> > -----Original Message-----
> > From: Dean Willis [mailto:dean.wil...@softarmor.com]
> > Sent: Thursday, April 02, 2009 11:55 PM
> > 
> > Well we certainly can't expect transcoding to be compatible with e2e
> > crypto.
> 
> Nope, and why I do not include that function as being 
> compatible with it.  I do think some form of signaling 
> caller-id may be useful in that case, but clearly media 
> identity is not possible short of speaking in pig-latin.

It is true that we cannot provide edge-to-edge *authenticated* media
through a transcoder when that transcoder is operated by someone other
than an edge.  That is because e2e authenticated media is keyed with
DTLS-SRTP, which we would only trust edge-to-edge.

But we can provide __identity__ over the media path, even with transcoding.

Identity across a transcoder only requires the transcoding function allows the
identity through.  AS AN EXAMPLE, if we used the ICE technique in
http://tools.ietf.org/html/draft-wing-sip-identity-media-02#section-4.3, the
transcoder could permit the ICE messages to pass, unmolested and unmodified,
across the transcoder.  The transcoder would perform its normal transcoding
function with the RTP packets.  I am saying "as an example" because we may not
want to use ICE for this purpose; I have other ideas for how this might be
done which may be more appealing.  

-d

> > So are there any legitimate use cases for requiring that 
> > the protocol supports MITM rewriting of SDP?
> 
> We already gave you some.  But really the question can just 
> be flipped around: is there a security property of the SDP's 
> IP/port that you feel is important to protect, such that we 
> can't allow it to be changed?  Do you feel an IP:port is an 
> identity, or is somehow actually a secure indicator of 
> anything? 
>
> I mean there's plenty of other important things in 
> SIP we're not protecting with 4474 - maybe we should just 
> sign the entire SIP message, just in case.  But we don't, 
> because we know it wouldn't work in the real world, and 
> because most of them have little security value to protect.
> 
> SDP is not "the user content", as a mime text attachment in a 
> SIP MESSAGE or email would be.  It is not "the prized 
> possession" from the user.  In particular the indicated 
> IP:port to send IP packets to/from is not.  The IP is not an 
> application nor user identity; and it is spoofable, 
> interceptable, reputable, etc.  You yourself have argued 
> about SIP's dependence on the IP:port in SDP being an 
> architectural shortcoming, and here we are trying to make 
> sure it's cryptographically dependent!  IPsec learned this 
> the hard way when it had to encapsulate itself in UDP due to 
> the pseudoheader and NATs, SIP learned it due to NAT's, a 
> whole host of things may learn it in the v4/v6 transition if 
> it happens (oh, did we mention that as another SDP re-writing 
> case?).  
>  
> > Perhaps is lots of calls started failing because they 
> > endpoints detect
> > that a MITM attack on their signaling/media has occurred, and did so
> > in a way that makes that failure evident to the MITM, then we'd see
> > fewer MITMs making that mistake.
> 
> If calls started failing because of 4474, I'm fairly sure it 
> would be 4474 that would be turned off, not the SDP 
> re-writers.  Because they're not an MITM attack on users or 
> calls - it's a MITM attack on the IETF's principles.  But 
> then again, there's no need to turn 4474 off - it can just be 
> removed by a MITM. 
> 
> -hadriel

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use sip-implement...@cs.columbia.edu for questions on current sip
Use sipp...@ietf.org for new developments on the application of sip

Reply via email to