inline:

Hadriel Kaplan wrote:

-----Original Message----- From: Elwell, John
[mailto:[EMAIL PROTECTED]

This is an interesting draft, but I am not sure to what extent it addresses the e2e identity issues discussed in draft-elwell-sip-e2e-identity-important, even though that draft is referenced in section 1.1 of your draft. If a request or response
passes through two or more trust domains, the UA will receive only
the assertion from the nearest trust domain. Also the P-Original-To
header field will not necessarily contain the original To value.

PASS is intended to only address such issues in specific deployment
scenarios, just as PAI is.  I don't think I said PASS was end-to-end
in all scenarios - just for a given trust-domain, and yes the scope
of PAI and PASS is tied.  The main scenario for its use would be one
of a single trust-domain, including one where there are stub
nodes/domains attached to that trust-domain but are not technically
in it, and are not transits themselves.

If you are accepting the notion of trust domain defined in 3324 and used by 3325, then I think PASS doesn't provide any additional value. If we do indeed all mutually trust each other, then why do I need to cryptographically verify the asserter?

I would argue that your draft is really trying to make PAI work in a different type of 'trust domain' - one in which there are some folks that I trust a lot less. So if I have:

stub1 - SP1 - SP2 - stub2

with stub1 and stub2 being enterprises which insert their own PAI, your draft would allow stub2 to determine that it was indeed stub1 who inserted the PAI, and stub2 can utilize reputation systems or whitelists/blacklists to deal with ones that misbehave.

Indeed, I'd go so far as to say that, your draft is trying to add cryptographic assertions to PAI so that it has some possibility of being used on the Internet and in topologies that don't fit the trust domain definition of RFC3324/5, and in that sense it really is an alternative to RFC4474.

What I think is missing from your draft is a clear discussion of what attacks are possible in RFC3325 which are now prevented here. Barring a reputation system or whitelist of asserters, I wasn't clear there were any. Would you agree?

Thanks,
Jonathan R.



--
Jonathan D. Rosenberg, Ph.D.                   499 Thornall St.
Cisco Fellow                                   Edison, NJ 08837
Cisco, Voice Technology Group
[EMAIL PROTECTED]
http://www.jdrosen.net                         PHONE: (408) 902-3084
http://www.cisco.com

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to