Re: draft-wing-sipping-srtp-key

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thanks for your review.

-d
 

> -----Original Message-----
> From: sipping-bounces@xxxxxxxx 
> [mailto:sipping-bounces@xxxxxxxx] On Behalf Of Eric Rescorla
> Sent: Sunday, February 15, 2009 8:59 AM
> To: sipping@xxxxxxxx; secdir@xxxxxxxx; 
> draft-wing-sipping-srtp-key@xxxxxxxxxxxxxx
> Subject:  (no subject)
> 
> $Id: draft-wing-sipping-srtp-key-04-rev.txt,v 1.2 2009/02/15 
> 15:41:29 ekr Exp $
> 
> 
> End-to-end VoIP security mechanisms such as DTLS-SRTP represent a
> threat to mechanisms in which a network element which is not a party
> to the call wishes to monitor or modify the contents of the media
> traffic. This document describes a mechanism for one of the parties
> to the communication to provide a copy of the keying material
> to such a third party subject to some set of authorization
> controls. 
> 
> I'm concerned that this document doesn't have a very clear
> statement of requirements. Rather, it seems to be attempting
> to fulfill a number of distinct use cases which don't have
> much in common except that they represent violations of the
> end-to-end security model of the SIP call.
> 
> This document describes two major use cases for this type of
> technology:
> 
> - Monitoring (call recording)
> - Transcoding
> 
> I don't think it's particularly useful to conflate these cases, which
> are really quite different. Monitoring is fundamentally a passive
> process: there is no need for the monitor to be able to modify the
> traffic. By contrast, transcoding is an active process: the transcoder
> is expected to modify the data. In reality, a transcoded call isn't
> a call between two endpoints, but rather two calls, each from one
> endpoint to the transcoder. I think it's a mistake to try do to
> these with the same mechanism. 
> 
> Similarly, this document fails to distinguish adequately between
> real-time and non-real-time use cases. Many monitoring/call recording
> applications are inherently non-real-time: you record the call
> and some time in the future, the call may or may not be replayed.
> This distinction has a number of implications, particularly since
> capture of the keying material and media can be separated. In
> particular, it may be desirable to deliver the keying 
> material long after
> the call has finished (for privacy reasons). It's not clear
> to me how this is accomplished with this draft. It's possible
> it could be initiated by the UA, but I don't see how it could
> be initiated by the monitor. Even in a UA initiated fashion,
> I don't see that the information provided by the SDP in S 11
> is sufficient to unambiguously identify the flow, in part
> due to network parameter reuse.
> 
> While I appreciate it's convenient to reuse the SDP parameters,
> it's not clear to me that it's a good idea to hand over the SRTP
> master key. If all you need to do is verify the call for 
> quality assurance, you don't need the integrity check, at
> least not initially. In fact, not having access to the integrity
> key protects against accusations that the recording device
> tampered. Similarly, it's not clear to me that it's desirable
> to have the same level of protection for the connection parameters
> as for the keys. Wouldn't it be useful for the monitoring application
> to know what connections it *potentially* has the keys for 
> but not have direct access to them until some future time?
> Again, this seems like something that would be more clear with
> a requirements analysis in terms of privacy requirements.
> 
> Finally, the elephant under the covers here is lawful intercept.
> the authors specifically disclaim it, but it's quite clear that 
> this is usable as an LI system. Indeed, many such systems
> (e.g., FORTEZZA) involve cooperation from the endpoint being
> monitored. 
> 
> Accordingly, I would recommend that rather than accepting this
> mechanism as a WG document, the WG do a thorough requirements
> analysis focusing on minimizing the privacy issues inherent in
> mechanisms of this type. Once there is consensus on the requirements,
> then it's possible to have a discussion of mechanisms.
> 
> 
> DETAILED COMMENTS
> 4.3.
> If the requirement for recording is this strong, wouldn't it
> be better not to rely on the UA doing the right thing? Rather
> enforce it in a firewall or IDS.
> 
> 7.2.2.
>    The signature of the SAML assertion should be produced using the
>    private key of the domain certificate.  This certificate 
> MUST have a
>    SubjAltName which matches the domain of user agent's SIP 
> proxy (that
>    is, if the SIP proxy is sip.example.com, the SubjAltName of the
>    domain certificate signing this SAML assertion MUST also be
>    example.com).  Here, the main focus is placed on communication of
>    clients with the ESC, which belongs to the client's home domain.
> 
> It's not clear to me why this is the correct authorizing certificate.
> 
> 
> 7.2.3.
> I don't really understand the need for the rcrypto thing.
> Why not just pretend you have two streams with distinct
> keys and use crypto= for both.
> 
> Actually, I don't really think it makes sense to use SDP
> here at all: the semantics of the SDP really aren't the same,
> since you're not offering to receive a media stream,
> you're advertising what you're going to send. 
> 
> As noted above, I think it would be better to send the
> traffic keys separately.
> 
> 7.2.4.
> This whole SAML thing seems pretty underspecified.
> 
> I don't think using SIPS here is adequate, since it doesn't
> provide any guarantee to the endpoint of the security treatment
> of the keying material. In fact, as I noted earlier, I'm not clear
> that S/MIME is good enough. I think you may want something
> multilevel.
> 
> 
> 9.3.
> This Disclosure thing seems a bit confusing. Isn't what you
> really need to inject the appropriate warnings in the media
> plane.
> 
> -Ekr
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> 
> _______________________________________________
> Sipping mailing list  https://www.ietf.org/mailman/listinfo/sipping
> This list is for NEW development of the application of SIP
> Use sip-implementors@xxxxxxxxxxxxxxx for questions on current sip
> Use sip@xxxxxxxx for new developments of core SIP

_______________________________________________
Sipping mailing list  https://www.ietf.org/mailman/listinfo/sipping
This list is for NEW development of the application of SIP
Use sip-implementors@xxxxxxxxxxxxxxx for questions on current sip
Use sip@xxxxxxxx for new developments of core SIP

[Index of Archives]     [IETF Announce]     [IETF Discussion]     [Linux SCSI]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [XFree86]     [Big List of Linux Books]

  Powered by Linux