response identity in session initiation protocol
play

Response Identity in Session Initiation Protocol - PowerPoint PPT Presentation

Response Identity in Session Initiation Protocol draft-cao-sip-response-identity-00 Feng Cao Cullen Jennings 1 Agenda Introduction Scope Requirements SIP Response Identity Overview Open Issues Summary 2


  1. Response Identity in Session Initiation Protocol draft-cao-sip-response-identity-00 Feng Cao Cullen Jennings 1

  2. Agenda θ Introduction ϖ Scope ϖ Requirements θ SIP Response Identity ϖ Overview ϖ Open Issues θ Summary 2

  3. Introduction: Scope θ Why response identity ? ϖ Cannot rely on the existing header fields, such as “To:”, “Reply-to:” and “Contact:”, in all the scenarios ϖ Need response identity as early as possible ♣ Provide response identity in non-dialog session ♣ Provide proxy’s identity for confirming certain response codes ♣ Prevent response identity spoofing as early as possible θ Scope of this response identity draft ϖ Provide response identity inside response message with the security mechanism for verifying the integrity of response identity. 3

  4. Introduction: Requirement θ The mechanism must be backward compatible θ The identity must be clearly specified in the header by the responder (or its proxy) θ The identities of both UAs and proxies must be covered θ The integrity of SIP response must be partially covered along with the responder’s identity θ The enforcement of providing response identity must be provided through the originator’s request. θ Open question: Anonymity of response identity? 4

  5. Enforcement of Response Identity θ UAC (or its proxy) should be able to ask for response identity ϖ Required: responder-id ϖ Open question: can any intermediate proxy ask for it? θ Responder (UAS or proxy) should be able to decline to disclose the response identity ϖ Warning: 380 Response Identity Cannot be Revealed ϖ Open question: the exact behavior and the consequence? 5

  6. DAS-based Approach proxy-1@source.com proxy-2@destination.com alice@source.com bob@destination.com INVITE bob 180 Ringing Responder: claimer=bob@destination.com; verify-method=DAS; Responder-Info: https://www.destination.com/certs; algo=rsa-sha1 Identify: akfjiqiowrgnavnvnnfa2o3fafanfkfjakfjalkf203urjafskjfaf Jprqiyupirequqpiruskfka Note : Domain-based Authentication Service (DAS) 6

  7. AIB-based Approach proxy-1@source.com proxy-2@destination.com alice@source.com bob@destination.com INVITE bob 180 Ringing Responder: claimer=bob@destination.com; verify-method=AIB; Responder-Info: https://www.destination.com/certs; algo=rsa-sha1 7

  8. Open Questions θ Is AIB needed? ϖ Advantage: Anonymity can be achieved ϖ Disadvantage: ♣ Complexity and processing delay ♣ end-to-middle security θ the new response code? ϖ 403 ‘Failed Responder Identity’ θ The behavior and consequence for dealing with the enforcement? ϖ Warning: 380 Response Identity Cannot be Revealed 8

  9. Summary θ Scope and requirement for response identity θ Some solutions are provided θ Open questions θ Next Step? 9

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend