- From: Eric Rescorla <ekr@rtfm.com>
- Date: Tue, 27 Nov 2018 15:29:08 -0800
- To: Bernard Aboba <Bernard.Aboba@microsoft.com>
- Cc: Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com>, Nils Ohlmeier <nohlmeier@mozilla.com>, public-webrtc@w3.org
- Message-ID: <CABcZeBN4KAHhK4MzuMSbwp1CttoRCrgAbfM=fSTAcBr1oC6ptA@mail.gmail.com>
On Mon, Nov 26, 2018 at 9:43 AM Bernard Aboba <Bernard.Aboba@microsoft.com> wrote: > Martin said: > > "This goes against the security architecture..." > > [BA] It's worth noting that the W3C has an existing architecture for > transport and playback of encrypted media: > > Media Source Extensions (MSE): https://w3c.github.io/media-source/ > Encrypted Media Extensions (EME): https://www.w3.org/TR/encrypted-media/ > > As noted at TPAC, these specifications are already being used for > transport of media over alternative transports such as the data channel: > > https://docs.google.com/presentation/d/1WOihY0SMJbWvfbc-41GA78F4yzPSwmyDOJ8GbRoU7dw/edit#slide=id.g44b656d873_120_5 > You'll notice that that architecture doesn't involve *capture*. -Ekr > > > ------------------------------ > *From:* Sergio Garcia Murillo <sergio.garcia.murillo@gmail.com> > *Sent:* Sunday, November 25, 2018 1:34 PM > *To:* Eric Rescorla > *Cc:* Nils Ohlmeier; public-webrtc@w3.org > *Subject:* Re: Call for adoption - use case for "Trusted application, > untrusted intermediary" > > On 25/11/2018 22:09, Eric Rescorla wrote: > > > > On Sun, Nov 25, 2018 at 12:45 PM Sergio Garcia Murillo < > sergio.garcia.murillo@gmail.com> wrote: > > On 25/11/2018 21:22, Eric Rescorla wrote: > > Rigth, but tunneling is the only mechanism specified in PERC, so I > assume that is the keying mechanism proposed when speaking about > accepting PERC in webrtc., I would not have any issue (in regards of the > keying part) with setting the keys in js either on the app (for trusted > app models) or in the identity server (for untrusted app model). > > > The problem with this, as Martin indicates, is that this goes directly > against the security architecture we have otherwise been using for WebRTC, > which involves not having encryption keys handled by the JS or carried > directly over the signaling channel. > > > We are adding a new layer on top of current security architecture, so I > fail to see how it invalidates it. As I would fail to see how allowing the > js app to encrypt a websocket message would invalidate secure websockets > security architecture. > > The issue is that this isn't E2E in that security model > > > Call it app to app (a2a) then.. :) > > Jokes aside, trusted app scenario is what most people is asking for in the > use cases, and in my opinion there is not so much interest for the > untrusted app one. Take into account that without the usage of IdP, you > MUST trust the app, and I don't think there are many services in production > using it. > > Also, going back to the keying topic, the identiy server is trusted by > definition, so if the keying/encryption is done within the identity server > script, you will have a trusted E2E with an untrusted app. > > Best regards > > Sergio > > >
Received on Tuesday, 27 November 2018 23:30:10 UTC