Am 07.03.2009 20:18 Uhr, schrieb Hadriel Kaplan:
So a requirement to make the attack possible is that the user agent
responds
to challenges generated for in-dialog requests.

Right, and that the attacked domain accepts INVITEs from its AoR's with 
non-registered Contacts; or accepts INVITEs from its static AoR's to come in 
from unknown locations.  That's pretty rare in my world, but ymmv.

Luckily it seems we are not living in the same world :-)
I call it a feature that I can make authenticated calls without being registered.

[...]

- I never unterstood why a proxy should pass through the authentication
request from a foreign domain.
Because this is how it is specified in section 22.3 of RFC3261.

And it would have to continue to do so.  There are actual use-cases for this.

Could you please share one of these use-cases with me.

I think there's even a reasonable use-case for challenging in-dialog requests: 
connected-identity, for example.

But you don't even need to challenge in-dialog requests for this form of 
attack: if the victim calls you, then you can challenge the initial INVITE.

Sorry, but how is this going to work in world without a SBC which knows my credentials? Remember my proxy can not answer the challenge (CSeq mis-match). And the caller hopefully does not know my credentials, otherwise the whole attack would be pointless.

Cheers
  Nils
_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [email protected] for questions on current sip
Use [email protected] for new developments on the application of sip

Reply via email to