I agree.
 
I think the issue Jon is pointing out is that one could interrupt the media 
stream.


________________________________

        From: [email protected] [mailto:[email protected]] On Behalf Of 
Anthony D Pike
        Sent: Monday, April 13, 2009 06:16
        To: Audet, Francois (SC100:3055)
        Cc: Cullen Jennings; Jon Peterson; [email protected]; DRAGE, Keith (Keith); 
Dean Willis
        Subject: Re: [Sip] francois' comments and why RFC4474 not used in the 
field
        
        
        hi Francios,

        Surely if you correlate the signallng with the initial media stream 
from the endpoint as Jonathan mentioned in his original email a couple of weeks 
ago then you will know that that there has been a problem and you would not 
pick up the call and you might report the call to the appropriate authorities 
who could then trace the call potentailly.

        Quite how this correlation takes place is not 100% clear to me as yet, 
but I'm thinking on it.
        

        Tony  
        
        This is a PRIVATE message. If you are not the intended recipient, 
please delete without copying and kindly advise us by e-mail of the mistake in 
delivery. 
        NOTE: Regardless of content, this e-mail shall not operate to bind CSC 
to any order or other contract unless pursuant to explicit written agreement or 
government initiative expressly permitting the use of e-mail for such purpose. 
• 


        [email protected] wrote: -----
        
        

                To: "Jon Peterson" <[email protected]>, "Elwell, John" 
<[email protected]>, "Dean Willis" <[email protected]>
                From: "Francois Audet" <[email protected]>
                Sent by: [email protected]
                Date: 04/10/2009 04:43PM
                cc: Cullen Jennings <[email protected]>, [email protected], "DRAGE, 
Keith \(Keith\)" <[email protected]>
                Subject: Re: [Sip] francois' comments and why RFC4474 not used 
in the field
                
                Right, the signalling gets impersonated, but not the media.
                
                So the only practical thing that can be done by the attacker
                is interup media. 
                
                > -----Original Message-----
                > From: Jon Peterson [mailto:[email protected]] 
                > Sent: Friday, April 10, 2009 12:28
                > To: Audet, Francois (SC100:3055); Elwell, John; Dean Willis
                > Cc: Cullen Jennings; [email protected]; DRAGE,Keith (Keith)
                > Subject: Re: [Sip] francois' comments and why RFC4474 not 
                > used in the field
                > 
                > If I may quibble here:
                > 
                > > The attack is not impersonation, it's interruption of media.
                > 
                > The attack relies on impersonation to accomplish interruption 
                > of media. The attacker listens to Alice's INVITE, and then 
                > sends a cut-and-pasted re-INVITE saying "This is Alice again, 
                > would you mind sending my media here instead please." 
                > Impersonation is almost always a tool that attackers use to 
                > accomplish some particular goal, even if it's just tricking 
                > you into accepting unwanted communications. I'm not sure I'd 
                > say impersonation is an attack as such, but by preventing it, 
                > we prevent whole categories of attacks and grant ourselves 
                > more powers in crafting authorization policies.
                _______________________________________________
                Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
                This list is for NEW development of the core SIP Protocol
                Use [email protected] for questions on current 
sip
                Use [email protected] for new developments on the application of 
sip
                


_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [email protected] for questions on current sip
Use [email protected] for new developments on the application of sip

Reply via email to