Eric Rescorla wrote:
At Tue, 24 Jun 2008 12:48:20 -0700,
Eric Rescorla wrote:

Dean,

This sounds like an excellent way to proceed. I'll generate some candidate text
and send it to the list in the next few days.

As promised, here's my proposed text:

   Because DTLS-SRTP uses RFC 4474 to bind the media keying material to
   the SIP signalling, the assurances about the provenance and security
   of the media are only as good as those for the signalling.  There are
   two important cases to note here:

   o  RFC 4474 assumes that the proxy with the certificate "example.com"
      controls the namespace "example.com".  Therefore the RFC 4474
      authentication service which is authoritative for a given
      namespace can control which user is assigned each name.  Thus, the
      authentication service can take an address formerly assigned to
      Alice and transfer it to Bob. This is an intentional design
      feature of RFC 4474 and a direct consequence of the SIP namespace
      architecture.
   o  When phone number URIs (e.g.,
      'sip:[EMAIL PROTECTED]') are used, there is no
      structural reason to trust that the domain name is authoritative
      for a given phone number, although individual proxies and UAs may
      have private arrangements that allow them to trust other domains.
      This is a structural issue in that PSTN elements are trusted to
      assert their phone number correctly and that there is no real
      concept of a given entity being authoritative for some number
      space.

   In both of these cases, the assurances of DTLS-SRTP provides in
   terms of data origin integrity and confidentiality are necessarily
   no better than SIP provides for signalling integrity when RFC 4474
   is used. Implementors should therefore take care not to indicate
   misleading peer identity information in the user interface.
   e.g. If the peer's identity is
   sip:[EMAIL PROTECTED], it is not sufficient to
   display that the identity of the peer is +17005551008. In cases
   where the UA can determine that the peer identity is clearly an
   E.164 number, it may be less confusing to simply identify the call
   as encrypted but to an unknown peer.

While I understand the logic above, it isn't very satisfying.
People are constructing sip based phone systems that must compete with traditional phone systems. If the sip based system shows no identity when a traditional system can display the identity of the same caller, then the sip system will be perceived and broken and non-competitive.

There will of course then be a temptation to do whatever is necessary to make the product competitive.

And displaying the full URL is often not a good alternative. At best it will be perceived as "geeky" and incomprehensible by grandma.

        Thanks,
        Paul

   In addition, some middleboxes (B2BUAs and Session Border
   Controllers) are known to modify portions of the SIP message which
   are included in the RFC 4474 signature computation, thus breaking
   the signature.  This sort of man-in-the-middle operation is
   precisely the sort of message modification that 4474 is intended to
   detect.  In cases where the middlebox is itself permitted to
   generate valid RFC 4474 signatures (e.g., it is within the same
   administrative domain as the RFC 4474 authentication service), then
   it may generate a new signature on the modified
   message. Alternately, the middlebox may be able to sign with some
   other identity that it is permitted to assert. Otherwise, the
   recipient cannot rely on the RFC 4474 Identity assertion, and the
   DTLS-SRTP call set up will fail or be marked as a call with an
   unknown peer.

-Ekr

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to