[Ecrit] Comments to draft-barnes-ecrit-auth-00.txt
Hannes Tschofenig <Hannes.Tschofenig@gmx.net> Sat, 21 July 2007 20:54 UTC
Return-path: <ecrit-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1ICLyX-0000LY-F1; Sat, 21 Jul 2007 16:54:53 -0400
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1ICLyW-0000LT-UN for ecrit@ietf.org; Sat, 21 Jul 2007 16:54:52 -0400
Received: from mail.gmx.net ([213.165.64.20]) by chiedprmail1.ietf.org with smtp (Exim 4.43) id 1ICLyW-0003xS-3o for ecrit@ietf.org; Sat, 21 Jul 2007 16:54:52 -0400
Received: (qmail invoked by alias); 21 Jul 2007 20:54:50 -0000
Received: from socks1.netz.sbs.de (EHLO [192.35.17.26]) [192.35.17.26] by mail.gmx.net (mp019) with SMTP; 21 Jul 2007 22:54:50 +0200
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX186hRtzwUY62ZE4SBPqHsXWOF527bidBTohIRnBtX KiCNGBpN5wTO78
Message-ID: <46A27298.2000005@gmx.net>
Date: Sat, 21 Jul 2007 22:54:48 +0200
From: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
User-Agent: Thunderbird 2.0.0.4 (Windows/20070604)
MIME-Version: 1.0
To: ECRIT <ecrit@ietf.org>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Y-GMX-Trusted: 0
X-Spam-Score: 0.0 (/)
X-Scan-Signature: f60d0f7806b0c40781eee6b9cd0b2135
Subject: [Ecrit] Comments to draft-barnes-ecrit-auth-00.txt
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>, <mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>, <mailto:ecrit-request@ietf.org?subject=subscribe>
Errors-To: ecrit-bounces@ietf.org
Hi Richard, thanks for writing this document. I have a few comments: Section 2.1: Location and Service URN This is a very good summary of our currently assumed model. I am, however, not sure about the following statement: " An important restriction to the applicability of this solution is that it requires the asserter possess a location value that can serve as part of an authenticator. For instance, if the authenticator is to be carried an INVITE message, the UAC must have access to its own location (with some degree of precision). Since there are situations where UACs may not have access to their own location (in access networks prevent this), this solution must be embedded in SIP in such a way that it can be inserted by a UAC, a UAS, or a proxy. In addition, if the Geolocation header is used to convey the location used here, then the SIP embedding must take into account the usage restrictions in [location-conveyance]. " The UAC does not need to have access to precise location information. The considerations for "location hiding" apply here. I am not sure what you mean with the sentences in the later part of the paragraph Section 2.2: Asserter Identity This model assumes that the PSAP operators network asserts that it has received an emergency call. It furthermore assumes that the VSP is able to verify which identities are indeed PSAP operators. Hence, some white lists of PSAP operators need to made available. You want to use the Connected Identity for this purpose. Please let me know whether I correctly understood this solution. Section 2.3 Direct assertion From the description I got the impression that this is the plain SIP Identity. I cannot quite see how this prevents the attack. How does a VSP verify whether this is indeed an emergency call? Another solution would be to sign a LoST mapping response (with a service boundary). The SIP UA would then add the signed LoST mapping into the SIP message together with the location information it used for retrieving the mapping. The VSP would verify that a) the signature of the mapping is correct. b) compare the identity of the mapping server with a a whitelist of valid mapping servers c) verify whether the location information is contained in the service boundary. The problem is that this is again complex, i.e., by no means better than the current solution we use as a working assumption. Ciao Hannes _______________________________________________ Ecrit mailing list Ecrit@ietf.org https://www1.ietf.org/mailman/listinfo/ecrit
- [Ecrit] Comments to draft-barnes-ecrit-auth-00.txt Hannes Tschofenig
- Re: [Ecrit] Comments to draft-barnes-ecrit-auth-0… Richard Barnes
- [Ecrit] Signed LoST mappings Richard Barnes
- Re: [Ecrit] Signed LoST mappings James M. Polk
- Re: [Ecrit] Signed LoST mappings Richard Barnes
- Re: [Ecrit] Signed LoST mappings James M. Polk
- Re: [Ecrit] Signed LoST mappings Shida Schubert
- Re: [Ecrit] Signed LoST mappings Richard Barnes
- Re: [Ecrit] Signed LoST mappings Richard Barnes
- Re: [Ecrit] Signed LoST mappings Shida Schubert
- [Ecrit] ieee presentation in ecrit Gabor.Bajko
- Re: [Ecrit] Signed LoST mappings Henning Schulzrinne
- Re: [Ecrit] Signed LoST mappings Henning Schulzrinne
- Re: [Ecrit] Signed LoST mappings Richard Barnes
- Re: [Ecrit] Signed LoST mappings Richard Barnes
- Re: [Ecrit] Signed LoST mappings Henning Schulzrinne
- Re: [Ecrit] Signed LoST mappings Henning Schulzrinne
- Re: [Ecrit] Signed LoST mappings Richard Barnes
- Re: [Ecrit] Signed LoST mappings Henning Schulzrinne
- Re: [Ecrit] Signed LoST mappings Richard Barnes
- Re: [Ecrit] Signed LoST mappings Richard Barnes
- Re: [Ecrit] Signed LoST mappings Henning Schulzrinne
- RE: [Ecrit] Signed LoST mappings Dawson, Martin
- Re: [Ecrit] Signed LoST mappings Richard Barnes
- Re: [Ecrit] Signed LoST mappings Henning Schulzrinne
- Verifying that a call goes to a PSAP (Was Re: [Ec… Matt Lepinski
- Re: Verifying that a call goes to a PSAP (Was Re:… James M. Polk
- Re: Verifying that a call goes to a PSAP (Was Re:… Matt Lepinski
- Re: Verifying that a call goes to a PSAP (Was Re:… Henning Schulzrinne
- Re: Verifying that a call goes to a PSAP (Was Re:… Richard Barnes
- Re: Verifying that a call goes to a PSAP (Was Re:… Henning Schulzrinne
- RE: Verifying that a call goes to a PSAP (Was Re:… Brian Rosen