Hi Theo,

Am 20.02.2009 5:20 Uhr, schrieb Theo Zourzouvillys:
I've just submitted an ID that discusses the inherent UDP "problem",
along with a potential workaround to stop it being used maliciously.

I would really welcome any feedback:

   http://www.ietf.org/internet-drafts/draft-zourzouvillys-sip-via-cookie-00.txt

in general I like your proposal, but I have a few questions/thoughts:

I think the whole "attack scenario" which is described in the draft works only if the attacker uses the proxy/registrar of the victim as a relay. Reason 1): because the attacker hopefully does not know which UDP port of the victim is currently "open" to accept incoming UDP packets. And if their is a NAT or firewall in between the UA it will hopefully only accept UDP packets from the proxy/registrar. If the UA of the victim runs on a public IP without any "protection" it might accept SIP requests from anywhere, although I would call this a very bad UA implementation. Reason 2): when the UA of the victim registeres itself it provides a Contact URI. I general I believe UA should only accept incoming requests from their registrar IP and port which contains the Contact URI which they provided at the registration. This prevents very easily that someone sends drive by requests just with the AOR of the victim as R-URI to the UA of the victim. If a registrar forwards requests to registered UAs with the AOR of the user in the R-URI the registrar is broken in my opinion.

Now the question is of the proxy/registrar accepts requests from its users from anywhere. I guess that is what you mean with no authentication, right?

One bigger concern for the whole approach is: if the attacker knows about this cookie extension he will for sure not put an empty cookie in the Via header of the request. But how does the proxy of the victim handle requests without the cookie extension? To be backward compatible it would need to accept requests without the extension, but then the door is open for the attacker again. If the proxy of the victim does not care about backward compatibility (maybe because attack previntion is more important), wouldn't the need a way to tell the sender of the request that the cookie extension is required to successfully relay requests? So wouldn't we need a new value for the Required header, or would a new 4XX response already be enough.

As I said I like the general idea. But I believe that the attack scenario which you describe in your draft should be a little bit more narrow then described.

Best regards
  Nils Ohlmeier
_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [email protected] for questions on current sip
Use [email protected] for new developments on the application of sip

Reply via email to