I suppose if the edge-proxy _only_ accepts Route headers with flow tokens (ie, Route headers without will just cause the request to fail), and bypassing the edge-proxy is impossible (ie, the network, including endpoints, is configured to forward all traffic to the edge proxy regardless of what is in the Route headers), cryptographic protection of flow tokens would help. But, in the general case, it will not afford us any meaningful protection. We need to rely on something like TLS (which, conveniently enough, outbound makes it easy to do).
Best regards, Byron Campen
DRAGE, Keith (Keith) wrote:(As WG chair) We now have a new version of outbound. There hasn't exactly been aflurry of comments since it was posted - does that mean it is now readyfor WGLC. It has agenda time at the next IETF meeting, with a view to startingWGLC not long after that meeting. If you believe there are issues with the current version of this document, then you need to post them to thelist, so that they can be either resolved there, or addressed in the meeting.I never received an explanation of what kind of attacks could be avoided by an edge proxy using an algorithm that generates flow tokens that "cannot be modified by attackers" (section 5.2 of outbound-09).This was the last e-mail in the thread the last time I brought it up on the list :http://www1.ietf.org/mail-archive/web/sip/current/msg18336.html. This leads me to think that either 1) the security threats haven't been addressed properly or2) that there in fact was no security threat so the requirement for an edge proxy to generate flows that "cannot be modified by attackers"is just unnecessary, and should therefor be removed or3) there really _is_ something that gets significantly better by thisrequirement, and it should simply be explained in the draft. /Fredrik _______________________________________________ Sip mailing list https://www1.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use [EMAIL PROTECTED] for questions on current sip Use [EMAIL PROTECTED] for new developments on the application of sip
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ Sip mailing list https://www1.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use [EMAIL PROTECTED] for questions on current sip Use [EMAIL PROTECTED] for new developments on the application of sip
