Eric Rescorla wrote:
...
> > > S 4.3.
> > > The entire section on shared key conferencing doesn't lead to any
> > > requirements as far as I can tell. Does it make sense to remove
> > > it from this document?
> >
> > Right. It seems useful to leave it in, as mentioned at the
> > beginning of the section:
> >
> > The consensus on the RTPSEC mailing list was to concentrate on
> > unicast, point-to-point sessions. Thus, there are no
> requirements
> > related to shared key conferencing. This section is retained for
> > informational purposes.
> >
> > if others agree it should be removed, I can remove it.
>
> I've got no real problem with leaving it in, I just wanted
> to note it.
I moved it into Appendix B, which Dan York suggested. That accomplishes
the goal of documenting the decision and clearly making the discussion
text non-normative.
> > > S 5.3.
> > > R-OTHER-SIGNALING:
> > > A solution SHOULD be able to negotiate keys for
> > > SRTP sessions
> > > created via different call signaling protocols
> > > (e.g., between
> > > Jabber, SIP, H.323, MGCP).
> > >
> > > This is not discussed anywhere in the document. I wonder
> > > if it makes
> > > sense to remove it.
> >
> > I know that my employer's products interwork between SIP
> > and MGCP (and
> > our proprietary SCCP) with SRTP today -- all using Security
> > Descriptions.
> >
> > I know we have a need to meet this requirement with anything that
> > replaces our Security Descriptions implementations. I expect others
> > do, too.
> >
> > Would adding motivating text (in a new subsection 4.xxx) be
> > useful? I had assumed the need was self-evident.
>
> As a matter of form, I think it would be good to have a section
> with motivating text.
Ok. I added a new section to justify R-OTHER-SIGNALING:
4.8. Interworking with Other Signaling Protocols
The discussion in this section relates to the requirement R-OTHER-
SIGNALING.
In many environments, some devices are signaled with protocols other
than SIP which do not share SIP's offer/answer model (e.g., [H.248.1]
or do not utilize SDP (e.g., H.323). In other environments, both
endpoints may be SIP, but may use different key management systems
(e.g., one uses MIKEY-RSA, the other MIKEY-RSA-R).
In these environments, it is desirable to have SRTP -- rather than
RTP -- between the two endpoints. It is always possible, although
undesirable, to interwork those disparate signaling systems or
disparate key management systems by decrypting and re-encrypting each
SRTP packet in a device in the middle of the network (often the same
device performing the signaling interworking). This is undesirable
due to the cost and increased attack area, as such an SRTP/SRTP
interworking device is a valuable attack target.
At the time of this writing, interworking is considered important.
Interworking without decryption/encryption of the SRTP, while useful,
is not yet deemed critical because the scale of such SRTP deployments
is, to date, relatively small.
and a new section to justify R-CERTS (based on comments I received from
another reviewer):
4.9. Certificates
The discussion in this section relates to R-CERTS.
On the Internet and on some private networks, obtaining certificates
issued by a certificate authority can be difficult or expensive, and
requires peers to trust the issuing certificate authority. For these
reasons, it is important that authentication mechanisms that utilize
certificates not rely exclusively on such CA-issued certificates, but
to also allow self-signed certificates. By allowing the use of such
self-signed certificates, an out-of-band mechanism (e.g., manual
configuration) can be used to trust a peer's certificate.
Here are the other requirements in the document which do not have text to
motivate the requirements. Which of these -- or perhaps all of them? --
should have additional text written:
R-RTP-VALID:
If SRTP key negotiation is performed over the media path (i.e.,
using the same UDP/TCP ports as media packets), the key
negotiation packets MUST NOT pass the RTP validity check
defined in Appendix A.1 of [RFC3550].
R-NEGOTIATE:
The media security key management protocol MUST allow a SIP
User Agent to negotiate media security parameters for each
individual session.
R-PFS:
The media security key management protocol MUST be able to
support perfect forward secrecy.
R-COMPUTE:
The media security key management protocol MUST support
offering additional SRTP cipher suites without incurring
significant computational expense.
R-DOS:
The media security key management protocol SHOULD NOT introduce
new denial of service vulnerabilities (e.g., the protocol
should not request the endpoint to perform CPU-intensive
operations without the client being able to validate or
authorize the request).
R-EXISTING:
The media security key management protocol SHOULD allow
endpoints to authenticate using pre-existing cryptographic
credentials, e.g., certificates or pre-shared keys.
R-AGILITY:
The media security key management protocol MUST provide crypto-
agility, i.e., the ability to adapt to evolving cryptography
and security requirements (update of cryptographic algorithms
without substantial disruption to deployed implementations)
R-DOWNGRADE:
The media security key management protocol MUST protect cipher
suite negotiation against downgrading attacks.
R-ALLOW-RTP: A solution SHOULD be described which allows RTP media
to be received by the calling party until SRTP has been
negotiated with the answerer, after which SRTP is preferred
over RTP.
Related to this, the two requirements R-ASSOC and R-FIPS have in-line
justifications (rather than a discussion in a separate section). This was
done because they are relatively short, but for style reasons (and because
some of the newer motivational text is now quite short) we could move those
justifications out of Section 5 (requirements) and into section 4 (call
scenarios and requirements considerations). I don't care much either way.
...
> > Thanks. I don't know where that text came from (it isn't my wording
> > but it was in my original -00). Changed to:
> >
> > DTLS-SRTP
> > PFS is provided if the negotiated cipher suite
> > uses ephemeral
> > keys (e.g., Diffie-Hellman (DH_RSA from [RFC4346])
> > or Elliptic
> > Curve Diffie-Hellman [RFC4492]).
>
> s/DH_RSA/DHE_RSA/. DH_RSA means static keys.
Thanks, fixed.
> > > S A.1.13.3.
> > > It's probably important to indicate that it is desirable to have
> > > the profile be RTP/SAVP when SRTP is used. That's a disadvantage
> > > of media path probing, for instance. I don't think that comes
> > > across clearly here.
> >
> > There is a disadvantage with RTP/SAVP as the profile, as
> > well, mentioned at
> > the beginning of that section -- just prior to the list of candidate
> > techniques.
> >
> > This section is titled Best Effort Encryption, and RTP/SAVP
> > is not a candidate
> > technique to provide best effort encryption -- RTP/SAVP
> > causes a call to fail
> > to complete if any of the remote forks or targets (during
> > retargeting) rejects
> > the call because they don't understand that profile. This
> > is discussed at the
> > beginning of that section, in order to justify why we need
> > best effort
> > encryption -- so that we can deploy SRTP without a priori
> > knowledge of the
> > called party's deployment of RTP/SAVP-capable endpoints at
> > that particular moment.
>
> So, maybe I just misunderstood the situation: I had thought that
> with the new media cap stuff one would offer both RTP/SAVP and
> RTP/AVP, so you would get best effort. Am I confused?
We do -- but the SDP capability negotiation does not put RTP/SAVP
on the "m=" line (which is where the profile is indicated). Rather,
SDP capability negotiation puts the RTP/SAVP profile into an "a="
line.
-d
_______________________________________________
Sip mailing list https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip