Internet DRAFT - draft-kaplan-best-srtp-keys

draft-kaplan-best-srtp-keys





                                                                        
   Internet Draft                                             H. Kaplan 
   Document: draft-kaplan-best-srtp-keys-00.txt             Acme Packet 
   Expires: January 2007                                      July 2006 
    
    
                  Best-case End-to-end SRTP Technique for 
                 Key Exchange interoperabilitY (BEST-KEY) 
    
    
Status of this Memo 
    
   By submitting this Internet-Draft, each author represents that any 
   applicable patent or other IPR claims of which he or she is aware 
   have been or will be disclosed, and any of which he or she becomes 
   aware will be disclosed, in accordance with Section 6 of BCP 79.  
    
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF), its areas, and its working groups. Note that other 
   groups may also distribute working documents as Internet-Drafts.  
    
   Internet-Drafts are draft documents valid for a maximum of six months 
   and may be updated, replaced, or obsoleted by other documents at any 
   time. It is inappropriate to use Internet-Drafts as reference 
   material or cite them other than as "work in progress".  
    
   The list of current Internet-Drafts can be accessed at 
   http://www.ietf.org/ietf/lid-abstracts.txt.  
    
   The list of Internet-Draft Shadow Directories can be accessed at 
   http://www.ietf.org/shadow.html 
    
    
Copyright Notice 
    
      Copyright (C) The Internet Society (2006). 
    
    
Abstract 
    
   This document defines an opportunistic SRTP key exchange mechanism to 
   get the best-case SRTP keys, using a slightly modified version of 
   Security Descriptions model [secdes], followed by a second-stage 
   media-plane key exchange based on [XXX].  There are several distinct 
   advantages to this mechanism over others; these benefits are 
   documented herein.  The main goal of this draft is to put forth a 
   strawman proposal to perform a 2-stage key-exchange, first via a 
   [secdes] style mechanism, then through a media-plane mechanism. 
    
    
 
 
Kaplan                  Expires - January 2007                [Page 1] 




                   draft-kaplan-best-srtp-keys-00.txt         July 2006 
 
 
Table of Contents 
    
   1.   Introduction................................................2 
   2.   Notational Conventions......................................3 
   3.   Applicability...............................................3 
   4.   Benefits and Drawbacks of BEST-KEY..........................4 
   5.   Changes to Security Descriptions for BEST-KEY...............5 
   6.   Offer/Answer Model for BEST-KEY: Stage 1....................5 
      6.1 Generating the Initial Offer...............................6 
      6.2 Generating the Initial Answer..............................6 
      6.3 Processing the Initial Answer..............................7 
   7.   Media-Plane Key Update for BEST-KEY – Stage 2...............8 
   8.   Formal Syntax...............................................9 
   9.   Security Considerations.....................................9 
      9.1 Security Implications vs. RFC 4568 [secdes]................9 
      9.2 Security Implications vs. Media-plane Mechanisms Alone....10 
   References.......................................................11 
   Author's Address.................................................11 
   Intellectual Property Statement..................................11 
   Disclaimer of Validity...........................................12 
   Copyright Statement..............................................12 
   Acknowledgments..................................................12 
    
    
1. Introduction 
    
   There are currently 11 proposed mechanisms for exchanging and 
   negotiating keys for Secure Real-time Transport Protocol (SRTP) 
   [srtp], none of which interoperate.  Some of these are signaling-
   plane mechanisms, meaning the key exchange mechanism is handled in 
   SDP carried in session signaling messages; other mechanisms are 
   media-plane, meaning the key exchange is performed end-to-end between 
   the originator and terminator of the SRTP streams.  Of the signaling-
   plane mechanisms, the most popular is the RFC 4568 Security 
   Descriptions mechanism [secdes].  Of the media-plane mechanisms, 
   there is no clear leader currently. [Note to editor: change previous 
   sentence to be the one media-plane mechanism chosen by the group]. 
    
   The [secdes] mechanism has several benefits which make it attractive 
   for a particular class of equipment: is incurs very little processing 
   burden per session, and is the least complicated.  But it also has 
   several security weaknesses which make it less secure than other 
   mechanisms.  In general, stronger security typically costs more to 
   implement and is only necessary for a smaller community, while weaker 
   security generally costs less and is sufficient for a larger 
   community; thus this author believes the popularity of the [secdes] 
   model is unavoidable.  Meanwhile, the security drawbacks are equally 
   unpalatable for a significant set of use cases, and thus media-plane 
   end-to-end mechanisms are more desirable.  It also has the 
 
 
Kaplan                  Expires - January 2007                [Page 2] 




                   draft-kaplan-best-srtp-keys-00.txt         July 2006 
 
 
   unfortunate characteristic that the other end must support [secdes] 
   or else a new offer/answer must be performed. 
    
   Therefore, this document proposes both: sessions begin with Security 
   Descriptions (slightly modified), and after becoming established, 
   attempt a media-plane key exchange mechanism.  If both ends support 
   the media-plane mechanism, then the SRTP keys are updated and the 
   media session ends up with stronger security; if either end only 
   supports Security Descriptions, then the weaker SECDES-based keys are 
   used, which is still better than not performing SRTP at all; if one 
   side only supports RTP, then RTP is used without having to perform a 
   new offer/answer exchange. 
    
   The changes to Security Descriptions outlined in this document are 
   fairly minor, and are defined in order to successfully negotiate 
   multiple mechanisms in one offer/answer exchange, even if the 
   answerer only supports clear/non-secure RTP.  These changes may be 
   better defined in a separate draft, but are done here temporarily to 
   expedite matters (namely, discussion in RTPSEC group).  The main goal 
   of this draft is to put forth a straw-man proposal to perform a 2-
   stage key-exchange, first via a [secdes] style mechanism, then 
   through a media-plane mechanism. 
    
    
2. Notational Conventions 
    
   The key words "MUST", "MUST NOT", "REQUIRED", "SHOULD", "SHOULD NOT", 
   "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be 
   interpreted as described in [RFC2119].  The terminology in this 
   document conforms to [RFC2828], "Internet Security Glossary". 
    
   The term 'media-plane mechanism' is used throughout this document to 
   represent whatever end-to-end key exchange mechanism is chosen as the 
   primary one by the RTPSEC group or RAI area WG.  It is not intended 
   to signify the chosen mechanism will be based on any particular 
   proposed mechanism, nor whether it uses RTP packets, RTCP packets, or 
   some other packets/protocol to perform the key exchange. 
    
   The term 'signaling-plane mechanism' is used in this document to 
   represent SRTP key exchange performed through SDP carried in an 
   application protocol, such as SIP or MGCP.  Such a mechanism follows 
   the signaling path, getting transferred hop-by-hop by signaling 
   intermediaries, such as proxies. 
    
    
3. Applicability 
    
   RFC 4568 [secdes] offers a similar type of key exchange method, since 
   this draft uses it with some minor modification.  In contrast, this 
 
 
Kaplan                  Expires - January 2007                [Page 3] 




                   draft-kaplan-best-srtp-keys-00.txt         July 2006 
 
 
   draft proposes using a [secdes] style key exchange in a backward-
   compatible manner with legacy RTP devices in a first stage, and 
   trying to update the keys with a media-plane mechanism if both ends 
   support it in a second stage.  This mechanism should provide a 
   smoother migration path, broader applicability, and more rapid 
   acceptance than [secdes] or a media-plane mechanism alone. 
    
    
4. Benefits and Drawbacks of BEST-KEY 
    
   The BEST-KEY mechanism provides several valuable benefits over using 
   [secdes] or a media-plane mechanism alone:   
       1. It allows two ends to negotiate the strongest SRTP key 
          possible, without multiple SDP offers/answers. 
       2. It is backwards-compatible, meaning a BEST-KEY offer to a 
          non-BEST-KEY receiver still results in a successful session 
          with media, although one using non-secure RTP. 
       3. It does not rely on signaling-plane security, if both ends 
          support a media-plane mechanism which does not rely on it. 
       4. It supports the largest/broadest set of device performance 
          classes: including devices which cannot afford the resource 
          penalty of per-call media-plane key exchange mechanisms, and 
          devices which can.  In other words, it should achieve broad 
          use because it is not limited in applicability. 
       5. It is a fairly trivial change from [secdes], which has 
          already been implemented in some devices.  Therefore it 
          should not be too burdensome to modify the implementations in 
          use.  In fact, a BEST-KEY answerer will interoperate with a 
          legacy [secdes] offerer. (but not vice-versa) 
       6. It is fully compliant with SDP RFC 4566 [sdp], and does not 
          change the ABNF syntax of [secdes]. 
       7. It works for any application protocol which carries SDP and 
          follows the offer/answer mechanism of [RFC3264]. 
       8. It should provide a way to achieve end-to-end SRTP even in 
          mixed application signaling environments, as well as hop-by-
          hop for environments that require that. 
       9. It provides for a migration path from RTP to SRTP based on 
          [secdes] style keys, and to SRTP based on end-to-end keys.  
          It is this author's opinion that a migration path with broad 
          applicability is critical to the success of any mandated IETF 
          SRTP key exchange mechanism.  There are already millions of 
          RTP-capable devices in deployment that will not be replaced 
          overnight on a "flag-day", and must be interoperated with, 
          with as little pain as possible.   
    
   The drawbacks to BEST-KEY are: 
          1. A successful bid-down attack will result in non-secure 
             RTP, if neither end supports a media-plane mechanism.  See 
             the security section 9 for a discussion on this. 
 
 
Kaplan                  Expires - January 2007                [Page 4] 




                   draft-kaplan-best-srtp-keys-00.txt         July 2006 
 
 
          2. For devices which can handle media-plane exchange 
             mechanisms, BEST-KEY adds a bit of overhead/work since it 
             mandates a [secdes] style key exchange as well.  Since 
             such devices are typically not resource-constrained, that 
             should not be an issue. 
          3. It may provide a false sense of security to users if the 
             User Interface is not properly handled.  For example, if 
             there is a single lock-icon which is on regardless of how 
             the keys were exchanged, users will not realize a call 
             which only uses a signaling-plane key is less secure than 
             a media-plane one.  This is debatable, however, as even 
             the media-plane mechanisms are not perfectly secure, and 
             at least BEST-KEY provides a migration path so that 
             there's a reason to create a lock-icon in the UI. 
    
    
5. Changes to Security Descriptions for BEST-KEY 
    
   The ABNF syntax and protocol mechanics described in RFC 4568 SDP 
   Security Descriptions for Media Streams [secdes] are adopted by this 
   draft, with the following exceptions/changes: 
    
       1. The transport type encoded in SDP MUST NOT be the SRTP 
   transport defined in [srtp] of "RTP/SAVP" or "RTP/SAVPF", unless the 
   offerer wishes to *only* allow SRTP answers.  Instead, this draft 
   requires the transport encoding type MUST be the same one used if RTP 
   were not secured (e.g., "RTP/AVP").  If the offerer wishes the offer 
   to fail if the far-end does not support SRTP, then she would continue 
   to use the same transport encoding mandated by [secdes] and [srtp].  
   [Note: that can already be done per [secdes] and does not require 
   this draft at all, does it?]  The purpose of this draft is to provide 
   the best-case with call success, even if that results in non-secure 
   RTP media. 
    
       2. BEST-KEY is defined to interoperate with legacy RTP devices, 
   and thus some of the protocol rules are modified, as described later 
   in this document. 
    
       3. Depending on the final media-plane SRTP key mechanism chosen 
   by the RTPSEC BOF or RAI, there may be a need to provide an 
   indication or identifying data (e.g., fingerprint) for the media-
   plane mechanism in SDP.  Such content is expected to be encoded along 
   with the crtypo attributes of [secdes], on separate attribute lines.  
   Since the media-plane mechanism is not chosen yet, those details are 
   not yet known. 
    
    
6. Offer/Answer Model for BEST-KEY: Stage 1 
    
 
 
Kaplan                  Expires - January 2007                [Page 5] 




                   draft-kaplan-best-srtp-keys-00.txt         July 2006 
 
 
   BEST-KEY is based on the offer/answer method as defined by RFC 4568 
   SDP Security Descriptions for Media Streams [secdes], except the use 
   of SAVP or SAVPF transport type encoding in SDP is not typically 
   used, as described above in section 5.  This also changes some of the 
   offer/answer details and RTP processing behavior as described below. 
    
    
6.1 Generating the Initial Offer 
    
   A device supporting this draft offers the same crypto attributes and 
   parameters as [secdes] except using a non-secure transport encoding 
   in SDP, such as "RTP/AVP".  The purpose for this is so that, should 
   the receiver(s) of the offer not support SRTP, the offer will not be 
   rejected.  The offerer can still decide to end the session at any 
   time should it wish to, of course, but if the offerer wanted to 
   mandate use of SRTP they MUST continue to use the [secdes] encoding 
   of SAVP or SAVPF as before.  There is no advantage (or difference) to 
   using this draft over [secdes] in that case. 
    
   Once an offer is generated with one or more crypto attributes using a 
   non-secure transport encoding in SDP, the offerer MUST be ready to 
   receive non-secure RTP if it would have done so had it not offered 
   any crypto attributes.  This is necessary for compatibility with 
   receivers/answerers of the offer that do not support this draft, or 
   do not support SRTP, and simply follows the basic model defined 
   previously in RFC 3264.  
    
    
6.2 Generating the Initial Answer 
    
   As per [secdes], the answerer MUST accept one of the offered crypto 
   attributes it can support, and the first one in the list it can 
   support if there are more than one.  If it cannot support any, 
   however, it MUST accept the offer as if no crypto-attributes had been 
   offered.  In other words, if the answerer's local policy is to only 
   allow SRTP media and not accept non-secure RTP, it may reject the 
   offer.  If the answerer's policy allows non-secure RTP, it can accept 
   the offer as if it had been so. 
    
   If the offer used an SAVP or SAVPF transport encoding in SDP, per 
   [srtp] and [secdes], then it MUST operate as in [secdes] and answer 
   using an SAVP or SAVPF encoding syntax.  Thus an answerer supporting 
   this draft will interoperate with an offerer supporting only legacy 
   [secdes].  The answerer must then generate SRTP as it would have done 
   in [secdes], and may optionally include an MKI in the SRTP per 
   [secdes]. 
    
   If the offer uses a non-secure transport encoding in SDP, but offered 
   crypto attributes which were acceptable and answered, the answerer 
 
 
Kaplan                  Expires - January 2007                [Page 6] 


                   draft-kaplan-best-srtp-keys-00.txt         July 2006 
 
 
   MUST generate SRTP packets using the answered information.  The 
   answerer MUST also include an MKI in the SRTP packets, but MAY stop 
   doing so when it has an indication the offerer has received the 
   answer. For example, receiving an SRTP packet from the offerer 
   implies the offerer has received and processed the answer.  If the 
   answerer does not wish to continue using an MKI for the duration of 
   the session, it MAY choose not to encode the MKI and length in the 
   SDP attribute.  In such a case, it MUST use an MKI value of 1 and 
   length of 4 in the SRTP packets if it adds them.  The reason for 
   doing this is described in the next section. 
    
    
6.3 Processing the Initial Answer 
    
   As per [secdes], the answer is checked for matching crypto attributes 
   and key information.  If no crypto attribute lines are found in the 
   answer, however, and the offered transport was a non-secure type 
   (i.e., not SAVP) then the negotiation MUST NOT be considered to have 
   failed.  Instead, non-secure RTP is used as if the offer had not 
   included any crypto attributes to begin with.   
    
   If a crypto attribute line is found in the answer, but does not have 
   a matching tag, included key, or contain all of the mandatory 
   negotiated session parameters, then the negotiation MUST fail.  This 
   would represent a protocol failure. 
    
   If a crypto attribute line is found in the answer, with a matching 
   tag, valid key, and contains all the necessary negotiated session 
   parameters, then the offerer MUST stop accepting non-secure RTP media 
   and only accept SRTP using the key and other values in the answer, as 
   described in [secdes].  The offerer would then begin generating SRTP 
   as per [secdes] and [srtp]. 
    
   An interesting property of the above rule is that it allows a call to 
   start with non-secure RTP and "upgrade" to secdes-based SRTP without 
   a second, updated offer being generated by the offerer – only an 
   updated answer need be received.  For example, using SIP, the Invite 
   would offer this draft's SDP encoding, a 183 would contain a non-
   crypto answer in SDP, and the 200 ok would contain a crypto final 
   answer.  Such a case could be useful for rich-ringtone and early-
   announcement services in use today, which probably don't need secure 
   RTP for ringtone. (unless it's a DRM issue :) 
    
   Note: one would think this may cause a short period of no media, and 
   degrade the service, but that is not the case.  If non-secure RTP 
   were actually being sent by the far-end, it means they received the 
   offer and do not actually support SRTP or this draft; otherwise they 
   would be using their key to transmit SRTP.  Since the keys offered in 
   [secdes] are the transmit keys, an offerer cannot truly process 
 
 
Kaplan                  Expires - January 2007                [Page 7] 



                   draft-kaplan-best-srtp-keys-00.txt         July 2006 
 
 
   received SRTP until an answer is received regardless.  Therefore this 
   draft makes the situation no worse than [secdes], while still 
   supporting non-secure early media for cases where the far-end does 
   not support SRTP. 
    
   A problem with accepting non-secure RTP before the answer, or 
   upgrading to SRTP on a second answer, is that the SRTP media will 
   most likely reach the offerer before the SDP answer indicating SRTP 
   is accepted (and what the key is).  Since SRTP packets follow the RTP 
   packet format, such early packets would actually be decoded as RTP 
   and possibly rendered, resulting in illegible audio tones and video 
   display.  This would not have occurred in [secdes] because non-secure 
   RTP would not be accepted at all in that mechanism, and this new 
   behavior is probably not acceptable in general.   
    
   Therefore, per section 6.2, a device supporting BEST-KEY will add the 
   MKI tag to SRTP packets when it is the answerer and the offer did not 
   specify a secure transport.  It is possible, though, that it does not 
   encode the MKI value and length in the answer, if it did not wish to 
   use an MKI for the duration of the session.  In such a case it would 
   use an MKI value 1 and a length of 4, and the offerer MUST recognize 
   such as SRTP packets.  The MKI is thus used as a RTP vs. SRTP 
   differentiator, and a BEST-KEY offerer MUST NOT attempt to render 
   such marked packets as un-encrypted RTP until it has received the 
   decrypt key in the answer and handles it as SRTP. 
   [Note: is this complexity worth it? Forcing MKI may raise the bar too 
   much for easy changes to secdes-based devices.  Maybe we should not 
   support RTP until the answer.] 
    
    
7. Media-Plane Key Update for BEST-KEY – Stage 2 
    
   After negotiating the initial SRTP keys through the offer/answer 
   model using crypto attributes as described previously, the media-
   plane key exchange mechanism is initiated.  Depending on the primary 
   media-plane mechanism chosen by the IETF, this may only occur if the 
   SDP included appropriate information to do so. 
    
   If the media-plane mechanism chosen includes sufficient information 
   in the SDP which could negotiate without using the crypto attribute 
   provided keys, the crypto-attribute keys provided through SDP MUST be 
   used if the media-plane mechanism fails to negotiate successfully.  
   The only exception to this is if either end has a local policy to 
   reject such a case, in which case the session MUST be explicitly 
   terminated.  The SDP exchange and key exchange per this draft is 
   considered to have succeeded, so session signaling must be used to 
   end the session. [Note: this will probably depend on the mechanism 
   chosen in the end, so this will be cleaned up later] 
    
 
 
Kaplan                  Expires - January 2007                [Page 8] 




                   draft-kaplan-best-srtp-keys-00.txt         July 2006 
 
 
   If the media-plane mechanism chosen does not include sufficient 
   information in the SDP to immediately exchange SRTP media, the 
   crypto-attribute provided keys MUST be used for RTP while the media-
   plane mechanism is attempted.  This is necessary in case the far-end 
   does not support the media-plane mechanism, and for early media 
   support. 
    
   Assuming the media-plane mechanism supports it, regardless of whether 
   the received SDP offer or answer contained indication for BEST-KEY 
   and SRTP, the media-plane mechanism MUST be attempted.  This is to 
   try to overcome any bid-down attack in the signaling-plane.  This 
   assumes the media-plane mechanism chosen is such that it can be 
   attempted blindly without causing interoperability problems for 
   legacy SRTP or RTP devices. [Note: that's a big assumption, maybe we 
   shouldn't try this if signaling didn't agree] 
    
    
8. Formal Syntax 
    
   [Note: I'm not sure any formal syntax is warranted, is it?  No ABNF 
   changes from [secdes] anyway, though IANA registry might need a 
   change] 
    
    
9. Security Considerations 
    
   Like [secdes], SDP using the mechanism in this draft is conveyed in 
   an encapsulating application protocol which MUST provide both strong 
   eavesdropping and authentication mechanisms.  The security 
   requirements in [secdes] MUST be followed for this draft as well. 
    
   [Note: I'm considering relaxing that a bit, because it's (a) going to 
   be ignored anyway, (b) not necessary for some situations, and (c) may 
   not be necessary depending on the media-plane mechanism chosen.  I'll 
   have to think on it some more.] 
    
9.1 Security Implications vs. RFC 4568 [secdes] 
    
   The BEST-KEY mechanism proposed in this draft is less secure than 
   [secdes] because it allows a bid-down attack to establish non-secure 
   RTP sessions, even if both ends supported SRTP and BEST-KEY.  This is 
   by design, however, in order to facilitate interoperability.  No 
   mechanism proposed so far truly prevents a bid-down attack, as far as 
   this author knows.  The difference is that [secdes] and some other 
   mechanisms would result in a failed session negotiation, whereas this 
   mechanism would not.  The author considers that a benefit of BEST-
   KEY, not a drawback.  Neither party needs to accept a session using 
   non-secure RTP: the offerer can simply use the [secdes] offer model 
   of secure transport encoding in SDP, and the answerer can simply 
 
 
Kaplan                  Expires - January 2007                [Page 9] 



                   draft-kaplan-best-srtp-keys-00.txt         July 2006 
 
 
   reject offers which do not offer a BEST-KEY or [secdes] offer; or 
   either end can terminate the session or re-offer at any time.  Those 
   are local policy decisions which are available for any mechanism. 
    
   A second issue is that this draft opens the possibility for a middle-
   man snooper to send non-secure RTP to the offerer, before the answer 
   is received indicating SRTP should be used.  Thus, even if the 
   middle-man cannot view the SRTP-specific information in the SDP, he 
   may be able to inject false RTP for a short time by guessing the 
   media port (it's typically not hard to guess, as it's often a fixed 
   offset from one used in a device's previous session).  That is 
   essentially unavoidable if we allow early media.   
    
9.2 Security Implications vs. Media-plane Mechanisms Alone 
    
   Like [secdes], BEST-KEY has specific security weaknesses.  Unlike 
   [secdes], BEST-KEY has the ability to use a more-secure key exchange 
   mechanism if both ends can, while still providing SRTP support for 
   those that cannot perform the media-plane mechanism, and fallback to 
   RTP support for those that cannot perform SRTP at all. 
    
   In particular, the following are recognized weaknesses of BEST-KEY 
   and [secdes]: 
    
       1. The use of S/MIME is incredibly rare, SIPS is uncommon, and 
   there is virtually no way to guarantee all the hops along the 
   signaling path use TLS or IPSEC; even using TLS or IPSEC, if the SDP 
   is passed through intermediate systems (proxies, b2bua's, etc.) 
   without SDP-level encryption, then the intermediate systems have 
   access to the keys, can modify them, etc.  This is likely still more 
   secure than sending them in the clear, but is an obvious point of 
   vulnerability.  The benefit of BEST-KEY is this only affects the 
   media exchanged before a media-plane mechanism updates the keys, if a 
   media-plane mechanism is available. 
    
       2. If the SDP is provided to more than one party, for example in 
   a forked SIP request, then even the party which did not answer has 
   access to the keys for media being generated by the offerer.  This is 
   similar to (1) above, and the benefit of BEST-KEY is the same as for 
   (1) above.  Furthermore, the offerer is free to create an updated 
   offer with new keys at any time after session establishment, if she 
   so wishes. 
    
       3. Unlike some other mechanisms which use the signaling-plane, it 
   is not sufficient to only integrity protect BEST-KEY and [secdes], 
   without also encryption.  This means use of a mechanism such as sip-
   identity [zzzz] is not sufficient, because it leaves the SDP as 
   cleartext.  An eavesdropper need only see the SDP to be able to 
   decrypt the SRTP streams, or even inject her own.  Proponents of 
 
 
Kaplan                  Expires - January 2007               [Page 10] 



                   draft-kaplan-best-srtp-keys-00.txt         July 2006 
 
 
   other signaling-based or media-plane-based mechanisms argue this 
   makes an [secdes] style mechanism inferior.  It should be noted, 
   however, that sip-identity is neither ubiquitous today, nor would it 
   actually provide end-to-end integrity protection.  Sip-identity is 
   expected to be typically signed by an intermediate system, such as 
   the first-hop proxy, and possibly verified and re-signed by a last-
   hop proxy.  Those systems can modify the contents of SDP at will; for 
   example, SBCs are such intermediate systems. 
    
    
References 
    
   [secdes]  Andreasen, F., Baugher, M., and D. Wing, "Session 
   Description Protocol (SDP) Security Description for Media Streams", 
   RFC 4568, July 2006 
    
   [sdp]  Handley, M., Jacobson, V., and C. Perkins, "SDP: Session 
   Description Protocol", RFC 4566, July 2006. 
    
   [RFC3264]  Rosenberg, J. and H. Schulzrinne, "An Offer/Answer Model 
   with Session Description Protocol (SDP)", RFC 3264, June 2002. 
    
   [srtp]  Baugher, M., McGrew, D., Naslund, M., Carrara, E., and K. 
   Norrman, "The Secure Real-time Transport Protocol (SRTP)", RFC 3711, 
   March 2004. 
    
   [sip]  Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., 
   Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP:  
   Session Initiation Protocol", RFC 3261, June 2002. 
    
   [Note: I'm sure I forgot some... will add later if this gets taken as 
   anything more than a straw-man] 
    
    
Author's Address 
    
   Hadriel Kaplan 
   Acme Packet 
   71 Third Ave. 
   Burlington, MA 01803 
   Email: hkaplan@acmepacket.com 
    
    
Intellectual Property Statement 
    
   The IETF takes no position regarding the validity or scope of any 
   Intellectual Property Rights or other rights that might be claimed to 
   pertain to the implementation or use of the technology described in 
   this document or the extent to which any license under such rights 
 
 
Kaplan                  Expires - January 2007               [Page 11] 




                   draft-kaplan-best-srtp-keys-00.txt         July 2006 
 
 
   might or might not be available; nor does it represent that it has 
   made any independent effort to identify any such rights.  Information 
   on the procedures with respect to rights in RFC documents can be 
   found in BCP 78 and BCP 79. 
    
   Copies of IPR disclosures made to the IETF Secretariat and any 
   assurances of licenses to be made available, or the result of an 
   attempt made to obtain a general license or permission for the use of 
   such proprietary rights by implementers or users of this 
   specification can be obtained from the IETF on-line IPR repository at 
   http://www.ietf.org/ipr. 
    
   The IETF invites any interested party to bring to its attention any 
   copyrights, patents or patent applications, or other proprietary 
   rights that may cover technology that may be required to implement 
   this standard.  Please address the information to the IETF at ietf-
   ipr@ietf.org. 
    
Disclaimer of Validity 
    
   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 
 
 
Copyright Statement 
 
   Copyright (C) The Internet Society (2006).  This document is subject 
   to the rights, licenses and restrictions contained in BCP 78, and 
   except as set forth therein, the authors retain all their rights. 
    
    
Acknowledgments 
    
   The author of this draft did not personally conceive the two-stage 
   approach.  He has been unable to find the originator of it, and so 
   decided to write this draft as a straw-man for the RTPSEC focus group 
   to move the process along.  If you are the originator, and wish to 
   take over editorial control, feel free to contact the current author; 
   he will be more than happy to give credit and editorial 
   responsibility to another.  The "BEST-KEY" acronym however, is solely 
   the author's fault. 
    
    

 
 
Kaplan                  Expires - January 2007               [Page 12]