On Mar 30, 2009, at 1:00 AM, Hadriel Kaplan wrote:



-----Original Message-----
From: [email protected] [mailto:[email protected]] On Behalf Of Dean
Willis
Sent: Monday, March 30, 2009 12:09 AM

The MAIN reason, it seems to me, to want to change the SDP (and
especially the key fingerprint) undetectably is to enable intercept
(lawful or otherwise) without detectability. That just won't do.

No, that's not at all the main reason. RFC4474 is already not end- to-end. It's signed by a middlebox in the originating domain, and verified by a middlebox in the terminating domain. There is ample opportunity to change the SDP at either of those domains to perform lawful intercept.

RFC 4474 can be used end to end. It all depends on which cert is used to sign the identity, where that signing occurs, and where it gets checked. For stupid legacy phones, it can be signed and checked at middleboxes operating under some level of transitive trust. For smarter devices, it happens in the endpoint.

Signing and checking at the endpoint, coupled with the DTLS fingerprint check. enables end-to-end verification of media integrity and privacy. Once you start ripping these signatures out in the middle of the network and replacing them, we have lost this absolutely critical property. If transit providers even think it MIGHT be reasonable to rip out the signatures, then we have lost the key functionality. Removing signatures MUST BE FORBIDDEN. Adding new ones might be ok.

I might be willing to compromise on the mechanism (I've already proposed several potential approaches to doing so), but I'm unwilling to compromise on the fundamental requirement for this end-to-end applicability.

--
Dean
_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [email protected] for questions on current sip
Use [email protected] for new developments on the application of sip

Reply via email to