Eric Rescorla wrote:
At Tue, 24 Jun 2008 12:48:20 -0700,
Eric Rescorla wrote:
Dean,
This sounds like an excellent way to proceed. I'll generate some candidate text
and send it to the list in the next few days.
As promised, here's my proposed text:
Because DTLS-SRTP uses RFC 4474 to bind the media keying material to
the SIP signalling, the assurances about the provenance and security
of the media are only as good as those for the signalling. There are
two important cases to note here:
o RFC 4474 assumes that the proxy with the certificate "example.com"
controls the namespace "example.com". Therefore the RFC 4474
authentication service which is authoritative for a given
namespace can control which user is assigned each name. Thus, the
authentication service can take an address formerly assigned to
Alice and transfer it to Bob. This is an intentional design
feature of RFC 4474 and a direct consequence of the SIP namespace
architecture.
o When phone number URIs (e.g.,
'sip:[EMAIL PROTECTED]') are used, there is no
structural reason to trust that the domain name is authoritative
for a given phone number, although individual proxies and UAs may
have private arrangements that allow them to trust other domains.
This is a structural issue in that PSTN elements are trusted to
assert their phone number correctly and that there is no real
concept of a given entity being authoritative for some number
space.
In both of these cases, the assurances of DTLS-SRTP provides in
terms of data origin integrity and confidentiality are necessarily
no better than SIP provides for signalling integrity when RFC 4474
is used. Implementors should therefore take care not to indicate
misleading peer identity information in the user interface.
e.g. If the peer's identity is
sip:[EMAIL PROTECTED], it is not sufficient to
display that the identity of the peer is +17005551008. In cases
where the UA can determine that the peer identity is clearly an
E.164 number, it may be less confusing to simply identify the call
as encrypted but to an unknown peer.
While I understand the logic above, it isn't very satisfying.
People are constructing sip based phone systems that must compete with
traditional phone systems. If the sip based system shows no identity
when a traditional system can display the identity of the same caller,
then the sip system will be perceived and broken and non-competitive.
There will of course then be a temptation to do whatever is necessary
to make the product competitive.
And displaying the full URL is often not a good alternative. At best it
will be perceived as "geeky" and incomprehensible by grandma.
Thanks,
Paul
In addition, some middleboxes (B2BUAs and Session Border
Controllers) are known to modify portions of the SIP message which
are included in the RFC 4474 signature computation, thus breaking
the signature. This sort of man-in-the-middle operation is
precisely the sort of message modification that 4474 is intended to
detect. In cases where the middlebox is itself permitted to
generate valid RFC 4474 signatures (e.g., it is within the same
administrative domain as the RFC 4474 authentication service), then
it may generate a new signature on the modified
message. Alternately, the middlebox may be able to sign with some
other identity that it is permitted to assert. Otherwise, the
recipient cannot rely on the RFC 4474 Identity assertion, and the
DTLS-SRTP call set up will fail or be marked as a call with an
unknown peer.
-Ekr
_______________________________________________
Sip mailing list https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip
_______________________________________________
Sip mailing list https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip