Skip to main content

Security Preconditions for Session Description Protocol (SDP) Media Streams
draft-ietf-mmusic-securityprecondition-04

Revision differences

Document history

Date Rev. By Action
2012-08-22
04 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2007-09-07
04 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2007-09-07
04 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2007-09-07
04 (System) IANA Action state changed to In Progress from Waiting on Authors
2007-09-07
04 (System) IANA Action state changed to Waiting on Authors from In Progress
2007-09-07
04 (System) IANA Action state changed to In Progress from Waiting on Authors
2007-08-23
04 (System) IANA Action state changed to Waiting on Authors from In Progress
2007-08-22
04 (System) IANA Action state changed to In Progress
2007-08-21
04 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2007-08-21
04 Amy Vezza IESG state changed to Approved-announcement sent
2007-08-21
04 Amy Vezza IESG has approved the document
2007-08-21
04 Amy Vezza Closed "Approve" ballot
2007-08-21
04 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2007-08-15
04 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2007-07-10
04 (System) Sub state has been changed to AD Follow up from New Id Needed
2007-07-10
04 (System) New version available: draft-ietf-mmusic-securityprecondition-04.txt
2007-04-25
04 Jon Peterson State Change Notice email list have been change to mmusic-chairs@tools.ietf.org from jo@acm.org, csp@csperkins.org
2007-03-02
04 Jon Peterson State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation::AD Followup by Jon Peterson
2006-12-15
04 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2006-12-15
04 (System) Removed from agenda for telechat - 2006-12-14
2006-12-14
04 Russ Housley
[Ballot discuss]
The means to deal with refusals is identified in the security
  considerations as a work in progress (SDPCN).  This seems like an …
[Ballot discuss]
The means to deal with refusals is identified in the security
  considerations as a work in progress (SDPCN).  This seems like an
  important feature.  How can this be reviewed or deployed without
  SDPCN?
2006-12-14
04 Cullen Jennings [Ballot Position Update] New position, No Objection, has been recorded by Cullen Jennings
2006-12-14
04 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2006-12-14
04 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2006-12-13
04 Bill Fenner [Ballot Position Update] New position, No Objection, has been recorded by Bill Fenner
2006-12-13
04 David Kessens [Ballot Position Update] New position, No Objection, has been recorded by David Kessens
2006-12-13
04 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2006-12-13
04 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2006-12-13
04 Magnus Westerlund
[Ballot comment]
Section 2:

"Real-Time Transfer protocol" RTP stands for "real-time transport protocol"

Section 3:

At that moment, we furthermore require that ser agents MUST …
[Ballot comment]
Section 2:

"Real-Time Transfer protocol" RTP stands for "real-time transport protocol"

Section 3:

At that moment, we furthermore require that ser agents MUST start
  using the new session parameters for media packets being sent.

Spelling: ser/user
2006-12-13
04 Magnus Westerlund [Ballot comment]
Section 2:

"Real-Time Transfer protocol" RTP stands for "real-time transport protocol"
2006-12-13
04 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2006-12-12
04 Sam Hartman [Ballot Position Update] New position, No Objection, has been recorded by Sam Hartman
2006-12-12
04 Brian Carpenter
[Ballot comment]
From Gen-ART review by David Black:

In the new security considerations section, I didn't see any mention
  of downgrade attacks (man-in-the-middle removes …
[Ballot comment]
From Gen-ART review by David Black:

In the new security considerations section, I didn't see any mention
  of downgrade attacks (man-in-the-middle removes secure alternative
  from negotiation, causing use of non-secure streams when secure streams
  would have been used in his absence) - this mention is ok to omit, as
  the important point that the offerer's security policy allows non-secure
  streams in this situation has been added.  Similarly, the security
  considerations section doesn't say how to avoid the "malicious malicious
  media stream packets until the answer (indicating the chosen secure
  alternative) is received" vulnerability, but it's reasonably clear from
  context that the only obvious way to avoid it is to not offer the
  non-secure alternative.

  I saw this typo in the new text in Section 3:

    At that moment, we furthermore require that ser agents MUST start
                                                ^^^
2006-12-12
04 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded by Brian Carpenter
2006-12-11
04 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2006-12-11
04 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded by Ted Hardie
2006-12-11
04 Russ Housley
[Ballot discuss]
Security for media streams typically uses SRTP.  The whole purpose of
  this document is to stall media transmission until the necessary keys …
[Ballot discuss]
Security for media streams typically uses SRTP.  The whole purpose of
  this document is to stall media transmission until the necessary keys
  for RTP security are in place, which avoids media clipping.  The
  security precondition ensures that the receiver is "ready" to receive
  "secure" data.  This is not needed with some of the in-band key
  management techniques that are being discussed.  Should we wait to
  advance this document?  If we wait and the RTPsec solution does not
  need this mechanism, we will have reduced complexity.

  The means to deal with refusals is identified in the security
  considerations as a work in progress (SDPCN).  This seems like an
  important feature.  How can this be reviewed or deployed without
  SDPCN?
2006-12-11
04 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2006-12-11
04 Lars Eggert
[Ballot comment]
Idnits finds boilerplate issues.


Section 3, paragraph 1:
>    If the security precondition is used with a non-secure
>    media stream, …
[Ballot comment]
Idnits finds boilerplate issues.


Section 3, paragraph 1:
>    If the security precondition is used with a non-secure
>    media stream, the security precondition is by definition satisfied.

  That sentence just reads oddly. How about "A security
  precondition used with a non-secure media stream has no effect."


Section 3, paragraph 4:
>    Security preconditions do not guarantee that an established media
>    stream will be secure.  They merely guarantee that the recipient of
>    the media stream packets will be able to perform any relevant
>    decryption and integrity checking on those media stream packets.

  The term "security precondition" is really misleading. How about
  something like "stream setup synchronization precondition" or
  "security parameter exchange precondition?"


Section 5, paragraph 4:
>    integrity protection of signaling, e.g., IPSec or TLS.  In all other

  Nit: s/IPSec/IPsec/


Section 9, paragraph 4:
>    [RFC2327] M. Handley and V. Jacobson, "SDP: Session Description
>    Protocol", RFC 2327, April 1998.

  Nit: cited as [SDP] in the text
2006-12-11
04 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2006-12-08
04 Jon Peterson [Ballot Position Update] New position, Yes, has been recorded for Jon Peterson
2006-12-08
04 Jon Peterson Ballot has been issued by Jon Peterson
2006-12-08
04 Jon Peterson Created "Approve" ballot
2006-12-08
04 Jon Peterson State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Jon Peterson
2006-12-08
04 Jon Peterson Placed on agenda for telechat - 2006-12-14 by Jon Peterson
2006-11-08
04 (System) Request for Early review by SECDIR Completed. Reviewer: Patrick Cain.
2006-10-20
04 (System) Sub state has been changed to AD Follow up from New Id Needed
2006-10-20
03 (System) New version available: draft-ietf-mmusic-securityprecondition-03.txt
2006-08-09
04 Jon Peterson State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for Writeup by Jon Peterson
2006-08-09
04 Jon Peterson
Proto Writeup:

    1.a) Have the chairs personally reviewed this version of the ID and
        do they believe this ID …
Proto Writeup:

    1.a) Have the chairs personally reviewed this version of the ID and
        do they believe this ID is sufficiently baked to forward to the
        IESG for publication?

Yes.

    1.b) Has the document had adequate review from both key WG members
        and key non-WG members?  Do you have any concerns about the
        depth or breadth of the reviews that have been performed?

The document has had adequate review; I have no concerns.

    1.c) Do you have concerns that the document needs more review from a
        particular (broader) perspective (e.g., security, operational
        complexity, someone familiar with AAA, etc.)?

No.

    1.d) Do you have any specific concerns/issues with this document 
that
        you believe the ADs and/or IESG should be aware of?  For
        example, perhaps you are uncomfortable with certain parts of 
the
        document, or have concerns whether there really is a need for
        it, etc.  If your issues have been discussed in the WG and the
        WG has indicated it wishes to advance the document anyway, note
        if you continue to have concerns.

I have no concerns.

    1.e) How solid is the WG consensus behind this document?  Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it?

There is solid consensus.

    1.f) Has anyone threatened an appeal or otherwise indicated extreme
        discontent?  If so, please summarise what are they upset about.

No.

    1.g) Have the chairs verified that the document adheres to _all_ of
        the ID nits? (see http://www.ietf.org/ID-Checklist.html).

There are minor nits in the boilerplate text that make idnits-1.82 
complain, but nothing significant.

    1.h) Does the document a) split references into normative/
        informative, and b) are there normative references to IDs, 
where
        the IDs are not also ready for advancement or are otherwise in
        an unclear state? (Note: the RFC editor will not publish an RFC
        with normative references to IDs, it will delay publication
        until all such IDs are also ready for publication as RFCs.)

References have been split. There are no normative references to I-Ds.

        *    Technical Summary

This document defines a new security precondition for the Session 
Description Protocol precondition framework described in RFCs 3312 
and 4032.  A security precondition can be used to delay session 
establishment or modification until media stream security has been 
negotiated successfully.

        *    Working Group Summary

This is a typical application of the SIP/SDP preconditions framework. 
There was no controversy surrounding the work, and it is needed by a 
range of SIP users.

        *    Protocol Quality

The draft appears to be of good quality.
2006-08-02
04 (System) State has been changed to Waiting for Writeup from In Last Call by system
2006-07-19
04 Amy Vezza Last call sent
2006-07-19
04 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2006-07-19
04 Jon Peterson Last Call was requested by Jon Peterson
2006-07-19
04 Jon Peterson State Changes to Last Call Requested from AD Evaluation::AD Followup by Jon Peterson
2006-07-19
04 (System) Ballot writeup text was added
2006-07-19
04 (System) Last call text was added
2006-07-19
04 (System) Ballot approval text was added
2006-06-28
04 (System) Sub state has been changed to AD Follow up from New Id Needed
2006-06-28
02 (System) New version available: draft-ietf-mmusic-securityprecondition-02.txt
2006-02-06
04 Jon Peterson State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Jon Peterson
2006-01-26
04 Jon Peterson State Changes to AD Evaluation from Publication Requested by Jon Peterson
2005-12-07
04 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2005-10-21
01 (System) New version available: draft-ietf-mmusic-securityprecondition-01.txt
2005-02-16
00 (System) New version available: draft-ietf-mmusic-securityprecondition-00.txt