Dan,

I agree that R23 and R25 aren't necessarily related to lawful intercept, but all three requirements are related to third parties having access to plain-text media -- and the whole point of encrypting data is to protect it against access by unauthorized third parties. In order to provide access to these parties (quality of service, law enforcement, or middleboxes) and still provide security, either (1) the protocol needs to have some mechanism for explicitly authorizing these users, or (2) there needs to be an out-of-band mechanism like draft-wing-sipping-srtp-key.

Option (1) (explicit authorization) is (IMO) the much less appealing option:
1. It directly conflicts with R24, since it enables the endpoints to be aware that another party is being given access. 2. It means that the requirements can only be satisfied by a multi-party / multicast keying protocol (since it has to assume that there are at least three parties to a call). 3. It adds hard authentication requirements (so that not just anyone can be the listening party), which will hinder deployment

Option (2), on the other hand, requires no text in the media security requirements. It provides the same functionality, with two caveats: 1. One endpoint has to be willing to transmit the keys to the listener. In a enterprise network, this isn't a problem, since endpoints are tightly controlled. A VSP that wants to provide lawful intercept can just block SRTP calls that don't provide a key. 2. The listener has to be willing to tolerate the delay induced by routing the keys through SIP. AFAIK, there are no requirements for real-time recording or lawful intercept, but this may be a small problem for middleboxes.

So on the whole, it seems to me like option (2) covers at least two of the three use cases you've proposed.

--Richard


R23 refers only to recording of media. This is necessary in many business environments such as banks, stock brokers, catalog ordering call
centers, and so on.  This is a requirement for many businesses.  It
is not yet clear if draft-wing-sipping-srtp-key (or something like it) meets requirement R23.

It seems like does, provided that (1) endpoints are willing to send key to authorized listeners, and (2) the delay induced by SIP is tolerable. Both of these would seem to be true in the enterprise environments you describe.

I agree R24 refers to lawful intercept.  This is a requirement from
other SDOs that need to provide lawful intercept with their solutions.

Another email on R24 lawful intercept will be forthcoming shortly.

R25 reference to 'intermediate nodes' is to transcoders and SBCs which
handle signaling and media traffic.  It seems important that any keying
mechanism work with such intermediate nodes, as those intermediate nodes
are common on many SIP networks.


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to