Keith,

Thanks for resurfacing this, it has been a while! To refresh the group's
memory the origin of the I-D was the need to allow a UA to mutually
authenticate with proxies other than the next-hop
(UA<->Proxies<->Proxy). For authenticating with the next-hop proxy, TLS
should be used (as acknowledged in the I-D). The earlier versions (-01
and -02) raised more questions than answers! With -03 there seemed to be
a few interested people within this WG (and outside) who saw value in
this I-D (e.g., Scott Lawrence, Milan Patel, Christer Holmberg, Martin
Dolly, Francois Audet; see emails from around July '08). It would be
nice to get their feedback once again on the need (or not) for this
requirement (independent of the I-D). If we still see a need for this
requirement, I would solicit suggestions to revise the I-D to clearly
articulate the requirement and the potential solution(s).

Additionally, I had offline discussions (in Ireland) with one of the ADs
(Cullen) who saw value in (or at least did not dismiss) this I-D; unless
I misunderstood the conversation. We left the conversation with a plan
to discuss further with the security adviser. Did we miss any further
communication (from the ADs)?

Ekr, 

Thanks for your response. To clarify, perhaps the I-D is not the answer
to the requirement we are trying to solve, in which case we need to look
at other alternatives (or surface other I-Ds). I (personally) would not
like the I-D to be the holdup for us to solve the need (stated above).

I have a few follow-up responses to your comments. When you say
"cryptographic authentication followed by clear text messaging", I am
hoping that you are not dismissing subsequent challenges. For example,
if there is a UA request which is deemed sensitive, the proxy should
challenge it. To ensure that an 'impersonator' cannot get away without a
challenge, the UA can be configured to discontinue further messaging in
the absence of a challenge (this is because we don't have a mechanism
for the UA to challenge the proxy, unless I am mistaken). This may not
prevent a passive attack, but would it not thwart an active attack? If
not, given the limited integrity protection offered by the header,
should we extend the requirements to provide better integrity
protection? Is that an option?

In response to your second point about the non-applicability of secure
signaling, the I-D allows for the UA to mutually authenticate with
multiple non-next-hop proxies, each of which can share unique
credentials with the UA. This model works even in the presence of TLS.
Why is this not applicable, or am I missing the point (sorry, it has
been a while since we discussed this issue)? 

Thanks!

- S

-----Original Message-----
From: DRAGE, Keith (Keith) [mailto:[EMAIL PROTECTED] 
Sent: Sunday, November 16, 2008 1:07 PM
To: sip@ietf.org
Cc: Eric Rescorla; Sumanth Channabasappa
Subject: draft-dotson-sip-mutual-auth

(As WG chair)

A long while back there was some interest in getting this chartered as a
SIP WG item.

We have been having a long and delayed thread external to the list on
this which may be summarised as:

-       the AD wants evidence of a clear use case

-       the security adviser to the SIP WG not seeing that there is a
use case.

-       the authors having so far failed to convince either.

I attach the two key mails that relate to the technical discussion and
you can scroll down and see the rest of the thread.

I invite other members of the SIP WG to add further input to this
discussion.

regards

Keith
_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to