On Fri, Aug 30, 2019 at 03:57:23PM -0700, Watson Ladd wrote:
> On Fri, Aug 30, 2019 at 3:24 PM Benjamin Kaduk <ka...@mit.edu> wrote:
> >
> > Hi all,
> >
> > New values for core types like TLS HandshakeType and ContentType don't
> > happen very often, so I thought people might be interested to know that
> > draft-ietf-perc-srtp-ekt-diet (currently in IESG evaluation) is allocating
> > a HandshakeType, to carry key information used to encrypt SRTP media key
> > material.
> > Obviously "it's never too late to change until the RFC is published", but I
> > think there would need to be some pretty serious issues in order to change
> > it at this point, so this is expected to just be an "FYI".
> 
> Design issues: Am I reading the doc right, that this handshake message
> goes after the finished? And then contains a key that is used to
> decrypt another key that is then used to decrypt (some) traffic, but
> doesn't change the DTLS keys? Why is this a handshake message and not

I think that's "yes" on all counts.

> some protocol framing in the protocol carried over DTLS? It just seems
> funny to make it be a handshake type and not something else. It's
> entirely possible this makes more sense if you know about DTLS-SRTP
> which I do not very much.

I don't consider myself an SRTP expert, but I think to zeroth order you can
model DTLS-SRTP as being a single "hybrid" protocol that takes the DTLS
handshake for key exchange and slots in a SRTP message-protection layer
that is analogous to the traditional TLS Record layer.  RFC 5764 even has a
pretty picture: https://tools.ietf.org/html/rfc5764#section-4.1 .

If you consider the "DTLS-SRTP hybrid protocol", then this new
HandshakeType becomes a way for the handshake layer to supply cryptographic
input to the SRTP record layer, which is not so crazy of a request.

You're right, of course, that it could be done in some protocol framing at
the DTLS application data layer or within the SRTP framing layer, but I'm
pretty confident that the authors/WG have considered those options and
still picked this one.

That said, I'm pretty sure some people who are more familiar with that
history than me are on this list, and hopefully not afraid to chime in and
correct me or clarify as needed.

Thanks for looking,

Ben

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to