Dean Willis wrote:

On Apr 13, 2007, at 9:58 AM, Paul Kyzivat wrote:

*This* message only reveals that Alice *thinks* Bob is reachable at that address. Its no worse than intercepting an email from Alice to Charlie that mentions the sip (or sips) address of Bob.


Trust me, the spooks look for those too.

If you want to prevent Alice from disclosing the address of Bob then you have a much harder problem. I don't think this is solvable in practice, nor do I think it needs to be solved.

If Alice had just not sent the request via SIP, but used SIPS, the it would have been solved.

Unless Alice believes that the address itself is a secret to be protected, she may not protect it.

AFAIK, there has never been any expectation that the presence of "sips" in the URI carried an expectation that somebody possessing such an address keep it confidential. Quite to the contrary, I have assumed that the expectation was that it might be put on business cards, stored in directories, ENUM, etc.

Since traceroute on biloxi.example.com may well give us a good idea of the physical location of biloxi.example.com, an interceptor picking up this message would have a good chance of being able to find Bob.

No. Only Bob's home proxy.

In the call flow described (from 3665) there is no home proxy.

THERE IS NO REQUIREMENT THAT SIP USERS HAVE A HOME PROXY AND I WOULD BE VERY HAPPY IF PEOPLE WOULD REMEMBER THAT!

Its fine for there to be no home proxy. But if so, then Bob must publicize his actual address, and expect that bad guys may get access to it.

But IF there had been a home proxy in this example, and the request were intercepted between Bob's home proxy and Bob, then it would reveal Bob's location as understood by Bob's home proxy.

I thought the idea was that Bob himself had only the sips address. So the link between Bob's home proxy and Bob would always be via TLS. So the message won't be intercepted on that leg. It would have to be intercepted before reaching his home proxy. And there it would only reveal his AOR.

Assuming that this message is sent unencrypted when used with SIP (instead of SIPS), it's relatively easy to intercept. The interceptor didn't need credentials to get into a location server that might translate [EMAIL PROTECTED] to [EMAIL PROTECTED] They didn't need credentials to look in a directory server. They just pulled the information "off the wire" in such a way that Bob will be unable to know how the interceptor got his location.

I don't see how this discloses the address [EMAIL PROTECTED], which is the only one that Bob has any chance of hiding. All Bob needs to do is be careful in what he puts into his *response* to the above invite. (E.g. He shouldn't put his contact address if he is rejecting the call, and he should ensure his address isn't mentioned in a H-I header.) If he is really paranoid about this he could simply refuse to send any response to the invite, and let it timeout.

It discloses"[EMAIL PROTECTED]" by the very simple mechanism of including both "[EMAIL PROTECTED]" and "[EMAIL PROTECTED]" in a plain-text message. This disclosure occurs even if Bob never responds to the request, and even if bob never even RECEIVES the request.

I guess we are making some significantly different assumptions about what is going on.

        Paul

_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to