On Aug 14, 2007, at 12:12 PM, Matt Lepinski wrote:

This is related to a point that someone [My apologies for not remember who] raised at the Chicago meeting:

What problem will sipsec solve that existing (and not well deployed) security measures do not solve?

The goal of SIPSEC is eliminating the requirement of transitive trust. We still have a reliance on request routing functionality to make the initial delivery of the CONNECT message, but after that the only attack that an intermediate proxy could launch would be to stop forwarding messages. This is much less insidious than subtly altering the contents of messages in order to delivery the appearance of normality when in fact an attack has been effected, or of disclosing sensitive elements of the messages to third parties so that attacks can be effected by those parties.

While the documented-but-undeployed S/MIME approach appears to offer protection from proxies that subtly alter the bodies of messages, the protection for header-level alteration is weaker, and even in the best case a great deal of information potentially useful to attackers is visible to the proxies (and hence potentially compromised to attackers). SIPSEC appears to offer fairly complete integrity and privacy protection for all headers and body parts following the initial CONNECT message, and the initial CONNECT is designed to disclose as little sensitive information as possible.


Given that current transitive-trust models of security are well- deployed, my inclination is that it is important to provide guidance to on the strengths and weaknesses of transitive-trust models (in the hope that we can dissuade people from making false assumptions about the systems they are deploying). I'm less convinced that it's important to move forward with a brand new security measure, unless we have good reason to believe that it will be more effective than existing mechanisms.


Yes, that's exactly the goal of the proposal that started this thread: to find a way to more completely describe the strengths and weaknesses of the current transitive trust models and then require new extensions to document how the extension interacts with those aspects of the operational environment. Whether we like the current operational environment or no, we still need to understand it very clearly, because it is real and we live in it today. More so, we need to clearly understand the security impacts of new extensions.


--
Dean


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to