Response Identity in Session Initiation Protocol - - PowerPoint PPT Presentation

response identity in session initiation protocol
SMART_READER_LITE
LIVE PREVIEW

Response Identity in Session Initiation Protocol - - PowerPoint PPT Presentation

Response Identity in Session Initiation Protocol draft-cao-sip-response-identity-00 Feng Cao Cullen Jennings 1 Agenda Introduction Scope Requirements SIP Response Identity Overview Open Issues Summary 2


slide-1
SLIDE 1

1

Response Identity in Session Initiation Protocol

draft-cao-sip-response-identity-00

Feng Cao Cullen Jennings

slide-2
SLIDE 2

2

Agenda

θ Introduction

ϖ Scope ϖ Requirements

θ SIP Response Identity

ϖ Overview ϖ Open Issues

θ Summary

slide-3
SLIDE 3

3

Introduction: Scope

θ Why response identity?

ϖ Cannot rely on the existing header fields, such as “To:”,

“Reply-to:” and “Contact:”, in all the scenarios

ϖ Need response identity as early as possible

♣ Provide response identity in non-dialog session ♣ Provide proxy’s identity for confirming certain response codes ♣ Prevent response identity spoofing as early as possible

θ Scope of this response identity draft

ϖ Provide response identity inside response message with the

security mechanism for verifying the integrity of response identity.

slide-4
SLIDE 4

4

Introduction: Requirement

θ The mechanism must be backward compatible θ The identity must be clearly specified in the header by the

responder (or its proxy)

θ The identities of both UAs and proxies must be covered θ The integrity of SIP response must be partially covered

along with the responder’s identity

θ The enforcement of providing response identity must be

provided through the originator’s request.

θ Open question: Anonymity of response identity?

slide-5
SLIDE 5

5

Enforcement of Response Identity

θ UAC (or its proxy) should be able to ask for

response identity

ϖ Required: responder-id ϖ Open question: can any intermediate proxy ask for it?

θ Responder (UAS or proxy) should be able to

decline to disclose the response identity

ϖ Warning: 380 Response Identity Cannot be Revealed ϖ Open question: the exact behavior and the

consequence?

slide-6
SLIDE 6

6

proxy-1@source.com alice@source.com proxy-2@destination.com bob@destination.com INVITE bob 180 Ringing

DAS-based Approach

Responder: claimer=bob@destination.com; verify-method=DAS; Responder-Info: https://www.destination.com/certs; algo=rsa-sha1 Identify: akfjiqiowrgnavnvnnfa2o3fafanfkfjakfjalkf203urjafskjfaf Jprqiyupirequqpiruskfka

Note: Domain-based Authentication Service (DAS)

slide-7
SLIDE 7

7

proxy-1@source.com alice@source.com proxy-2@destination.com bob@destination.com INVITE bob 180 Ringing

AIB-based Approach

Responder: claimer=bob@destination.com; verify-method=AIB; Responder-Info: https://www.destination.com/certs; algo=rsa-sha1

slide-8
SLIDE 8

8

Open Questions

θ Is AIB needed?

ϖ Advantage: Anonymity can be achieved ϖ Disadvantage:

♣ Complexity and processing delay ♣ end-to-middle security θ the new response code?

ϖ 403 ‘Failed Responder Identity’

θ The behavior and consequence for dealing with the

enforcement?

ϖ Warning: 380 Response Identity Cannot be Revealed

slide-9
SLIDE 9

9

Summary

θ Scope and requirement for response

identity

θ Some solutions are provided θ Open questions θ Next Step?