> -----Original Message-----
> From: Richard Barnes [mailto:[EMAIL PROTECTED] 
> Sent: Tuesday, November 06, 2007 8:52 AM
> To: Dan Wing
> Cc: 'IETF SIP List'; 'Hannes Tschofenig'; 'Fries, Steffen'; 
> 'Francois Audet'
> Subject: Re: Review of draft-ietf-sip-media-security-requirements-00
> 
> Dan,
> 

> I agree that R23 and R25 aren't necessarily related to lawful
> intercept, but all three requirements are related to third parties
> having access to plain-text media -- and the whole point of
> encrypting data is to protect it against access by unauthorized
> third parties.  In order to provide access to these parties (quality
> of service, law enforcement, or middleboxes) and still provide
> security, either (1) the protocol needs to have some mechanism for
> explicitly authorizing these users, or (2) there needs to be an
> out-of-band mechanism like draft-wing-sipping-srtp-key.
>
> Option (1) (explicit authorization) is (IMO) the much less 
> appealing option:
> 1. It directly conflicts with R24, since it enables the 
> endpoints to be aware that another party is being given access.

Disclosing the SRTP via PUBLISH (option (2)) also creates the same 
awareness.

> 2. It means that the requirements can only be satisfied by a 
> multi-party / multicast keying protocol (since it has to assume that 
> there are at least three parties to a call).

Not necessarily.  It could be accomplished with DTLS-SRTP with two
DTLS handshakes, like this diagram:

   endpoint            middlebox           remote endpoint
      |                     |                     | 
      |                     |<--DTLS ClientHello--|
      |                     |---DTLS SrvrHello--->|
      |                     | ...                 |
      |                     |<--finished--        |
      |                     |---finished--------->|
      |                     |<-SRTP with key "A"->|
      |<--DTLS ClientHello--|                     |
      |---DTLS SrvrHello--->|                     |
      | ...                 |                     |
      |<--finished----------|                     |
      |---finished--------->|                     |
      |<-SRTP with key "B"->|                     |

There are two SRTP keys (A and B), and the middlebox would need
to decrypt SRTP and re-encrypt SRTP.  I expect this is not terribly
desirable due to the computational effort to decrypt and re-encrypt
the SRTP traffic.

> 3. It adds hard authentication requirements (so that not just 
> anyone can be the listening party), which will hinder deployment

That's probably true.

> Option (2), on the other hand, requires no text in the media security 
> requirements.  It provides the same functionality, with two caveats:
> 1. One endpoint has to be willing to transmit the keys to the 
> listener. 
>   In a enterprise network, this isn't a problem, since endpoints are 
> tightly controlled.  A VSP that wants to provide lawful intercept can 
> just block SRTP calls that don't provide a key.
> 2. The listener has to be willing to tolerate the delay induced by 
> routing the keys through SIP.  AFAIK, there are no requirements for 
> real-time recording or lawful intercept, but this may be a 
> small problem for middleboxes.

(2) isn't a significant problem, assuming DTLS-SRTP is allowed to
complete before the call is answered (and SRTP wants to start flowing).

> So on the whole, it seems to me like option (2) covers at 
> least two of the three use cases you've proposed.

I agree, which is why I have co-authored draft-wing-sipping-srtp-key.

But I'm trying to step back and ensure that it meets with everyone's
requirements regarding recording (for banks, stock brokers, etc.), 
and transcoding (compressed codecs to 'standard' codecs).  I don't
yet have a message flow for how draft-wing-sipping-srtp-key would
work well with transcoding; what I have sketched out is far 
uglier (more messages) than what everyone does for RTP transcoding 
today.

-d

> --Richard
> 
> 
> > R23 refers only to recording of media.  This is necessary in many 
> > business environments such as banks, stock brokers, catalog 
> ordering call
> > centers, and so on.  This is a requirement for many businesses.  It
> > is not yet clear if draft-wing-sipping-srtp-key (or 
> something like it) 
> > meets requirement R23.
> 
> It seems like does, provided that (1) endpoints are willing 
> to send key 
> to authorized listeners, and (2) the delay induced by SIP is 
> tolerable. 
>   Both of these would seem to be true in the enterprise 
> environments you 
> describe.
> 
> > I agree R24 refers to lawful intercept.  This is a requirement from
> > other SDOs that need to provide lawful intercept with their 
> solutions.
> > 
> > Another email on R24 lawful intercept will be forthcoming shortly.
> 
> > R25 reference to 'intermediate nodes' is to transcoders and 
> SBCs which
> > handle signaling and media traffic.  It seems important 
> that any keying
> > mechanism work with such intermediate nodes, as those 
> intermediate nodes
> > are common on many SIP networks.


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to