2011/7/7 Olle E. Johansson <o...@edvina.net>:
>>> But SIP outbound says that this only applies when we have mutual TLS 
>>> identification - client and server certificate.
>>
>> Correct me if I'm wrong, but I don't think that SIP outbound requires
>> each UA/client to have an own certificate.

> We're still talking proxy2proxy here.
> The idea with SIP outbound is that the client manages the connection, so if 
> it goes down, the client reopens. That means, as you say, that the client 
> doesn't have to have a cert.

But you were speaking about "SIP outbound", right? :)



>> Yes, I know. I just think that "failover in responses" is a too much
>> exotic stuf. Never seen that working, never. Also, in any other
>> internet protocol there is no "failover for responses".

> Not many protocols have such a long time between request and response as SIP 
> has in the INVITE transaction.

Good point. However, have you ever seen SIP response failover working
in any implementation? not me :(









>> However, client/server certification validation could occur in any
>> case. A proxy B could be configured to require and validate
>> certificate from proxy A. This becomes funny when:
>>
>> - Proxy A connects TLS to proxy B.
>> - Proxy A validates certificate of proxy B.
>> - Proxy A sends its certificate to proxy B.
>> - Proxy B verifies certificate of proxy A (but take into account that
>> there is no SIP request yet, so can only verify cert expiration,
>> signature and so).
>> - After validation, proxy A sends a request with From (or PAI, or ...)
>> a specific domain xxx.org.
>> - Proxy B now must *authorize* such request (it would inspect the cert
>> of proxy A and lockup for xxx.org domain within it).
>> - If so, the request is authorized. If not => 403? (but the TLS
>> connection remains open, I hope).
>> - Later proxy A could send another request with a different originator
>> domain (in From) to proxy B.
>> - Authorization in proxy B should be performed for *each* received request.
>>
>> So, initially there is cert validation (signature, expiration,
>> revocation...). Later, for each SIP request there must be
>> authorization (based on request originator domain and domains included
>> within the validated certificated).
>>
>>
>> I suppose XMPP works in this way when using federation between
>> different domains.


> Yes, it becomes complicated. I don't really know, have to re-read RFCs, how a 
> SIP server requests a client cert.

All I said above is what I understood by reading RFC 5922 (which
updates RFC 3261).


> Let's continue the research!
> THis is a very good discussion.

When I get a sips/TLS inter-domain communication, I can die in peace :)



-- 
Iñaki Baz Castillo
<i...@aliax.net>

_______________________________________________
Sip-implementors mailing list
Sip-implementors@lists.cs.columbia.edu
https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors

Reply via email to