At Fri, 02 Oct 2009 13:02:23 -0700,
Michael Chen wrote:
> 
> [1  <text/plain; ISO-8859-1 (7bit)>]
> Eric,
> 
> In my list post, Z can discover Y's attack if the AoR itself "x...@domain" 
> is included in the STORE such that  hash("x...@domain") = Rx.  Since the 
> message is resigned by Y, so Z can conclude that it's illegal for Y to 
> STORE an AoR of "x...@domain".  Y can only STORE an AoR of "y...@domain" 
> (unless of course a replica).
> 
> If I am not mistaken, the current STORE does not send the AoR, only the 
> resource ID Rx. Then Z cannot verify how Rx was calculated and cannot 
> discover that Y is storing "x...@domain".

This is not correct.

To recap: 
When a node receives a store to location Rx, that store is signed
with the private key corresponding to the public key in some
certificate C. The node then checks that whatever identity is in
C is allowed to store at location Rx. The precise checks depend on
the kind. 

For the particular case of AORs (more properly SIP-REGISTRATION)
the Access Control Model is USER-NODE-MATCH. (S 7 of draft-ietf-p2psip-sip).
This means:

   The USER-NODE-MATCH policy may only be used with dictionary types.
   In the USER-NODE-MATCH policy, a given value MUST be written (or
   overwritten) if and only if the request is signed with a key
   associated with a certificate whose user name hashes (using the hash
   function for the overlay) to the Resource-ID for the resource.  In
   addition, the dictionary key MUST be equal to the Node-ID in the
   certificate.

[draft-ietf-p2psip-base; S 6.3.3]

Thus, X does not need to supply the AOR, because the check is to take the
user name in the certificate and see of it hashes to Rx. This check
precludes Y storing at Rx.

-Ekr


_______________________________________________
P2PSIP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/p2psip

Reply via email to