[VOIPSEC] Using SRTP for University project
Christian Stredicke
Christian.Stredicke at snom.de
Mon Mar 27 13:55:37 CST 2006
Well one good reason for using sdes is actually that there might be
other sensitive information like ICE passwords and IP addresses that are
also security-sensitive. The SRTP key is not the only thing that needs
protection!
And using S/MIME is just a consequent answer. There is a need to protect
the whole SDP body, not only parts of it.
CS
> -----Original Message-----
> From: Mark Baugher [mailto:mbaugher at cisco.com]
> Sent: Monday, March 27, 2006 2:16 PM
> To: Hadriel Kaplan
> Cc: 'Cesc Santasusana'; Voipsec at voipsa.org; Christian Stredicke
> Subject: Re: [VOIPSEC] Using SRTP for University project
>
>
> On Mar 27, 2006, at 10:20 AM, Hadriel Kaplan wrote:
>
> >
> >
> >> -----Original Message-----
> >> From: Voipsec-bounces at voipsa.org [mailto:Voipsec-
> bounces at voipsa.org]
> >> On Behalf Of Mark Baugher
> >> Sent: Monday, March 27, 2006 12:16 PM
> >> To: Cesc Santasusana
> >> Cc: Voipsec at voipsa.org; Christian.Stredicke at snom.de
> >> Subject: Re: [VOIPSEC] Using SRTP for University project
> >>
> >> I expect that we are still a long way off from the final key
> >> establishment and key management solutions for IP
> telephony. Whether
> >> or not sdesc is the final answer is far from certain. Regarding
> >> security, those who have read the latest sdescriptions
> draft should
> >> recognize that S/MIME is required for end-to-end security through
> >> intermediate systems, even S/MIME with self-signed
> certificates and a
> >> user-to-user authentication procedure (e.g. reading the
> fingerprint
> >> of the public key over the phone) offers good security.
> Why don't we
> >> use this as the interim solution for those implementations
> that are
> >> using sdesc?
> >
> > S/MIME is only "required" if you don't trust the
> intermediate systems
> > to follow sips rules.
>
> I'm not sure why you say this but it is not based on
> draft-ietf- mmusic-sdescriptions-12.txt. It's true that the
> applicability section recommends either sips or s/mime. But
> I don't find your interpretation in this document. This is
> what the document says on the topic:
>
> "When the communication path of the SDP message is routed
> through intermediate systems that inspect parts of the SDP
> message, security protocols such as IPsec or TLS SHOULD NOT
> be used for encrypting and/or authenticating the security
> description. In the case of intermediate-system processing
> of a message containing SDP security descriptions, the
> "a=crypto" attributes SHOULD be protected end-to- end so that
> the intermediate system can neither modify the security
> description nor access the keying material. Network or
> transport security protocols that terminate at each
> intermediate system, therefore, SHOULD NOT be used for
> protecting SDP security descriptions. A security protocol
> SHOULD allow the security descriptions to be encrypted and
> authenticated end-to-end independently of the portions of the
> SDP message that any intermediate system modifies or
> inspects: MIME secure multiparts are RECOMMENDED for the
> protection of SDP messages that are processed by intermediate
> systems. "
>
> It might be that this is not realistic owing to the changes
> that are required in the infrastructure. Saying this is much
> different than saying that sips offers good security.
>
> > If that's true, you're probably in a world of hurt anyway.
>
> An end system has no way of knowing what devices are handling
> the call message. So you are in fact in a world of hurt if
> you want a secure end-to-end phone call when the message is
> routed through unknown and unknowable intermediate systems.
>
> > And you don't seriously expect people to read out hex
> values over the
> > phone before talking, do you? Somehow I think that will make for a
> > lot more car accidents due to cell phones. :)
>
> You misunderstand the process. One does not do this for each
> phone call or even necessarily for the initial phone call,
> although that's an obviously good time to establish a secure
> association with a user who calls you or whom you are
> calling. As has been pointed out on this list before, the
> procedure is done once, the key is admitted to a key ring or
> something like that, and then subsequent (even future) calls
> can be authenticated end to end.
>
> >
> > (note I'm talking about the 99.9% population, not the DoD)
>
> Most people won't do this, just as most people do not use
> secure email. But we need to have these things for people
> who do want to use it and at least some means to determine if
> a secure call is being spoofed. The good alternatives
> involve third-party or device (e.g.
> sim card) infrastructure such as SIP Identity. In the absence
> of such infrastructure, it is a poor security solution in
> which a user cannot even tell if their call security has been
> subverted.
> >
> >> I have heard from a few persons that S/MIME is not
> deployable, but I
> >> have not yet heard from anyone who has tried to deploy it. I'd be
> >> interested in hearing about those experience.
> >
> > It depends on your application. If you want your sip call to work
> > through most service providers (and my guess is enterprises) today,
> > and in the foreseeable future, then s/mime won't work. So why would
> > you use a mechanism which only works inside your own environment?
>
> SRTP will only work inside an environment in which all the
> phones are changed to use SRTP. Obviously, some parts of the
> environment must be changed. Perhaps your point is that
> there are some parts of the environment that are too hard to
> change. Why not say that?
>
> >
> >> But if you're sending the keys in the clear through
> multiple proxies,
> >> this is not a secure solution. I agree with that.
> >
> > Agreed. Hence SIPS, i.e. TLS, or stronger is mandated.
>
> If you are going to rely on sips for security, then you need
> to explain how one can control or even detect which proxies
> handle the calls, at minimum. I haven't heard such an
> explanation. The reason that we have several new proposals
> for voip key management is because sips alone is not
> considered to be good enough security for establishing secure
> voice calls.
>
> Mark
>
> >
> > -hadriel
>
>
>
More information about the Voipsec
mailing list