On Aug 14, 2007, at 12:02 AM, Cullen Jennings wrote:


I will note that we do have security mechanism to provide confidentially over the bodies (but not headers) for attacks from proxies we do not have a trust relationship with - and this is one of the aspects used in determining if certain semantics might be better in a body or header.

Cullen <with my individual hat on>

PS - I fail to see how sipsec will help with the basic problem of if Alice sends a call to a proxy and the proxy routes the call to some evil user instead of sending it to Bob.

Since the TLS connection of sipsec is established UA to UA, the evildoer in your example would have to have Bob's cert (aka "private key"). If the evildoer does not have Bob's cert, Alice will be able to tell that the evildoer is not Bob.

Of course, this requires a workable public key infrastructure. But then we think we're getting one of those from draft-ietf-sip-certs, so maybe this is doable after all.

--
Dean


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to