$Id: draft-ietf-msec-mikey-applicability-07-rev.txt,v 1.3 2008/02/12
12:53:27 ekr Exp $
OVERVIEW
MIKEY [RFC3830] is a key exchange protocol intended for use with SIP
and SRTP. Like many such protocols, it's really a framework and it's
accumulated a baffling array of methods/modes over the years (e.g.,
DH, RSA, RSA-R, shared key, etc...) This document provides an overview
level description of the various modes and the scenarios in which they
are usable.
GENERAL COMMENTS
This document needs significant revision before it is ready for
publication.
- Given that this is an applicability document, it really needs
some summary tables of what is applicable when. I have provided
mine in this review.
- It's a little hard to understand how this document is supposed
to be used. One gets the impression that it's supposed to be
self-contained, but it's pretty hard to understand the
ladder diagrams and descriptions of the modes without reference
to 3830. If this document is intended to be self-contained,
then a higher level of abstraction and more introduction is needed.
- A lot of the assessments made here seem more like opinions and
qualitative judgements than facts. For instance:
The two MIKEY modes, which only
require one message to be transported (Section 3.1 and Section 3.2),
work nicely in early media situations, as both, sender and receiver
This is semi-editorial, but I would stick to factual assertions.
- The document needs a thorough review for writing quality and
a copy-edit. I found numerous editorial errors.
- All of S 3 would benefit by breaking out the advantages and
disadvantages into some kind of list, rather than just
having a freeform paragraph.
SPECIFIC COMMENTS
S 2.
This terminology dump is really hard to map to the rest of the
text. It's fine to have a glossary, but you also need to
introduce the terms in context in the main text (see general
comments above).
S 3.
The focus of the following subsections lies on the key distribution
methods as well as the discussion about advantages and disadvantages
of the different schemes. Note that the MIKEY key distribution
schemes rely on loosely synchronized clocks. A secure network clock
synchronization protocol should realize this. RFC3830 recommends the
ISO time synchronization protocol [ISO_sec_time]. The format applied
to the timestamps submitted in the MIKEY have to match the NTP format
described in [RFC1305]. In other cases, such as of a SIP endpoint,
clock synchronization by deriving time from a trusted outbound proxy
may be appropriate.
What happens if the clocks aren't synchronized
o Provision of Perfect Forward Secrecy (PFS): Describes the support
of PFS, which is, according to RFC4949 [RFC4949] the the property
s/the the/the/
o Key generation involvement: Describes if both or just one of the
participants are actively involved in key generation. The option
to involve both parties in the key generation is interesting to
avoid that one communication partner generates (intentionally or
unintentionally) weak keys.
The situation is rather more complicated than this. There are three
properties that you at least potentially want to be able to
ensure:
1. That each side can guarantee that keys are fresh (thus preventing
replay attack).
2. That a problem in either side's PRNG doesn't result in compromise
of the protocol.
3. That neither side can force the generation of weak keys or keys
from some restricted subspace.
The first property can be assured simply by both sides contributing
public entropy.
The second property can only be assured by requiring attack on key
pairs generated from *both* sides in order to recover the traffic
keys. Note that DH does not provide this property, since only one
key pair need be attacked. The classic argument here is that *static*
DH provides more protection here because the sides can use a single
good PRNG to generate their DH shares and then can have weak PRNGs.
But AFAICT, MIKEY doesn't use static DH, but rather ephemeral DH,
ewhere this argument does not apply.
The third property is basically impossible to achieve with RSA and
difficult even with DH. Since a malicious peer can basically provide
their keys to some third party via a side channel, this isn't very
interesting anyway.
So, this paragraph needs a total rewrite to more clearly indicate
what you're trying to achieve.
If MIKEY is used for SRTP [RFC3711] bootstrapping, it also uses the
SSRC to associate security policies with actual sessions. The SSRC
identifies the synchronization source. The value is chosen randomly,
with the intent that no two synchronization sources within the same
SRTP session will have the same SSRC. Although the probability of
multiple sources choosing the same identifier is low, all (S)RTP
implementations must be prepared to detect and resolve collisions.
Nevertheless in multimedia communication scenarios supporting forking
(see Section 5.2), collisions may occur leading to so-called two-time
pads, i.e., the same key is used for media streams to different
destinations. Note that two time pads may also occur for media
You need to elaborate on this more. If two-time pads are actually a
possibility with MIKEY, that's a really serious flaw,
since TTP leads to almost complete compromise of the plaintext.
Worse yet, GCM is known to be very brittle in the face of
any keying material reuse.
S 3.2.
Is there some plausible, scalable, mechanism whereby the initiator
would get the responder's public key?
S 3.3.
dependent on the certificate used. Besides the use of X.509v3
certificates it is mandatory to support the Diffie-Hellmann group
"OAKLEY5" [RFC2412].
This requires some more elaboration. What if you want to use
another DH group?
The advantages of this approach are a fair,
mutual key agreement (both parties provide to the key),
perfect forward secrecy, and the absence of the need to fetch a certificate
in advance as needed for the MIKEY-RSA method depicted above.
See above comments about key generation involvement. Also, PFS
is only provided if you require that both sides generate fresh
keys for each exchange. Is that required in MIKEY?
S 3.5.
standards. Moreover, this scheme has a sound performance and reduced
bandwidth requirements and provides a simple and straightforward
master key provisioning. Lack of support for group keying is a
disadvantage.
This all looks suspiciously like opinion. Sound performance and reduced
bandwidth requirements as compared to what? Simple and straightforward
compared to what? I mean, this requires manually established keys, right?
S 3.6.
I'm not sure why SAML is being discussed here, if there aren't
any drafts. Given its status, if it is to be discussed, maybe in
S 4, where you discuss the work in progress.
S 3.7.
key delivery scheme. Note that the Initiator can contribute to the
key material since the key is derived from through CSB-ID and RAND
payloads in unicast use cases.
So, this is a good example of confusion about contributing to the
key material, since this is public entropy, bnot private entropy.
This mode is also useful in multicast
scenarios where multiple clients are contacting a known server and
are downloading the key. Responder workload is significantly reduced
in these scenarios compared to MIKEY in public key mode. This is due
to the fact that the asymmetric encryption requires less effort
compared to the decryption using the private key.
Well, it's reduced by a factor of about two, right? OTOH, responder
workload is increased by the same factor.
S 4.1.
This isn't really a comment on this document, but what's the
rationale for adding ECIES and ECMQV?
S 5.
While MIKEY and its extensions provide plenty of choice in terms of
modes of operation an implementation may choose to simplify its
behavior.
Plenty? That seems like opinion again. There are certainly a lot of
modes, but plenty is a question of whether some set of them
meet the requirements for which they are designed.
Responder in public key mode. If envelope keys are cached it can
then also choose to do re-keying in shared key mode. In general,
How would you know if envelope keys were cached?
communication takes place. An implementation that does not support
shared key mode can mimic behavior of a peer that does but lacks the
shared key. Similarly, if a peer chooses not to operate in the
public key mode it may reject the certificate of the Initiator. The
same applies to peers that choose to operate in one of the DH modes
exclusively.
I don't understand what this graf is trying to say.
Forward MIKEY modes, were the initiator provides the key material,
like public key or shared key mode when used in SIP/SDP may lead to
complications in some calls scenarios, for example forking scenarios
were key derivation material gets distributed to multiple parties.
s/were/where/*2
may cause the initiator to drop the session invitation. Even in the
case all parties involved have all the prerequisites for interpreting
the MIKEY message received there is a possible problem with multiple
responders starting media sessions using the same key. While the
SSRCs will be different in most of the cases they are only sixteen
bits long and there is a high probability of a two-time pad problem.
So, this means that these modes are useless in any case where there
might be forking, right?
4. If the Initiator does not expect the receiver to have his
certificate he may use RSA-R. Using RSA-R he can provide the
initiators certificate information in-band to the receiver.
Moreover, the initiator may also provide a random number which
can be used by the receiver for key generation. Thus both
parties can be involved in the key management. But as the
inclusion of the random number cannot be forced by the initiator,
true PFS cannot be provided. Note that in this mode, after
establishing the TGK, it may be used as PSK with other MIKEY
modes.
The reason that PFS can't be provided here is not that the inclusion
of the random number can't be forced by the initiator, but rather
that the initiator's static RSA key is used.
6. If no PSK or certificate is available at the initiators side (and
likewise at the receivers side) but lower level security (like
TLS ot IPSec) is in place the user may use the unprotected mode
of MIKEY.
You need to explain that this is unsafe in any case where there is an
untrusted proxy.
The end of this section needs some charts of which modes provide
which properties and can be used in which settings. This should
look something like this:
Early Secure Retargeting Redirect Shared
Media Forking Key Conf
------------------------------------------------------------------------
PSK (3.1) Yes Yes *
RSA (3.2) Yes Yes *
DH-SIGN (3.3) Yes* Yes Yes
Unprotected (3.4) Yes
DH-MAC (3.5)
RSA-R (3.7) Yes Yes Yes Yes *
* = with problems
DH-SIGN with forking + early media has perf issues as
described in S 5.2, as well as group negotiation issues
as called out in my review.
The conferencing modes only work properly with one orientation
of requester/responder.
Manual Needs PFS KGI
Keys PKI
----------------------------------------------------
PSK (3.1) Yes No No No
RSA (3.2) No Yes No No
DH-SIGN (3.3) No Yes Yes Yes
Unprotected (3.4) No No No No
DH-MAC (3.5) Yes No Yes Yes
RSA-R (3.7) No Yes No No
KGI == Key generation involvement
It looks to me like (and I recall from previous discussions) that
there is no mode that can be guaranteed to work. That needs to get
called out explicitly.
S 5.1.
To cope with the early media problem there are further approaches to
describe security preconditions [RFC5027], i.e., certain
preconditions need to be met to enable voice data encryption. One
example is for instance that a scenario where a provisional response,
containing the required MIKEY parameter, is sent before encrypted
media is processed.
This doesn't cope with the early media problem, it just means that
you get no voice instead of voice you can't decrypt. This also
interacts badly with forking (cf. HERFP).
S 5.2.
MIKEY data. For asymmetric MIKEY modes, if the sender is aware of
the forking he may not know in advance to which location the INVITE
is forked and thus may not use the right receiver certificate to
encrypt the MIKEY envelope key. Note, the sender may include several
In what settings would the sender be aware of forking? How does this
work with calls to people you've never claled before? I don't see
how either of these modes actually works right.
Moreover, depending on the MIKEY mode chosen, a two-time pad may
occur in dependence of the negotiated key material and the SSRC. For
the non Diffie-Hellman modes other than RSA-R, a two-time pad may
occur when multiple receivers pick the same SSRC.
Again, so this is really bad, right?
S 7.
was voted in favor of DTLS-SRTP. Thus, the reader is pointed to the
appropriate resources for further information. Note that MIKEY has
already been deployed and is also targeted for use in 3GPP and MBMS
applications.
As I understand it, 3GPP intends to use DTLS-SRTP when it's finished,
so you might consider rephrasing this sentence so it doesn't quite
so much give the impression that they will be using MIKEY and
not DTLS-SRTP.
-Ekr
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
http://www.ietf.org/mailman/listinfo/ietf