Theo,

Thanks for writing this up.

A few comments.

Firstly, it seems that the easiest solution is just 'use tcp'. This is one of many reasons (and growing) why we need to be pushing implementations to tcp.

Secondly, if you want to do this for UDP, you could instead use anonymous authentication. Then, the existing nonce takes on the role of a cookie. I suspect that anonymous authentication is not widely implemented, but neither is a new protocol. That said, I think the right answer still is 'use tcp'.

Finally, the media portion of this attack, as you point out, is far more disruptive. That attack does not require spoofing even; just listing the IP address/port of the target in the SDP of the INVITE. We were calling this the 'voice hammer' attack, originally documented here:

http://tools.ietf.org/html/draft-rosenberg-mmusic-rtp-denialofservice-00

and described in Section 18.5.1 of ICE. The via cookie mechanism you propose, SIP-over-TCP, or anonymous authentication, none of them fix this attack. AFAIK, ICE is the only remedy.

-Jonathan R.



--
Jonathan D. Rosenberg, Ph.D.                   111 Wood Avenue South
Cisco Fellow                                   Iselin, NJ 08830
Cisco, Voice Technology Group
[email protected]
http://www.jdrosen.net                         PHONE: (408) 902-3084
http://www.cisco.com
_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [email protected] for questions on current sip
Use [email protected] for new developments on the application of sip

Reply via email to