> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Dean
Willis
> Sent: Wednesday, July 23, 2008 1:26 AM
> To: SIP IETF
> Cc: Cullen Jennings
> Subject: [Sip] WGLC on DTLS Framework draft-ietf-sip-dtls-srtp-framework-02
>
>
> I'm happy to announce a Working Group Last Call on the 
> standards-track DTLS Framework document:
> 
>
http://www.ietf.org/internet-drafts/draft-ietf-sip-dtls-srtp-framework-02.txt
>
> I'd like to conclude this WGLC by Friday, August 8, 2008.
>
> Please review the document and send any comments to the list and  
> author Eric Rescorla.

I'm happy to see this finally WGLC'd, too!



Overall:

The framework document needs to require endpoints send and
receive ietf-mmusic-sdp-capability-negotiation.  Without support
for that draft, many of the media security requirements cannot be 
met (as mentioned in A.1 of draft-ietf-sip-dtls-srtp-framework-02).
ietf-mmusic-sdp-capability-negotiation should be promoted
to a normative requirement, and should be required (MUST) for 
endpoints to support in order to adhere to the DTLS-SRTP framework.  
Otherwise, we are hosed for forking and hosed for retargeting.




Section 1, Introduction:

   However, even hop-by-hop security such as provided by SIPS provides
   some protection against modification by attackers who are not on the
   signalling path.

With or without SIPS, if the attacker is off the signalling path, the
attacker has little hope of doing much damage -- they need to 
guess a lot of SDP values and guess a bunch of SIP values (call-id)
in order to be successful.

So, I would replace the last phrase with:

"... who are not in control of on-path signaling elements."

resulting in:

   However, even hop-by-hop security such as provided by SIPS provides
   some protection against modification by attackers who are not in 
   control of on-path signaling elements."
 

Section 5, Exchanging Certificates:

(the text exceeds the section title when it goes beyond just what 
happens with certificate exchange; perhaps consider re-titling).

My slightly more substantive comment is:

  The answerer SHOULD use the setup     attribute value of 
  setup:active and will send the client_hello in the media path."
                   ^^^^
                   MUST



Section 6.6, "ICE Interaction":

   ...
   If ICE is not being used, then there is potential for a bad
   interaction with SBCs via "latching", as described in
   [I-D.ietf-mmusic-media-path-middleboxes].  In order to avoid this
   issue, if ICE is not being used and the DTLS handshake has not
   completed, upon receiving the other side's then the passive side MUST
                                             ^
                                            SDP

   do a single unauthenticated STUN [I-D.ietf-behave-rfc3489bis]
   connectivity check in order to open up the appropriate pinhole. 


Requirements to do something when ICE is *not* being used should not be in a
section titled "ICE Interaction".  I would move this paragraph describing how
to handle SBC 'latching' to its own section perhaps titled "SBC Interaction".


Section 8.6,

   o When phone number URIs (e.g., 
     'sip:[EMAIL PROTECTED]') are used, 

I believe the current consensus is that a phone number would include
;user=phone, so the example should be
sip:[EMAIL PROTECTED];user=phone



Section 8.6, "Limits of Identity Assertions"

(This section is well written.)


   Implementors should therefore take care not to indicate
   misleading peer identity information in the user interface. e.g.  If
                                                             ^^^^^^
                                               formatting error around here
   the peer's identity is sip:[EMAIL PROTECTED], it is
   not sufficient to display that the identity of the peer as
   +17005551008, unless there is some policy that states that the domain
   "chicago.example.com" is trusted to assert E.164 numbers. 

chicago.example.com only needs to be trusted to assert numbers you trust
it to assert -- not a blanked "to assert E.164 numbers".  For example,
I might trust, and expect, Verizon to claim E.164s that it owns, but
I do not trust, nor expect, Verizon to claim an E.164 with a +353
country code.

I would revise the above to end with something like:

   ... unless there is some policy that states that the domain
   "chicago.example.com" is trusted to assert the E.164 number
   is it asserting.
   ^^^^^^^^^^^^^^^


later,

   Otherwise, the recipient cannot rely on the RFC 4474 Identity
   assertion and the UA MUST not indicate to the user that a secure call
                        ^^^^^^^^
                        MUST NOT
   has been established to the claimed identity.  Implementations which
   are configured to only establish secure calls SHOULD terminate the
   call in this case.




Section A.3:  


add a reference to draft-ietf-avt-dtls-srtp-03.txt
which describes how session resumption is supposed to be
implemented.



Section A.12., "3rd Party Certificates (R-CERTS, R-EXISTING)"

   Third party certificates are not required.  However, if the parties
   share an authentication infrastructure that is compatible with TLS
   (3rd party certificates or shared keys) it can be used.


RFC4474 is part of the framework for securing DTLS-SRTP, and
as you know there is a lot of consternation around this point.
Citing section 13.4 of RFC4474 would be helpful, because section
A.12 of sip-dtls-srtp-framework relies on the following small 
sentence in Section 13.4 of RFC4474:

   It
   is strongly RECOMMENDED that self-signed domain certificates should
   not be trusted by verifiers, unless some previous key exchange has
                                ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
   justified such trust.
   ^^^^^^^^^^^^^^^^^^^^


Section A.15, Denial of Service Vulnerability (R-DOS)

Please add a reference to Section 4.2.1 of RFC4347.



Section A.18., "Downgrading Protection (R-DOWNGRADE)"

   DTLS provides protection against downgrading attacks since the
   selection of the offered ciphersuites is confirmed in a later stage
   of the handshake.  This protection is efficient unless an adversary
   is able to break a ciphersuite in real-time.

This should also mention integrity protection of signaling is 
necessary in order to prevent downgrade to RTP (because I believe
we need to require sdp-capability-negotiation for all of this to
work correctly.)

-d




_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to