I don't think I'm describing any novel attack here, and really I am trying
to speak more to higher-level requirements than the properties of any
specific proposal, but I'd like to understand what our disconnect is. I'm
talking about an attack that is purely in the signaling layer, so I'm not
sure in what sense Alice has a private key applicable to that layer (unless
she is acting as her own authentication service, say). "This is Alice again"
here means that, for example, the re-INVITE is a clever cut-and-paste attack
that appears to have a valid signature to verifier. The decision about where
media is sent is always something negotiated in the rendezvous layer; if the
rendezvous layer is persuaded to send media somewhere unhelpful, no amount
of media layer security will prevent this disruption.

The only thing this attack is meant to illustrate is why it does matter who
sets the IP/port. I've gathered that some people in the discussion reject
the notion that there are any threats related to the setting the IP/port in
the signaling layer, so I'm trying to provide an example.

Jon Peterson
NeuStar, Inc.


On 4/13/09 10:38 AM, "Dan Wing" <dw...@cisco.com> wrote:

> The 'Alice again' attacker would need to prove Alice's identity which
> the attacker cannot accomplish (unless the attacker knows Alice's
> private key).  This is true of RFC4474 and
> draft-fischer-sip-e2e-sec-media and draft-wing-sip-identity-media.
> All three of those require the attacker to sign SIP headers and,
> in the case of the two I-D's, the attacker has to also perform
> a handshake proving possession of Alice's private key.
> 
> I don't see the new attack that you are seeing.
> 
> -d

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use sip-implement...@cs.columbia.edu for questions on current sip
Use sipp...@ietf.org for new developments on the application of sip

Reply via email to