(this email with my AD hat on)

The type of SIP loops described in ietf-sip-loop-fix can be roughly classified into two categories. Loops that had happened because an accidental registration that causes a loop, and loops that happened due to malicious intent.

This draft attempted to deals with both. The abstract describes it as

  This document normatively updates RFC 3261, the Session Initiation
Protocol (SIP), to address a security vulnerability identified in SIP
   proxy behavior.  This vulnerability enables an attack against SIP
   networks where a small number of legitimate, even authorized, SIP
   requests can stimulate massive amounts of proxy-to-proxy traffic.

During IETF LC, substantial comment came up about the security of this draft not really working in the case of malicious loops. A thread ensues that convinced many people on the thread that this draft did not really help with the malicious loops. (Not 100% sure here but I suspect that the authors and chairs were all convinced of this). I will let others explain the issues that came up as we decide what to do next.

I think that some of issue was discussed while the working group was considering this draft - however, I suspect that many participants did not understand how easily this security would be defeated. I for one significantly underestimated the how easy it was for a malicious attacker to cause this problem. I apologize to the folks that attempted to explain it to me and I just failed to "get it".

Anyways, we need to figure out what to do next with this draft. There are basically two paths forward that I see:

1) reduce the scope so that it only deals with accidental loops and provides no protection against malicious loops. I don't think this would change any of the mechanisms in the draft but it would probably change lots of the text around what security claims the draft made.

2) try to extend or replace the mechanism with one that does protect against malicious attack. A strong candidate to consider would be the work in draft-sparks-sipping-max-breadth.

If we go forward with path 1, the value of this draft is probably not super high because Max-Forwards deals with the the accidental loops in most cases (but not all cases). If we go with path 2, the WG will need make sure it OK with the solution. I'm certainly open to other paths forward if someone has a good idea.

What I would like to do now is start some discussion about what the working group would like to do with this draft.

Thanks, Cullen






_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to