On Nov 8, 2007, at 3:41 AM, Elwell, John wrote:

Dean,

Yes, I tend to agree that key disclosure to an authority on all calls
passing through a domain with LI capability might be the way to go, but
even then I see problems.


No doubt.

A UA has home domain A that is not required to do LI (an enterprise,
say). On a call by call basis, the UA does not know whether the call
will be routed (directly or indirectly) to a particular domain B that
does LI (a carrier, say), so how does the UA find out that it needs to
report its key to carrier B (or C or D....)?

The domain would have to get (and submit) the key for every call sent out through a regulated carrier.

I believe it's OK for a user to know whether a given call is being routed over a private network/Internet or is going through a regulated carrier, and therefore to know that any call being sent over the regulated carrier may be subject to LI.

Also, by doing this, any notion of end-to-end security has gone out of
the window. If the key is disclosed to a third party, can the call
really be used for sending banking details etc.? Surely the business
world needs end-to-end security (or at least end-domain-to-end-domain
security), as we have with HTTPS?

Banks take calls over the PSTN every day with less assurance of integrity and privacy. The proposed approach provides much better security -- with "how much better" being limited by the scope of the key distribution. Optionally, one could propose the use of public-key or identity based crypto to further defend the session key, for example only sending it after encrypting it with the public key of the intended recipient.

Many financial and legal operations record every call, and therefore need a recorder that is either "in the session with a key" or on a second session that gets a twinning of the media. Some courts might argue that the second-session recording is inadmissible because it might have been undetectably altered (it wasn't exactly the same packets as received by the other end), so there are business legal reasons to have the recorder in the main media path. Eventually we're going to have media-level non-repudiation issues, so if you're looking for a Ph. D. project, that would be a good place to look.

I'm sure the auditing organizations will require record keeping on where the key goes and which systems have access to it, just as they are beginning to require around all credit-card transactions.

Sure, I want my calls to be as secure as possible. But there are operational environments where end-to-end crypto just isn't going to work.

We're at a decision point here -- do we follow RFC 1984 to the fullest extent and design a secure protocol that will have limited applicability, or do we design a protocol with broader applicability that has explicitly negotiated key sharing?

--
Dean


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to