On 7/17/08 7:23 PM, Dean Willis wrote:

-------
I've been informed that despite what I incorrectly thought, transitive signing doesn't require any modification to RFC 4474.

The 4474 spec requires that the subject of the cert used to sign correspond to the domain of the From. This is different from requiring that the common names match. So any SBC can re-sign anything at any time and break nothing, at the expense of some crypto work.

So, let's say [EMAIL PROTECTED] calls [EMAIL PROTECTED] Nostrum's AS might sign Adam's INVITE. Cisco's SBC might verify the signature, munge the fields, mint itself a cert with a subject of "nostrum.com" (using its well-known Cisco CA key to sign that cert!) , and then sign the request (replacing the Nostrum signature) using the new cert. Then [EMAIL PROTECTED] would verify Cisco's signature, and transitive trust is created. Of course this doesn't say anything about why Michael should trust that signature, although in this simplest case the rationale is obvious. But for a 3rd service provider "in the middle", it is much less obvious.
------

I hastily typed "using its well known Nostrum CA key" instead of "using its well known Cisco CA key" in the last paragraph. I knew what I meant, I just typed the wrong word. Sorry.

This (as corrected) AFAIK cryptographically works. But it doesn't work any better than P-Asserted-Identity and TLS. It still lacks a reversible chain-of-trust that is visible to the end user.

I suppose the advantage is that, in the absence of an evil crypto-mangling SBC, you'd still get the benefit of end-to-end (or at least authentication server to verifier) RFC 4474, which MIGHT involve less transitive trust. But that doesn't seem too useful to me. I think it would be much better to just patch RFC 4474 to work through the SBC.


The key difference is that one merely requires an explanation of how things can be made to work; the other requires development of Another Way To Do The Same Thing, which (in protocols) is pretty much always a bad thing -- to be reasonably interoperable, implementations are forced to implement both (or all of) the defined mechanisms.

/a
_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to