Justin Karneges wrote:
> On Tuesday 13 January 2009 15:16:23 Peter Saint-Andre wrote:
>> According to my reading of RFC 4568, SDP Security Descriptions MUST NOT
>> be used unless the signalling channel (that's XMPP for us) can "provide
>> strong message authentication and packet-payload encryption, as well as
>> effective replay protection". Because we don't provide those services in
>> XMPP out of the box, I don't think we can securely use a=crypto (or our
>> XMLish flavor of a=crypto as currently described in XEP-0167). But we
>> might be able to use it if we negotiate XTLS (or some other e2e method)
>> first.
> 
> I'm of the opinion that requiring e2e encryption to bootstrap secure oob 
> sessions is perfectly acceptable.  Relatedly, I'm of the opinion that having 
> oob sessions inherit the security properties of XMPP helps avoid confusion.
> 
> With the way XEP-167 is currently written, RTP is just as secure as your text 
> chat.  It's as simple as that.  If both participants use the same server, and 
> use TLS to that server, then RTP is protected within that domain, just as 
> text chats are.  If both participants use e2e encryption to protect the 
> Jingle iq stanzas, then RTP is fully protected end-to-end.

It's just as secure, but I think the layering is wrong. IMHO we want to
pull the security negotiation out of the transport negotiation. At a
high level, this:

<iq>
  <jingle>
    <content>
      <description/>
      <transport/>
      <security/>
    </content>
  </jingle>
</iq>

I'll post more detailed syntax and flows soon.

/psa

Reply via email to