> On Fri, Apr 05, 2002 at 12:37:01PM -0600, Glover George wrote:
> > Am I right in understanding this logic behind doing connection
tracking?
> > The first protocol involved that needs to be messed with is SIP.
Does
> 
> I've been spending quite some time digging into SIP and thinking about
> possible solutiosn for conntrack/NAT support for this protocol.  It's
not
> as easy as you think.  In certain fields of the SIP header, a hostname
> instead of an IP can be used.  So how do you create an expectation for
> a hostname?  Somebody would have to resolve the hostname into an IP
> address and then cause an expectation for this IP address.  Stuff like
> that can't be done from within the kernel, so you'd need some support
> for an asynchronous DNS resolver in userspace.
> 

I've sniffed the initial transactions and MSN transmits what it thinks
each location's ip is during the communications through the .Net
servers.  I haven't been able to look at the first SIP packets because
the remote location can't send it's SIP Invite because my location is
sending the 192.168.xx address to the other server.  


> Furthermore, what about encrypted or authenticated SIP/SDP?  You
loose.
> 
> Please try to read the available documentation.  There is a Master
thesis
> on how to NAT SIP/SDP, which proposes a specific way of
implementation.

But here, and maybe correctly, you're looking at an overall solution.
My motivation, however off it may be, is to get the traditional
Messenger stuff working using the .Net servers.  The Windows Messenger
docs say that encryption is only use when in conjunction with an SIP
Proxy service (Yes, I have been reading the available documentation!).
But I'd also like you to send me the links to this extra documentation
you've found.  Thanks.

> 
> The 'official' IETF approach on how to NAT SIP/SDP is that you have to
> run some SIP proxy, which communicates the to-be-opened port and NAT
> mappings
> over some protocol (formerly FCP, firewall configuration protocol) to
the
> firewall.

And how is the SIP proxy any safer that allowing it through the server?
They're both going to relay the same information back to the inside
machine, and if the SIP Proxy isn't watching for Trojan horses, what's
to say it won't get through anyway?  The fact is some OS's ARE indeed
insecure, but we don't always have that choice now do we.  

Like I said before it's easy to write this off as just too insecure.
But since when has the open source community said we don't want to
provide choices?  I don't know about all of you, but I really don't care
if my infamous OS is open to attacks through these ports.  What's the
alternative?  Having to pull it out from behind the firewall completely
leaving EVERY port open to compromise?

The prevailing attitude should be if people want to use it, give them as
much adequate warning about the service as possible, but give them the
choice!  If they don't take the time to create a site-specific security
policy, should they really be screwing with a  firewall in the first
place?




Reply via email to