RFC3261 section 22.1 states:

Under an authentication scheme that uses responses to carry values
  used to compute nonces (such as Digest), some problems come up for
  any requests that take no response, including ACK.  For this reason,
  any credentials in the INVITE that were accepted by a server MUST be
  accepted by that server for the ACK.  UACs creating an ACK message
  will duplicate all of the Authorization and Proxy-Authorization
  header field values that appeared in the INVITE to which the ACK
  corresponds.  Servers MUST NOT attempt to challenge an ACK.

This means that integrity cannot be verified for the original request URI or any body (e.g. in case of offerless INVITE scenario) for ACKs. It also means that proxies and UAS need to maintain state in order to authenticate ACKs. Even though ACK cannot be challenged, it would still be possible for the UAC to calculate a digest as usual, using the same username/password as INVITE and the same nonce.

Is this an omission, is there any reason why this is done the way it is?

Regards,
Jeroen


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to