6 jul 2011 kl. 22.54 skrev Brez Borland:

> Okay, this all gets a little bit complicated and rather interesting. The 
> following is purely my own reasoning.
> 
> We should not forget that we are talking a TLS layer context here, _not_ TCP. 
> That is, the underlying TCP connection should not require a continuous 
> _established_ state. But rather the TCP connection that is utilised by the 
> TCP context could fail, be re-established, fail gain and so on.. And IMHO the 
> TLS connection should be considered as being valid, as long as after the 
> re-connection the remote site resumes with the valid TLS context. 
> 
> What I am trying to say, is that at the SIP layer, transactions are _not_ 
> invalidated if the TCP connection to the remote site goes down. SIP 
> transaction has it's own context, independent to TCP. So does the TLS.
> 
> So I can't see how TLS connection could be made invalid by anything else but 
> TLS layer. I mean, can somebody define when TLS connection is broken? Is it 
> timeout, or something else, cause looking at rfc5246 I can't find anything 
> related..
> 
> 
That's really interesting. Yes, the TCP layer is not interesting in a TLS 
session, all we care about is the TLS connection state. Now, I don't think TLS 
can survive a TCP breakdown, but that's something we'll propably have to look 
into. Anyone that can explain this?

/O

> Comments please,
> 
> 
> Regards,
> 
> Brez
> 
> On Wed, Jul 6, 2011 at 8:11 PM, Olle E. Johansson <o...@edvina.net> wrote:
> 
> 6 jul 2011 kl. 18.19 skrev Iñaki Baz Castillo:
> 
> > 2011/7/6 Olle E. Johansson <o...@edvina.net>:
> >> - A proxy (A) forwards a SIP request with a SIPS r-uri to another proxy 
> >> (B). The VIA header indicates SIPS and has a domain name. The proxy that 
> >> receives the request shows a server CERT, but doesn't require a client 
> >> certificate.
> >>
> >>  1) For the response - can we reuse the connection?
> >
> > Yes, always. Responses for request arrived via TCP/TLS/SCTP must reuse
> > the same connection if available.
> But SIP outbound says that this only applies when we have mutual TLS 
> identification - client and server certificate.
> 
> >
> >
> >>  2) If the connection is lost, does proxy B has to open a new TLS 
> >> connection back to A, validating A's certificate agains the via header?
> >
> > IMHO it must easier don't perform such exotic step in RFC 3261. This
> > is, if the response cannot be sent using the same connection, the
> > client (proxy A) should realize that the connection is closed and
> > should/could terminate current transaction and generate a new one.
> 
> Well, one of the benefits with stateless proxies and load balancing using SRV 
> is that you can in fact activate fail over even for responses. What you say 
> breaks this.
> 
> >
> > I've seen no implementation performing such fallback mechanism for SIP
> > responses (which usually never work due to common NAT scenarios and
> > so).
> We're talking proxy to proxy. The UA might be behind NAT, but in this 
> scenario I am assuming no NAT between the proxys.
> >
> >
> >>  3) for a request from the UA behind proxy B to the UA behind proxy A 
> >> (contacts use TLS, record-route use TLS), can we reuse the existing 
> >> connection that was used for the connection from proxy A to proxy B?
> >
> > Only if proxy A uses ";alias" parameter in Via header and proxy B
> > validated the TLS certificate given by proxy A during the request
> > sending.
> >
> RIGHT! Which means that you require client certificate when proxy A sets up 
> the connection to proxy B. We agree here.
> 
> /O
> 

---
* Olle E Johansson - o...@edvina.net
* Cell phone +46 70 593 68 51, Office +46 8 96 40 20, Sweden




_______________________________________________
Sip-implementors mailing list
Sip-implementors@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors

Reply via email to