One document matched: draft-wing-media-security-requirements-00.txt
Network Working Group D. Wing
Internet-Draft Cisco
Intended status: Informational S. Fries
Expires: April 19, 2007 Siemens AG
H. Tschofenig
Siemens Networks GmbH & Co KG
October 16, 2006
Media Security Requirements
draft-wing-media-security-requirements-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on April 19, 2007.
Copyright Notice
Copyright (C) The Internet Society (2006).
Wing, et al. Expires April 19, 2007 [Page 1]
Internet-Draft Media Security Requirements October 2006
Abstract
A number of proposals have been published to address the need of
securing media traffic. Different assumptions, requirements, and
usage environments justify every one of them. This document aims to
summarize the discussed media security requirements in order progress
the work on identifying a small subset applicable to a large range of
deployment environments.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Discussion of Call Scenarios . . . . . . . . . . . . . . . . . 5
3.1. Clipping Media before answer . . . . . . . . . . . . . . . 5
3.2. Retargeting and Forking . . . . . . . . . . . . . . . . . 5
3.3. Shared Key Conferencing . . . . . . . . . . . . . . . . . 8
4. Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 10
5. Out-of-Scope and Discussion Items . . . . . . . . . . . . . . 11
6. Clustering Requirements according to Environments . . . . . . 12
7. Security Considerations . . . . . . . . . . . . . . . . . . . 13
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
9. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 15
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 16
10.1. Normative References . . . . . . . . . . . . . . . . . . . 16
10.2. Informative References . . . . . . . . . . . . . . . . . . 16
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 18
Intellectual Property and Copyright Statements . . . . . . . . . . 19
Wing, et al. Expires April 19, 2007 [Page 2]
Internet-Draft Media Security Requirements October 2006
1. Introduction
The work on media security started a long time ago where the
capability of the Session Initiation Protocol (SIP) was still at its
infancy. With the larger deployment and the available SIP extensions
and related protocols the need for end-to-end security was re-
evaluated. The procedure of re-evaluating prior protocol work and
design decisions is not an uncommon behavior and, to some extend,
considered necessary protocol work to ensure that the developed
protocols indeed meet the previously envisioned needs in the global
Internet.
This document aims to summarize the discussed media security
requirements. Once a the list of requirements and architectural
aspects have been investigated the work on the protocol proposals can
be progressed by identifying a small number of soltuions and to
complete the protocol work.
This document is organized as follows. Section 2 introduces
terminology, Section 3 provides an overview about possible call
scenarios, Section 4 lists requirements, Section 6 will provide a
clustering of requirements to certain deployment environments to
adress the problem that there might not be a single solution with
universal applicability and Section 5 provides out-of-scope items and
aspects for further discussion. The document concludes with a
security considerations Section 7, IANA considerations Section 8 and
an acknowledgement section in Section 9.
Wing, et al. Expires April 19, 2007 [Page 3]
Internet-Draft Media Security Requirements October 2006
2. Terminology
The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
Wing, et al. Expires April 19, 2007 [Page 4]
Internet-Draft Media Security Requirements October 2006
3. Discussion of Call Scenarios
The following subsections describe call scenarios, which have been
discussed elaborately. These call scenarios pose the most challenge
to the key management for media data in cooperation with SIP
signaling. The scenarios have already been described as part of the
key management evaluation draft [I-D.wing-rtpsec-keying-eval], and
are stated here to give a better insight in these discussion.
3.1. Clipping Media before answer
Per the SDP Offer/Answer Model [RFC3264],
"Once the offerer has sent the offer, it MUST be prepared to
receive media for any recvonly streams described by that offer.
It MUST be prepared to send and receive media for any sendrecv
streams in the offer, and send media for any sendonly streams in
the offer (of course, it cannot actually send until the peer
provides an answer with the needed address and port information)."
To meet this requirement with SRTP, the offerer needs to know the
SRTP key for arriving media. If encrypted SRTP media arrives before
the associated SRTP key, the offerer cannot play the media -- causing
clipping.
For key exchange mechanisms which send the answerer's key in SDP, a
SIP provisional response [RFC3261] such as 183 (session progress) is
useful. However the 183 messages aren't reliable unless both the
calling and called endpoint support PRACK [RFC3262], use TCP across
all SIP proxies, implement Security Preconditions
[I-D.ietf-mmusic-securityprecondition], or the both ends implement
ICE [I-D.ietf-mmusic-ice] and the answerer implements the reliable
provisional response mechanism described in ICE. However, there is
not wide deployment of any of these techniques and there is industry
reluctance to requiring these techniques as solutions to avoid the
problem described in this section.
Furthermore, the problem gets compounded when forking is used. For
example, if using a Diffie-Hellman keying technique with security
preconditions that forks to 20 endpoints, the call initiator would
get 20 provisional responses containing 20 signed Diffie-Hellman half
keys. Calculating 20 DH secrets and validating signatures can be a
difficult task depending on the device capabilities.
3.2. Retargeting and Forking
In SIP, a request sent to a specific AOR but delivered to a different
AOR is called a "retarget". A typical scenario is a "call
Wing, et al. Expires April 19, 2007 [Page 5]
Internet-Draft Media Security Requirements October 2006
forwarding" feature. In the figure below, Alice sends an Invite in
step 1 which is sent to Bob in step 2. Bob responds with a redirect
(SIP response code 3xx) pointing to Carol in step 3. This redirect
typically does not propagate back to Alice but only goes to a proxy
(i.e., the retargeting proxy) which sends the original Invite to
Carol in step 4.
+-----+
|Alice|
+--+--+
|
| Invite (1)
V
+----+----+
| proxy |
++-+-----++
| ^ |
Invite (2) | | | Invite (4)
& redirect (3) | | |
V | V
++-++ ++----+
|Bob| |Carol|
+---+ +-----+
Figure 1: Retargeting
Successful use of SRTP requires strongly identifying both calling
party and the called party. The mechanism used by SIP for
identifying the calling party is SIP Identity [RFC3261]. However,
due to SIP retargeting issues [I-D.peterson-sipping-retarget], SIP
Identity can only identify the calling party (that is, the party that
initiated the SIP request). Some key exchange mechanisms predate SIP
Identity and include their own identity mechanism. However, those
built-in identity mechanism suffer from the same SIP retargeting
problem described in the above draft. Going forward, it is
anticipated that Connected Identity [I-D.ietf-sip-connected-identity]
may allow identifying the called party. This is also described as
the 'retargeting identity' problem.
In SIP, 'forking' is the delivery of a request to multiple locations.
This happens when a single AOR is registered more than once. An
example of forking is when a user has a desk phone, PC client, and
mobile handset all registered with the same AOR.
Wing, et al. Expires April 19, 2007 [Page 6]
Internet-Draft Media Security Requirements October 2006
+-----+
|Alice|
+--+--+
|
| Invite
V
+-----+-----+
| proxy |
++---------++
| |
Invite | | Invite
V V
+--+--+ +--+--+
|Bob-1| |Bob-2|
+-----+ +-----+
Figure 2: Forking
With forking, both Bob-1 and Bob-2 might send back SDP answers in SIP
responses. Alice will see those intermediate (18x) and final (200)
responses. It is useful for Alice to be able to associate the SIP
response with the incoming media stream. Although this association
can be done with ICE [I-D.ietf-mmusic-ice], and ICE is useful to make
this association with RTP, it isn't desirable to require ICE to
accomplish this association. The table below analyzes if it is
possible for an offerer to associate the media stream with each SDP
answer, without using ICE.
Forking and retargeting are often used together. For example, a boss
and secretary might have both phones ring and rollover to voice mail
if neither phone is answered.
To maintain media security, only the endpoint that answers the call
should know the SRTP keys for the session. For key exchange
mechanisms that don't provide secure forking or secure retargeting,
one workaround is to rekey immediately after forking or retargeting.
However, because the originator may not be aware that the call forked
this mechanism requires rekeying immediately after every session is
established which causes additional signaling messages.
Retargeting securely introduces a more significant problem. With
retargeting, the actual recipient of the request is not the original
recipient. This means that if the offerer encrypted material (such
as the session key or the SDP) using the original recipient's public
key, the actual recipient will not be able to decrypt that material
because the recipient won't have the original recipient's private
key. In some cases, this is the intended behavior, i.e., you wanted
to establish a secure connection with a specific individual. In
Wing, et al. Expires April 19, 2007 [Page 7]
Internet-Draft Media Security Requirements October 2006
other cases, it is not intended behavior (you want all voice media to
be encrypted, regardless of who answers).
For some forms of key management the calling party needs to know in
advance the certificate or shared secret of the called party, and
retargeting can interfere with this.
Further compounding this problem is a particularity of SIP that when
forking is used, there is always only one final error response
delivered to the sender of the request: the forking proxy is
responsible for choosing which final response to choose in the event
where forking results in multiple final error responses being
received by the forking proxy. This means that if a request is
rejected, say with information that the keying information was
rejected and providing the far end-end's credentials, it is very
possible that the rejection will never reach the sender. This
problem, called the Heterogeneous Error Response Forking Problem
(HERFP) [draft-mahy-sipping-herfp-fix] is a complicated problem to
solve in SIP.
3.3. Shared Key Conferencing
For efficient scaling, large audio and video conference bridges
operate most efficiently by encrypting the current speaker once and
distributing that stream to the conference attendees. Typically,
inactive participants receive the same streams -- they hear (or see)
the active speaker(s), and the active speakers receive distinct
streams that don't include themselves. In order to maintain
confidentiality of such conferences where listeners share a common
key, all listeners must rekeyed when a listener joins or leaves a
conference.
An important use case for mixers/translators is a conference bridge:
+----+
A --- 1 --->| |
<-- 2 ----| M |
| I |
B --- 3 --->| X |
<-- 4 ----| E |
| R |
C --- 5 --->| |
<-- 6 ----| |
+----+
Figure 3: Centralized Keying
In the figure above, 1, 3, and 5 are RTP media contributions from
Wing, et al. Expires April 19, 2007 [Page 8]
Internet-Draft Media Security Requirements October 2006
Alice, Bob, and Carol, and 2, 4, and 6 are the RTP flows to those
devices carrying the 'mixed' media.
Several scenarios are possible:
a. Multiple inbound sessions: 1, 3, and 5 are distinct RTP sessions,
b. Multiple outbound sessions: 2, 4, and 6 are distinct RTP
sessions,
c. Single inbound session: 1, 3, and 5 are just different sources
within the same RTP session,
d. Single outbound session: 2, 4, and 6 are different flows of the
same (multi-unicast) RTP session
If there are multiple inbound sessions and multiple outbound sessions
(scenarios a and b), then every keying mechanism behaves as if the
mixer were an endpoint and can set up a point-to-point secure session
between the participant and the mixer. This is the simplest
situation, but is computationally wasteful, since SRTP processing has
to be done independently for each participant. The use of multiple
inbound sessions (scenario a) doesn't waste computational resources,
though it does consume additional cryptographic context on the mixer
for each participant and has the advantage of non-repudiation of the
originator of the incoming stream.
To support a single outbound session (scenario d), the mixer has to
dictate its encryption key to the participants. Some keying
mechanisms allow the transmitter to determine its own key, and others
allow the offerer to determine the key for the offerer and answerer.
Depending on how the call is established, the offerer might be a
participant (such as a participant dialing into a conference bridge)
or the offerer might be the mixer (such as a conference bridge
calling a participant). The use of offerless Invites may help some
keying mechanisms reverse the role of offerer/answerer. A
difficulty, however, is knowing a priori if the role should be
reversed for a particular call.
Wing, et al. Expires April 19, 2007 [Page 9]
Internet-Draft Media Security Requirements October 2006
4. Requirements
R1: Forking and retargeting MUST work with all end-points being
SRTP.
R2: Forking and retargeting MUST allow establishing SRTP or RTP with
a mixture of SRTP- and RTP-capable targets.
R3: With forking, only the entity to which the call is finally
established, MUST get hold of the media encryption keys.
R5: A solution SHOULD avoid clipping media before SDP answer without
additional signalling.
R6: A solution MUST provide protection against passive attacks.
R7: A solution MUST be able to support Perfect Forward Secrecy.
R8: A solution MUST support algorithm negotiation without incurring
per-algorithm computational expense.
R9: A solution MUST support multiple cipher suites without
additional computational expense.
R10: Endpoint identification when forking. The Offerer must be able
to associate answer with the appropriate flow endpoint. In case
of forking one might not want to perform a DH with every party but
instead to associate the SDP response with the right end point.
This is a performance related requirement.
R11: A solution MUST NOT require 3rd-party certs. If two parties
share an auth infrastructure they should be able to use it.
Wing, et al. Expires April 19, 2007 [Page 10]
Internet-Draft Media Security Requirements October 2006
5. Out-of-Scope and Discussion Items
The following aspects have been voted out-of-scope:
o Shared-key encryption for conferencing (Note: it may be matter of
discussion, if shared key conferencing stays as out-of-scope.)
The following items are subject for further study:
o A solution SHOULD allow to start with RTP and then upgrade to
SRTP.
o A solution SHOULD consider active attacks.
o From an architectural point of view solutions can exchange key
exchange messages along the media path, along the signaling path
or on both paths. A solution SHOULD operate along the media path
and the signaling path.
o A solution SHOULD support the possibility to protect non-RTP-based
data traffic.
o A solution MUST protect cipher suite negotiation against
downgrading attacks.
o A solution MUST allow a SIP UE to negotiate media security
parameters for each individual session.
The following two requirements are typically raised by other SDOs and
might be relevant in this context:
o A solution SHOULD support media recording.
o A solution SHOULD NOT allow end users to determine whether their
end-to-end interaction is subject to lawful interception.
Wing, et al. Expires April 19, 2007 [Page 11]
Internet-Draft Media Security Requirements October 2006
6. Clustering Requirements according to Environments
It is not possible to fulfill all requirements presented in Section 4
to be useful in all environments. This section aims to describe the
usage environments and to cluster solutions with respect to these
environments to distil a small set of solutions fulfilling these
requirements.
[Editor's Note: Text will be provided in a future version of this
document.]
Wing, et al. Expires April 19, 2007 [Page 12]
Internet-Draft Media Security Requirements October 2006
7. Security Considerations
This document lists requirements for securing media traffic. As
such, it addresses security throughout the document.
Wing, et al. Expires April 19, 2007 [Page 13]
Internet-Draft Media Security Requirements October 2006
8. IANA Considerations
This document does not require actions by IANA.
Wing, et al. Expires April 19, 2007 [Page 14]
Internet-Draft Media Security Requirements October 2006
9. Acknowledgements
The authors would like to thank the active participants of the RTPSEC
BOF and Wolfgang Buecker, Guenther Horn, Peter Howard, Hans-Heinrich
Grusdt, Srinath Thiruvengadam and Martin Euchner for their feedback
to this document.Especially thank to Francois Audet for the work on
the key management evaluation.
Wing, et al. Expires April 19, 2007 [Page 15]
Internet-Draft Media Security Requirements October 2006
10. References
10.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
A., Peterson, J., Sparks, R., Handley, M., and E.
Schooler, "SIP: Session Initiation Protocol", RFC 3261,
June 2002.
[RFC3262] Rosenberg, J. and H. Schulzrinne, "Reliability of
Provisional Responses in Session Initiation Protocol
(SIP)", RFC 3262, June 2002.
[RFC3264] Rosenberg, J. and H. Schulzrinne, "An Offer/Answer Model
with Session Description Protocol (SDP)", RFC 3264,
June 2002.
10.2. Informative References
[I-D.ietf-mmusic-ice]
Rosenberg, J., "Interactive Connectivity Establishment
(ICE): A Methodology for Network Address Translator (NAT)
Traversal for Offer/Answer Protocols",
draft-ietf-mmusic-ice-11 (work in progress), October 2006.
[I-D.ietf-mmusic-securityprecondition]
Andreasen, F. and D. Wing, "Security Preconditions for
Session Description Protocol (SDP) Media Streams",
draft-ietf-mmusic-securityprecondition-02 (work in
progress), June 2006.
[I-D.ietf-sip-connected-identity]
Elwell, J., "Connected Identity in the Session Initiation
Protocol (SIP)", draft-ietf-sip-connected-identity-02
(work in progress), October 2006.
[I-D.peterson-sipping-retarget]
Peterson, J., "Retargeting and Security in SIP: A
Framework and Requirements",
draft-peterson-sipping-retarget-00 (work in progress),
February 2005.
[I-D.wing-rtpsec-keying-eval]
Audet, F. and D. Wing, "Evaluation of SRTP Keying with
SIP", draft-wing-rtpsec-keying-eval-01 (work in progress),
Wing, et al. Expires April 19, 2007 [Page 16]
Internet-Draft Media Security Requirements October 2006
June 2006.
Wing, et al. Expires April 19, 2007 [Page 17]
Internet-Draft Media Security Requirements October 2006
Authors' Addresses
Dan Wing
Cisco
170 West Tasman Drive
San Jose, CA 95134
USA
Email: dwing@cisco.com
Steffen Fries
Siemens AG
Otto-Hahn-Ring 6
Munich, Bavaria 81739
Germany
Email: steffen.fries@siemens.com
Hannes Tschofenig
Siemens Networks GmbH & Co KG
Otto-Hahn-Ring 6
Munich, Bavaria 81739
Germany
Email: Hannes.Tschofenig@siemens.com
Wing, et al. Expires April 19, 2007 [Page 18]
Internet-Draft Media Security Requirements October 2006
Full Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgment
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Wing, et al. Expires April 19, 2007 [Page 19]
| PAFTECH AB 2003-2026 | 2026-04-23 10:57:52 |