Look, my question about security documentation for SIP extensions had nothing to do with SIPSEC and everything to do with documenting the current please-molest-me proxy-mediated transitive-faith-in-goodness I-believe-my-operator-cares-for-me model of SIP security. And we DO need to document this model better -- the question is how.

So I'm changing the thread subject for further discussion on SIPSEC.

On Aug 14, 2007, at 2:29 PM, Cullen Jennings wrote:

The other thing that I think is important is considering sipsec is why is the proxy in the path in the first place? If the proxy does not need to see or change any of the headers why is the message traversing the proxy at all?


see draft-ietf-sip-outbound.

Outbound proxies do NOT really need to see or change any of the SIP headers. But they're very, very useful from a NAT traversal perspective.

With SIPSEC, the outbound proxy sees CONNECT, routes it, then establishes a packet-forwarding channel. The UAs do keepalive on this channel. And everybody is happy and secure.

Of course, we could probably have done the same thing with STUN relay, if we had a way to route STUN-relay requests or REGISTER contacts containing vectors of STUN relays. But we don't, yet.

--
Dean


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to