On Jul 15, 2008, at 10:48 AM, Hadriel Kaplan wrote:



> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
> Cullen Jennings
>
> I asked some folks on this thread a few years ago for an example of a > real deployment where it would not be possible to use 4474 as long as > the SBC implemented 4474. I'm still waiting for an example of where it
> actually is broken.

If the From is an E.164, then you're right transit providers can re- sign it anew, changing the From domain to their own. There are several problems with this, though: a) It has a deployment problem; we'd need all intermediaries which change anything signed by 4474 to all support 4474 re-signing, for 4474 to be deployable. Otherwise the signature will constantly fail. If it constantly fails, no one will try to use it. If no one tries to use it, the intermediaries have no reason to implement re- signing. Ergo, Catch-22. b) It changes the From URI. Of course many intermediaries already do that for other reasons, but it's not like we should *require* them to do it if the only reason they would need to is to re-sign a message. c) We shouldn't *want* to force the intermediaries to re- sign. It just makes it hop-by-hop trust. Unless of course you believe the things being changed by the intermediaries are such that they MUST NOT be changed by intermediaries for the purposes of identity, because they are inherent to the meaning/value of "Identity". For some things I don't believe you or anyone really feel that - for example call-id and cseq. The questionable one would be SDP. d) Re-signing is expensive; it's both validating the received one, and signing it again. The transit provider business is about low cost. So they'll just delete the identity headers rather than resign, if they even do anything.


That's a good list. Someone should make sure to capture the above so that we can see how 4474 compares to any other solution that is capable of providing end to end secure assertion about who's phone a user is talking and collaborating with.

> Hadriel  hypothesized a type of situation where it
> could be broken. That was the case where service provider A passed
> call to B who passed call C and they were not using E.164 numbers but
> were using email style addresses and the one in the middle wanted to
> do media steering or restrict what codecs where allowed.

Well, to be fair the one in the middle could have any number of reasons for changing things which would break the signature. Call- id obfuscation, CSeq number re-writing due to various b2bua functions, changing SDP for transcoding or dtmf interworking, etc. You or your company knows all the reasons as well as I do. :)


Just to be clear, I'm aware of lots of situations where the service provider A and C might want to do the extra things you mention but I am not aware of real deployments where service provider B needs to do the things beyond media steering and codec restriction. I'm happy to be educated.


-hadriel

Cullen <in my individual roll>


_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to