On Nov 21, 2008, at 7:16 AM, Elwell, John wrote:

Well, you could argue that P-Asserted-Identity is btn security - you
simply have to trust the chain of SIP intermediaries without having
visibility of who exactly is in that chain. I am not convinced that
DERIVE, either in its current documented form or taking into account the
many helpful suggestions during the last couple of weeks, can really
claim to add very much.


So here's a scenario to play against. It's not exactly in the scope of DERIVE, although one might see DERIVE as a defense.

I crate a CA cert claiming to be for "elwell.org" and use it to sign a cert for "sip.elwell.org".

I then generate INVITE requests for everybody on the SIP mailing list, with RFC 4474 Identity headers signed by "sip.elwell.org" and send them off UDP. Not from a real SIP UP, but from a simple harassment program.

How many phones ring straight away? How many other people are going to look at the cert, presume you are a reasonable guy to be getting a signed request from and accept the call?

How do existing identity mechanisms protect against this? What other mechanisms might be operationally used to check it?

Remember, with BTN security, we're talking "things that keep basic script kiddies from being annoying", not "things that defeat somebody who can cache-poison DNS" (although there may be some script-kiddies doing that these days).

--
Dean


_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to