Internet-Draft SDES don't don't don't July 2021
Preuß Mattsson & Westerlund Expires 13 January 2022 [Page]
Workgroup:
Network Working Group
Internet-Draft:
draft-mattsson-dispatch-sdes-dont-dont-dont-00
Obsoletes:
4568 (if approved)
Updates:
7201 (if approved)
Published:
Intended Status:
Standards Track
Expires:
Authors:
J. Preuß Mattsson
Ericsson
M. Westerlund
Ericsson

SDP Security Descriptions is NOT RECOMMENDED and Historic

Abstract

Key exchange without forward secrecy enables pervasive monitoring. Massive pervasive monitoring attacks relying on key exchange without forward secrecy have been reported, and many more have likely happened without ever being reported. If key exchange without Diffie-Hellman is used, access to long-term keys enable passive attackers to compromise past and future sessions. Entities can get access to long-term key material in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order. Session Description Protocol (SDP) Security Descriptions (RFC 4568) does not offer PFS and has a large number of additional significant security weaknesses. This document specifies that use of the SDP Security Descriptions is NOT RECOMMENDED. New deployments SHOULD forbid support of SDP Security Descriptions.

This document reclassifies RFC 4568 (SDP Security Descriptions) to Historic Status and also obsoletes RFC 4568.

This document updates RFC 7201 (Options for Securing RTP Sessions) to note that SDP Security Descriptions SHOULD NOT be used.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 13 January 2022.

Table of Contents

1. Introduction

Key exchange without forward secrecy enables pervasive monitoring [RFC7258]. Massive pervasive monitoring attacks relying on key exchange without forward secrecy have been reported [Heist] [I-D.ietf-emu-aka-pfs], and many more have likely happened without ever being reported. If key exchange without Diffie-Hellman is used, access to long-term keys enables passive attackers to compromise past and future sessions. Entities can get access to long-term key material in different ways: physical attacks, hacking, social engineering attacks, espionage, or by simply demanding access to keying material with or without a court order.

All TLS cipher suites without forward secrecy has been marked as NOT RECOMMENDED [RFC8447] in TLS 1.2 [RFC5246], and static RSA and DH are forbidden in TLS 1.3 [RFC8446]. A large number of TLS profiles forbid use of key exchange without Diffie-Hellman for TLS 1.2 [RFC7540], [ANSSI], [T3GPP.33.210]. SRTP deployments are severely lagging behind TLS deployments in this area as SDP Security Descriptions [RFC4568] is still used in many deployments. SDP Security Description is often referred to as SDES. In this document SDES refers to SDP Security Descriptions and not RTP source descriptions, which are also often referred to as SDES.

In addition to the very serious weaknesses of not providing protection against key leakage and enabling passive monitoring [RFC7258], Security Descriptions [RFC4568] has a number of additional significant security problems.

New systems and recommendations like WebRTC [RFC8827], PERC [RFC8871], and [RFC8862] do mandate support of DTLS-SRTP [RFC5764]. WebRTC also forbids support of SDP Security Descriptions.

Many implementations, devices, and libraries support DTLS-SRTP. One deployment that supports DTLS-SRTP but still use SDP Security Descriptions is IMS Media Security [T3GPP.33.328] where Security Descriptions is one option used for access protection. IMS Media Security with SDP Security Descriptions is typically used for VoWi-Fi (Voice over EPC-integrated Wi-Fi) calls which is commonly used by 4G and 5G phones as a backup to VoLTE (Voice over LTE) and VoNR (Voice over NR). However, IMS Media Security [T3GPP.33.328] has already specified and mandated support of DTLS-SRTP for interworking with WebRTC. Allowing use of DTLS-SRTP also for other use cases than WebRTC interworking would therefore be a relatively small change.

1.1. Terminology

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

2. Status Change

This document reclassifies RFC 4568 (SDP Security Descriptions) to Historic Status and also obsoletes RFC 4568.

This document updates RFC 7201 (Options for Securing RTP Sessions) to note that SDP Security Descriptions SHOULD NOT be used.

This document specifies that use of the SDP Security Descriptions [RFC4568] is NOT RECOMMENDED. Existing deployments SHOULD mandate support of DTLS-SRTP [RFC5764] and long-term phase out use of SDP Security Descriptions. If it is known by out-of-band means that the other party supports DTLS-SRTP, then SDP Security Descriptions MUST NOT be offered or accepted. If it is not known if the other party supports DTLS-SRTP, both DTLS-SRTP and SDP Security Descriptions and SHOULD be offered during a transition period. New deployments SHOULD forbid support of Security Descriptions [RFC4568]. This document reclassifies RFC 4568, SDP Security Descriptions to Historic Status and obsoletes RFC 4568.

As required by [RFC7258], work on IETF protocols needs to consider the effects of pervasive monitoring and mitigate them when possible.

3. References

3.1. Normative References

[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC4568]
Andreasen, F., Baugher, M., and D. Wing, "Session Description Protocol (SDP) Security Descriptions for Media Streams", RFC 4568, DOI 10.17487/RFC4568, , <https://www.rfc-editor.org/info/rfc4568>.
[RFC5764]
McGrew, D. and E. Rescorla, "Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP)", RFC 5764, DOI 10.17487/RFC5764, , <https://www.rfc-editor.org/info/rfc5764>.
[RFC7201]
Westerlund, M. and C. Perkins, "Options for Securing RTP Sessions", RFC 7201, DOI 10.17487/RFC7201, , <https://www.rfc-editor.org/info/rfc7201>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/info/rfc8174>.
[RFC8446]
Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", RFC 8446, DOI 10.17487/RFC8446, , <https://www.rfc-editor.org/info/rfc8446>.
[RFC8447]
Salowey, J. and S. Turner, "IANA Registry Updates for TLS and DTLS", RFC 8447, DOI 10.17487/RFC8447, , <https://www.rfc-editor.org/info/rfc8447>.
[RFC8862]
Peterson, J., Barnes, R., and R. Housley, "Best Practices for Securing RTP Media Signaled with SIP", BCP 228, RFC 8862, DOI 10.17487/RFC8862, , <https://www.rfc-editor.org/info/rfc8862>.

3.2. Informative References

[ANSSI]
Agence nationale de la sécurité des systèmes d'information, ., "Security Recommendations for TLS", , <https://www.ssi.gouv.fr/uploads/2017/02/security-recommendations-for-tls_v1.1.pdf>.
[Baiting-SDES]
Seokung Yoon, ., Jongil Jeong, ., and . Hyuncheol Jeong, "A Study on the Tightening the Security of the Key Management Protocol (RFC4568) for VoIP", , <http://phbo.janlo.nl/kpngips2/module-09/security-analysis.pdf>.
[Hacking-SDES]
Anthony Critelli, ., "Hacking VoIP: Decrypting SDES Protected SRTP Phone Calls", , <https://www.acritelli.com/blog/hacking-voip-decrypting-sdes-protected-srtp-phone-calls/>.
[Heist]
The Intercept, ., "How Spies Stole the Keys to the Encryption Castle", , <https://theintercept.com/2015/02/19/great-sim-heist/>.
[I-D.ietf-emu-aka-pfs]
Arkko, J., Norrman, K., and V. Torvinen, "Perfect-Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' PFS)", Work in Progress, Internet-Draft, draft-ietf-emu-aka-pfs-05, , <https://www.ietf.org/archive/id/draft-ietf-emu-aka-pfs-05.txt>.
[I-D.kaplan-sip-baiting-attack]
Kaplan, H., Wing, D., and I. Property, "The SIP Identity Baiting Attack", Work in Progress, Internet-Draft, draft-kaplan-sip-baiting-attack-02, , <https://www.ietf.org/archive/id/draft-kaplan-sip-baiting-attack-02.txt>.
[Replay-SDES]
Prateek Gupta, . and . Vitaly Shmatikov, "Security Analysis of Voice-over-IP Protocols", , <http://phbo.janlo.nl/kpngips2/module-09/security-analysis.pdf>.
[RFC5246]
Dierks, T. and E. Rescorla, "The Transport Layer Security (TLS) Protocol Version 1.2", RFC 5246, DOI 10.17487/RFC5246, , <https://www.rfc-editor.org/info/rfc5246>.
[RFC5411]
Rosenberg, J., "A Hitchhiker's Guide to the Session Initiation Protocol (SIP)", RFC 5411, DOI 10.17487/RFC5411, , <https://www.rfc-editor.org/info/rfc5411>.
[RFC7258]
Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, , <https://www.rfc-editor.org/info/rfc7258>.
[RFC7540]
Belshe, M., Peon, R., and M. Thomson, Ed., "Hypertext Transfer Protocol Version 2 (HTTP/2)", RFC 7540, DOI 10.17487/RFC7540, , <https://www.rfc-editor.org/info/rfc7540>.
[RFC8827]
Rescorla, E., "WebRTC Security Architecture", RFC 8827, DOI 10.17487/RFC8827, , <https://www.rfc-editor.org/info/rfc8827>.
[RFC8871]
Jones, P., Benham, D., and C. Groves, "A Solution Framework for Private Media in Privacy-Enhanced RTP Conferencing (PERC)", RFC 8871, DOI 10.17487/RFC8871, , <https://www.rfc-editor.org/info/rfc8871>.
[T3GPP.33.210]
3GPP, ., "TS 33.210 Network Domain Security (NDS); IP network layer security", , <https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2279>.
[T3GPP.33.328]
3GPP, ., "TS 33.328 IP Multimedia Subsystem (IMS) media plane security", , <https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=2295>.

Acknowledgements

The authors want to thank Bo Burman and Christer Holmberg for their valuable comments and feedback.

Authors' Addresses

John Preuß Mattsson
Ericsson
Magnus Westerlund
Ericsson