above=-999 required=5
tests=[BAYES_40=-0.185, NO_RELAYS=-0.001, SARE_SPEC_REPLICA_OBFU=1.812,
USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8vENpRBVstaO for
<vipr@ietfa.amsl.com>; Mon, 10 Oct 2011 08:28:09 -0700 (PDT)
Received: from implementers.org (implementers.org
[IPv6:2604:3400:dc1:41:216:3eff:fe5b:8240]) by ietfa.amsl.com (Postfix) with
ESMTP id 895CC21F8BCB for <vipr@ietf.org>;
Mon, 10 Oct 2011 08:28:09 -0700 (PDT)
Received: from [IPv6:2001:470:1f05:616:213:d4ff:fe04:3e08] (shalmaneser.org
[IPv6:2001:470:1f05:616:213:d4ff:fe04:3e08]) (using TLSv1 with cipher
AES256-SHA (256/256 bits)) (Client CN "petithug", Issuer "implementers.org"
(verified OK)) by implementers.org (Postfix) with ESMTPS id 6E35D2025C for
<vipr@ietf.org>; Mon, 10 Oct 2011 15:20:48 +0000 (UTC)
Message-ID: <4E930F06.9040304@acm.org>
Date: Mon, 10 Oct 2011 08:28:06 -0700
From: Marc Petit-Huguenin <petithug@acm.org>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US;
rv:1.9.2.23) Gecko/20111005 Iceowl/1.0b2 Icedove/3.1.15
MIME-Version: 1.0
To: "vipr@ietf.org" <vipr@ietf.org>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Subject: [VIPR] Minutes for 2011/10/07 conference call
X-BeenThere: vipr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Verification Involving PSTN Reachability working group <vipr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/vipr>,
<mailto:vipr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/vipr>
List-Post: <mailto:vipr@ietf.org>
List-Help: <mailto:vipr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/vipr>,
<mailto:vipr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Oct 2011 15:28:10 -0000
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VIPR Design Team conference call on Friday October 7th, from 9:05am to 9:55am PST. o Attendees: Mary Barnes Daryl Malas Hakim Mehmood Muthu Arul Mozhi Perumal Jon Peterson Marc Petit-Huguenin Michael Procter John Ward Dean Willis o Agenda - - Move SIP intermediaries in a future draft (5 min) - - RELOAD registration (5 min) - - Replacement ticket by client certificate (10 min) - - PVP privacy (10 min) - - PVP method priority and registration (10 min) - - PVP method entropy (10 min) - - Ticket renewal (10 min) - - Infrastructure overlays (5 min) o Action items - - Treat SIP interworking as an extension. - - Remove the text saying that the phone number must be stored 3 times at the VIPR level. - - Explain the problem and requirements for the ticket mechanism. o Minutes - - Move SIP intermediaries in a future draft Marc: The proposal is to treat SIP intermediaries as an extension to VIPR, in a separate draft, but to be sure that we have the required hooks in the VIPR drafts to not have to modify VIPR later. The last part of the proposal is to add a milestone for this after finishing the work on the base VIPR. Jon: The viability of this proposal would depends on what the hooks are. Second I would be careful to not put this in term of SIP intermediaries, a more generic problem is inter-working. But I am really interested on what the hooks are. Marc: I do not know what the hooks would be. I just published what the problem is, as I said I would do in the previous meeting. I will release another version that will contain multiple solutions and we can see from here what the hooks will be, if there is any needed. Dean: If we are going to place a lot of requirements, it becomes a location server. It's a simple lookup operation. Jon: Documenting the hooks in the intermediary draft is one thing but the hooks will be in the base draft, we need to be clear on this. We need to not scope this work too narrowly. Marc: Do we agree to work on this later? Mary: Yes. Dean: I disagree slightly with Jon. One hop is straightforward, but more raises a set of transitive trust issues. Jon: If we have two overlays then we have a disaster. Keep the milestone high level. - - RELOAD registration Marc: The current spec is saying that each phone number is registered 3 times, which with the normal RELOAD replication, means that it is stored 9 times. So the question was what to do when there is a difference between the copies retrieved. The proposal was to require to have at least two identical copies. But the discussion moved to why do we require 3 copies in the first place. So the next proposal was to store the phone number one time, to verify that there was 3 identical replicas, and to use the voting algorithm when retrieved. Hakim: What does identical mean? Marc: Which return the same Node-ID. The idea is that a rogue peer should not prevent PVP to work. But the discussion was more about the requirement of having 3 copies at the VIPR level. Hakim: Does it really mater? The data in the overlay is not trusted. Marc: Do we want to say that all nodes need to register 3 times or keep it simple, i.e. one time? It does not make a difference when storing, but the nodes that will fetch need to know the number of copies. One way it can be solved is to put a parameter in the configuration file that indicate the number of copies at the VIPR level. Jon: Did we ever find why there was 3 copies? Hakim: That was to increase the security - I am not sure. Michael: It is easy to retrieve the replica? Marc: Yes, what you do is that you put the Node-ID of the successor in the Fetch request, instead of using just the Resource-ID. Michael: If the first node is compromised, why should I trust it to give me the successor? Marc: An excellent question, but more of a RELOAD problem. Michael: So RELOAD protects against network outages, no malicious nodes. So to go back to Jon's point, we will validate any request anyway because we do not trust anything from RELOAD. Hakim: Yes, the idea was to protect in case a copy is lost. Jon: OK, so just need one copy. Hakim: It does not matter for an application point of view. Jon: It is related to the SIP intermediaries. Hakim: No its a dictionary storage. Also having multiple copies permits to increase the trust in a copy. Marc: So one proposal would be to add a variable ion the configuration file that contain the number of copies at the VIPR level. Michael: I am reluctant to add a configuration variable. I do not think we need to replicate at the VIPR level, because we will verify everything we get. Marc: OK so everybody agree to remove the duplication at the VIPR level. - - Replacement ticket by client certificate Marc: The first problem with the ticket is that the ticket is signed using a symmetrical key, key that need to be shared between the PVP server and the call agent. The second problem is that the ticket is separated from the TLS certificate, so you have to validate the TLS connection, then verify the ticket. Another problem is that there is not existing proven code for processing the ticket. So the idea is to replace the ticket by an X.509 certificate, which already contains all the fields required by the ticket, can use asymmetrical keys, and has existing proven libraries. Jon: This is a significant change, and we would need more time. We should not diverge too much from what SIP is doing. TLS is not use much so pushing all the security features into TLS might not be a guarantee of widespread success. How do you push this certificate onto systems that want to use it, and how do you capture the parameters of the call so that you verify that it is the right person you are talking to. Marc: To push the certificate, you just send it instead of the ticket. As for the significant change, I will publish code that shows that it is less work to use a certificate than a ticket. Hakim: If sharing the secret is a concern, we should consider diverging? Marc: It is a concern for me. Jon: It's unclear to me why you need to share the symmetrical key. The proxy could just pass the ticket to the element that can verify it. Michael: A middle ground would be to use public keys to sign the ticket. Marc: It's not like there is 100's of implementations that need to be modified. Hakim: I agree with Jon that keeping the semantics of SIP is important. If that means changing whatever Cisco implemented, it is fine. Marc: A certificate is not that different from a ticket using asymmetrical keys. Hakim: If it falls within regular TLS, then OK. Jon: If the symmetrical key is the problem, then we need to go back to the requirements. This proposal is worth considering, but there is a huge space of solutions that can be considered. Marc: One problem is that in the current version of VAP there is no possibility to verify the ticket at another place than on the call agent. - -- Marc Petit-Huguenin Personal email: marc@petit-huguenin.org Professional email: petithug@acm.org Blog: http://blog.marc.petit-huguenin.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAk6TDwQACgkQ9RoMZyVa61e7bgCdHV+MWYw7kK+2sPY/0/CfIo6A 6wAAnjrrsEj7RSlRj3zgBaM1hJ1jA0zL =3Pch -----END PGP SIGNATURE-----
- [VIPR] Minutes for 2011/10/07 conference call Marc Petit-Huguenin