Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

V53 Cryptographic requirements for WebRTC #2412

Open
randomstuff opened this issue Nov 25, 2024 · 1 comment
Open

V53 Cryptographic requirements for WebRTC #2412

randomstuff opened this issue Nov 25, 2024 · 1 comment

Comments

@randomstuff
Copy link
Contributor

Spinoff of #2215.

Is there any need for cryptographic requirements for WebRTC channels?

Possible topics:

  • forward secrecy;
  • peer authentication;
  • encryption method/ciphersuites.

I would not expect much verification would be needed in practice. Maybe when a backend server acts as a WebRTC peer?

References

WebRTC requires Perfect Forward Secrecy (PFS) starting in Firefox 38 indicates that forward secrecy was not always enabled.

WebRTC Security: What You Need to Know in 2021 seems to imply that it is (was) not always automatic.

RFC8826:

It is this consideration that makes an automatic, public key-based key exchange mechanism imperative for WebRTC (this is a good idea for any communications security system), and this mechanism SHOULD provide Forward Secrecy (FS). The signaling channel/calling service can be used to authenticate this mechanism.

RFC8827:

Implementations MUST favor cipher suites which support Forward Secrecy (FS) over non-FS cipher suites and SHOULD favor Authenticated Encryption with Associated Data (AEAD) over non-AEAD cipher suites. .

@randomstuff
Copy link
Contributor Author

ping @tghosth

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant