You're right it is inconvenience,
However in e-mail applications for example it is not considered to be 
inconvenient,
The public keys can be retrieved and stored in the address book in the
same way as
secure email software does...

Thanks
Vadim

Paul Kyzivat wrote:
> A significant limitation in what you propose is that it requires Bob
> to have a public key that Alice knows. In general we don't find that
> to be the case in most telephony applications.
>
>     Thanks,
>     Paul
>
> Vadim Lebedev wrote:
>> I see,
>> Well this particular attack could be prevented by adding a timestamp
>> +  key validity period into the encrypted material...
>> This is still much cheaper than using SSL in signalling path.
>> Actually the current approach (SSL in signalling path and rtp key in 
>> clear in SDP) seems to be weaker in case of compromised server - the 
>> bad guy will be able to actually HEAR,SEE and FAKE
>> rtp streams.
>>
>>
>> Anyway thanks a lot for the feedback
>>
>> Vadim
>> Le 2 juin 09 à 18:55, Alexander Krassiev a écrit :
>>
>>> Man in a middle. Encrypted key can be stored and re-used by
>>> man-in-a- middle to forge future conversations (to garble the
>>> stream). Further  enhancing your suggestion will bring us close to
>>> SSL/TLS I am afraid.
>>>
>>> On Jun 2, 2009, at 8:27 AM, Vadim Lebedev wrote:
>>>
>>>> Vadim Lebedev wrote:
>>>>
>>>> Any thoughts on this issue?
>>>> I've just realised that this approach will make lawful interception
>>>> REALLY complicated... Maybe this
>>>> is the reason there is no an RFC covering it?  Or am i missing 
>>>> something?
>>>>
>>>> Thanks
>>>> Vadim
>>>>
>>>>> Hello,
>>>>>
>>>>> I've been reading various RFC describing  tranmission of master key
>>>>> for SRTP unside SDP's.
>>>>> They require (like in rfc4568) the INVITE/200/ACK be transmitted 
>>>>> using
>>>>> TLS to avoid key interception.
>>>>>
>>>>> I wonder why nobody proped following scheme:
>>>>>
>>>>> Alice generates a mester key, encrypts it wih Bob's public key and
>>>>> signs it with her own private key.
>>>>> The resulting material is stored in SDP which can be transmitted  
>>>>> ove
>>>>> unsecure connection...
>>>>> Bob receives the INVITE request extract the signed keye authenicate
>>>>> the Alice signature and decodes the master key using his onw private
>>>>> key....
>>>>>
>>>>>
>>>>>
>>>>> Thanks
>>>>> Vadim
>>>>>
>>>>> _______________________________________________
>>>>> Sip-implementors mailing list
>>>>> Sip-implementors@lists.cs.columbia.edu
>>>>> https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors
>>>>>
>>>>>
>>>>>
>>>> _______________________________________________
>>>> Sip-implementors mailing list
>>>> Sip-implementors@lists.cs.columbia.edu
>>>> https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors
>>
>>
>> _______________________________________________
>> Sip-implementors mailing list
>> Sip-implementors@lists.cs.columbia.edu
>> https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors
>>
>
>


_______________________________________________
Sip-implementors mailing list
Sip-implementors@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors

Reply via email to