At Tue, 6 Nov 2007 09:50:42 -0800,
Dan Wing wrote:
> 
> Other SDOs have lawful intercept requirements, which are currently
> captured in requirement R24 in 
> draft-ietf-sip-media-security-requirements-00:
> 
>    "R24:   The media security key management protocol SHOULD 
>            NOT allow end users to determine whether their 
>            end-to-end interaction is subject to lawful 
>            interception."
>
> DTLS-SRTP was selected by IETF as the IETF's preferred mechanism
> to establish SRTP keys for unicast, point-to-point SRTP sessions.
> 
> There appear to be two methods to meet R24 with DTLS-SRTP.  They
> are:
> 
>    a. provide a network element on every SRTP call which relays
>       media, performs a DTLS handshake, and decrypts and re-encrypts
>       SRTP, or;
> 
>    b. have endpoints perform key disclosure for every call (using a 
>       technique similar to draft-wing-sipping-srtp-key), and perform
>       validation of that disclosed key on every call.
> 
> If these methods to meet R24 are deemed acceptable to other SDOs,
> we don't find any reason for those SDOs to reject IETF's decision
> to use DTLS-SRTP as the preferred mechanism to establish SRTP
> keys for unicast, point-to-point SRTP sessions.

Wow, this sure produced a lot of discussion. I'd like to make a few
points:

1. It's not clear to me that people are correctly parsing LI
   requirements. I'm not an expert on CALEA, let alone laws in other
   countries, but it's not my understanding that there is any
   regulatory requirement that forces carriers of voice or data
   traffic to arrange for disclosure of plaintext when they don't have
   the keys. I.e., if I buy data service from Comcast and choose to
   run a VPN, there is no requirement that Comcast somehow obtain the
   keys to deliver them to the FBI.

   It's less clear to me what the requirements are for 3G-style
   carriers when the endpoints are doing the crypto. I.e., I'm quite
   certain that if AT&T terminates the crypto they need to provide the
   plaintext on request, but a lot less certain that they need to
   provide the plaintext if the crypto is end-to-end.

2. It's extremely difficult to guarantee that the keys for
   communication are being properly escrowed in the face of the
   possibility that one or both of the communicating parties is
   cheating. This is especially difficult if you want to avoid having
   real-time access to the escrow keys used to encrypt the traffic
   keys, which is generally good practice.  So, I would be very
   surprised if there were any regulatory requirement that LI work in
   the face of endpoint cheating.

3. Given (2) above, I don't see how R24 can be achieved, since
   two cooperating peers can always guarantee that their plaintext
   is not subject to LI if they can arrange for any side channel
   for key agreement.

4. I don't actually think there's any protocol engineering required
   here. The problem of how to arrange for TLS traffic key disclosure
   to third parties without modifying the wire protocol has been quite
   extensively studied and a broad variety of approaches exist,
   covering a range of levels of active/passiveness, real-timeness,
   cooperation from the endpoints, etc. Techniques exist which are
   significantly better than those indicated by Dan. For instance,
   consider that if you have the TLS server's private key and you're
   doing RSA, you can do completely passive inspection with no
   cooperation from either side. Another example would be [GBGP03]. 

   Also, as Jon Peterson observed, the owner of the namespace can
   always enforce any restrictions that it wants. It's possible that
   imposes significant performance costs, but it's not clear that
   that's true in all cases with clever implementation. 

   I don't really have time right now to go into any of this stuff
   in more detail, but I'd certainly be happy to sit down with
   anyone who cares in YVR and explain the state of the art. I don't
   really see that this is really relevant to what happens in this
   WG, though.

-Ekr


[GBGP03] E.-J. Goh, D. Boneh, P. Golle, B. Pinkas",
         The Design and Implementation of Protocol-Based Hidden
         Key Recovery", 2003.


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to