On Mar 30, 2009, at 1:00 AM, Hadriel Kaplan wrote:
-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf
Of Dean
Willis
Sent: Monday, March 30, 2009 12:09 AM
The MAIN reason, it seems to me, to want to change the SDP (and
especially the key fingerprint) undetectably is to enable intercept
(lawful or otherwise) without detectability. That just won't do.
No, that's not at all the main reason. RFC4474 is already not end-
to-end. It's signed by a middlebox in the originating domain, and
verified by a middlebox in the terminating domain. There is ample
opportunity to change the SDP at either of those domains to perform
lawful intercept.
RFC 4474 can be used end to end. It all depends on which cert is used
to sign the identity, where that signing occurs, and where it gets
checked. For stupid legacy phones, it can be signed and checked at
middleboxes operating under some level of transitive trust. For
smarter devices, it happens in the endpoint.
Signing and checking at the endpoint, coupled with the DTLS
fingerprint check. enables end-to-end verification of media integrity
and privacy. Once you start ripping these signatures out in the middle
of the network and replacing them, we have lost this absolutely
critical property. If transit providers even think it MIGHT be
reasonable to rip out the signatures, then we have lost the key
functionality. Removing signatures MUST BE FORBIDDEN. Adding new ones
might be ok.
I might be willing to compromise on the mechanism (I've already
proposed several potential approaches to doing so), but I'm unwilling
to compromise on the fundamental requirement for this end-to-end
applicability.
--
Dean
_______________________________________________
Sip mailing list https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [email protected] for questions on current sip
Use [email protected] for new developments on the application of sip