> > 4. I don't actually think there's any protocol engineering required
> >    here. The problem of how to arrange for TLS traffic key 
> disclosure
> >    to third parties without modifying the wire protocol has 
> been quite
> >    extensively studied and a broad variety of approaches exist,
> >    covering a range of levels of active/passiveness, real-timeness,
> >    cooperation from the endpoints, etc. Techniques exist which are
> >    significantly better than those indicated by Dan. For instance,
> >    consider that if you have the TLS server's private key and you're
> >    doing RSA, you can do completely passive inspection with no
> >    cooperation from either side.
> 
> I am aware of that technique; however, for SIP calls with the 
> offer in the in the Invite, you could only intercept outgoing 
> calls, because incoming calls cause your intercept target to 
> be the TLS client.  I don't believe that technique is viable 
> to meet R24.
> 
> > Another example would be [GBGP03]. 
> 
> I was not aware of that technique; thanks for the pointer.  
> That technique seems useful.
> 
> (Direct link,
> http://crypto.stanford.edu/~pgolle/papers/escrow.pdf)

This is an interesting paper, but doesn't it require also some form of
cooperating client (as required in draft-wing-sipping-srtp-key) as it
would be necessary to exchange at least one of the SSL libs of the
clients?

Ciao
        Steffen

> 
> >    Also, as Jon Peterson observed, the owner of the namespace can
> >    always enforce any restrictions that it wants. It's possible that
> >    imposes significant performance costs, but it's not clear that
> >    that's true in all cases with clever implementation. 
> > 
> >    I don't really have time right now to go into any of this stuff
> >    in more detail, but I'd certainly be happy to sit down with
> >    anyone who cares in YVR and explain the state of the art.
> 
> Thanks for the offer.
> 
> > I don't
> >    really see that this is really relevant to what happens in this
> >    WG, though.
> 
> If 3GPP decides to use something other than DTLS-SRTP, we 
> will have two standards for SRTP keying -- the IETF standard 
> and the non-IETF standard.  I do not consider that desirable.
> 
> -d
> 
> 
> > -Ekr
> > 
> > 
> > [GBGP03] E.-J. Goh, D. Boneh, P. Golle, B. Pinkas",
> >      The Design and Implementation of Protocol-Based Hidden
> >      Key Recovery", 2003.
> 
> 
> _______________________________________________
> Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
> This list is for NEW development of the core SIP Protocol Use 
> [EMAIL PROTECTED] for questions on current sip 
> Use [EMAIL PROTECTED] for new developments on the application of sip
> 


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to