Hadriel Kaplan wrote:
-----Original Message-----
From: Paul Kyzivat [mailto:[EMAIL PROTECTED]
Sent: Tuesday, November 20, 2007 6:04 PM
To: Hadriel Kaplan
Cc: Vijay K. Gurbani; IETF SIP List; Rohan Mahy; Brett Tate
Subject: Re: [Sip] WGLC: draft-ietf-sip-connect-reuse-08.txt
In general a digest challenge from B to A can't be correlated directly
to the address of A. So a successful response to the challenge won't
help with future reverse routing.
[snip]
And lets just consider connection reuse between edge.atlanta.com and
edge.biloxi.com. The connection is established in that direction.
edge.biloxi.com *thinks* the name of the previous hop is
edge.atlanta.com because of the Via header. But what digest challenge
can edge.biloxi.com do to verify that the prior hop is who it thinks it
is?
As I said in another email, I was referring to digest challenge for endpoints,
not proxies.
People do digest-challenge proxies, but they do so in a weird way - for example they
digest challenge a Register from the proxy acting as a UA, where the proxy has a specific
AoR that represents its "trunk". (this is basically the SIP-Forum's SIP-Connect
optional PBX registration model - it's not well defined, and not clean from a SIP
perspective)
Even with endpoints its not good enough in general.
If a request is From sip:[EMAIL PROTECTED] and you successfully digest
challenge that, does it mean that you can send a request to
sip:[EMAIL PROTECTED] on the same connection? Not unless you can
actually tie the digest credentials to <sip:atlanta.com>.
But I guess you were only using digest as an example, while you actually
intend to use some other technique.
But we don't have to
say anything about this. Just remove the MUST statement in the
draft that A must not accept requests from B over a TCP or
single-sided TLS connection created by A to B. You already say B
must not reuse the connection to A because it's not authenticated.
Leave it at that.
I will agree that this isn't a concern of A's. It is B that has the
concern, and lacks knowledge to reuse the connection. So it is B that we
should be giving MUST NOT or SHOULD NOT instructions to.
I would be ok with saying that B MUST NOT reuse this connection for
requests to the supposed party at the other end UNLESS it has some way
of verifying the identity of that party to the same level of assurance
as it would have by doing the DNS lookup and establishing its own
connection. For instance, if a DNS lookup resolved to the same address
and port as the source port of the inbound connection then that ought be
be good enough.
Awesome - that's all I'm saying as well. B must not reuse the connection
unless it knows better. If it sends the request to A over A's client
connection, there's no reason to mandate A not accept it. A has nothing to
fear, only B does.
Well, I really wasn't trying to "make your day". :-)
I fear leaving it that loose without at least some added words of
wisdom. Perhaps some statements about typical means of decision that are
not sufficient. (E.g. a successfully digest challenged registration of
sip:[EMAIL PROTECTED] does not mean that the connection can be reused
for anything addressed to sip:atlanta.com.
We have a lot of history of people taking carefully phrased things like
this and using them to justify a lot of incorrect behavior. We don't
want this to be misconstrued.
Thanks,
Paul
_______________________________________________
Sip mailing list https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip