Hi Rohan and all,
   
  I can't find the discussing about the connection reuse when NAT/Firewall 
involved. Sorry if it is documented somewhere already. Here's my comments:
   
   
    
   SIP UA behind a NAT/Firewall using TCP: According to the current draft (08), 
the UA and proxy have to create bi-direction connections. It seems that it is 
impossible for the proxy (at the public side of the firewall) to make a new TCP 
connection to the phone for incoming requests without reusing the phone’s 
existing TCP connection with the proxy.  
   SIP UA behind a NAT using TCP to register to the server: The only possible 
way a UA can receive incoming calls is to reuse the TCP connection that it has 
created to register with the proxy/registrar.
   
  For the above two reasons, I think it would be better to treat the TCP/SCTP 
the same way as the TLS. It would make the design and implementation simple. 
The SIP routing behavior would be consistent when supporting the “connection 
reuse” draft.
   
  As the TCP security concerns are discussed in the section 9.3 “Security 
Considerations for the TCP Transport”, the first 3 attacks can be prevented by 
Digest authentications. I can’t figure out what is the last case all about 
(Proxy enter an aliasing agreement with downstream proxy)?  If there are 
services between these two proxies, they will create connections, one or two, 
anyway. What are really the concerns here?
   
  Regards,
  Jerry
   

       
---------------------------------
Never miss a thing.   Make Yahoo your homepage.
_______________________________________________
Sip mailing list  http://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to