Re: [Sip] draft-state-sip-relay-attack-00

Hadriel Kaplan <HKaplan@acmepacket.com> Sat, 07 March 2009 22:02 UTC

Return-Path: <HKaplan@acmepacket.com>
X-Original-To: sip@core3.amsl.com
Delivered-To: sip@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id A66BD3A689A for <sip@core3.amsl.com>; Sat, 7 Mar 2009 14:02:06 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.376
X-Spam-Level:
X-Spam-Status: No, score=-2.376 tagged_above=-999 required=5 tests=[AWL=-0.077, BAYES_00=-2.599, MIME_8BIT_HEADER=0.3]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I+AanilZNTRU for <sip@core3.amsl.com>; Sat, 7 Mar 2009 14:02:05 -0800 (PST)
Received: from etmail.acmepacket.com (etmail.acmepacket.com [216.41.24.6]) by core3.amsl.com (Postfix) with ESMTP id BAF643A672F for <sip@ietf.org>; Sat, 7 Mar 2009 14:02:05 -0800 (PST)
Received: from mail.acmepacket.com (216.41.24.7) by etmail.acmepacket.com (216.41.24.6) with Microsoft SMTP Server (TLS) id 8.1.291.1; Sat, 7 Mar 2009 17:02:35 -0500
Received: from mail.acmepacket.com ([127.0.0.1]) by mail ([127.0.0.1]) with mapi; Sat, 7 Mar 2009 17:02:36 -0500
From: Hadriel Kaplan <HKaplan@acmepacket.com>
To: Victor Pascual Ávila <victor.pascual.avila@gmail.com>
Date: Sat, 07 Mar 2009 17:02:32 -0500
Thread-Topic: [Sip] draft-state-sip-relay-attack-00
Thread-Index: AcmfaeIybqBF+niVTyOL0istvYQ0/gAAVEUA
Message-ID: <E6C2E8958BA59A4FB960963D475F7AC314C4DE62BB@mail>
References: <49AE593F.6080807@iptel.org> <0a8001c99d0f$0b21e210$c2f0200a@cisco.com> <49AF9FC8.2020200@iptel.org> <E6C2E8958BA59A4FB960963D475F7AC314C46BD96D@mail> <20090307195045.GC4364@x61s.janakj.ryngle.net> <E6C2E8958BA59A4FB960963D475F7AC314C4DE62A5@mail> <618e24240903071315r56fd9794s6273d87fcfa87508@mail.gmail.com>
In-Reply-To: <618e24240903071315r56fd9794s6273d87fcfa87508@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "sip@ietf.org" <sip@ietf.org>
Subject: Re: [Sip] draft-state-sip-relay-attack-00
X-BeenThere: sip@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Session Initiation Protocol <sip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip>
List-Post: <mailto:sip@ietf.org>
List-Help: <mailto:sip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 07 Mar 2009 22:02:06 -0000

> -----Original Message-----
> From: Victor Pascual Ávila [mailto:victor.pascual.avila@gmail.com]
> Sent: Saturday, March 07, 2009 4:15 PM
>
> As an example: what would proxy.com check upon receipt of Bob's
> spoofed INVITE over UDP (forging packet source ip and port)?

Well that is a trade secret, and specific to the proxy/SBC vendor being used, and probably its configuration. :)

But anyway if Bob could guess Alice's source UDP IP and port (which by the way is not always trivial to do), then it changes the form and scope of the attack.  The interesting characteristics of a relay-attack, baiting-attack, etc., are that they do not require IP-layer spoofing.

Typically, though, spoofing enough to get through would be less useful for Bob to do unless he's actually a true MitM, because the SIP responses for the call will go to Alice, so Bob won't be able to pass along the challenge and won't be able to establish a call.  And even if Alice's UA is broken enough to answer a challenge for a request it didn't send, Bob would not get the SIP responses to setup the call fully, nor send or receive media for it.  Bob could try to mount a resource-exhaustion attack on the provider, but that too is throttled (and besides Bob won't be able to get Alice to challenge-response fast enough for each INVITE).  Bob could try to perform an annoyance attack by making phones ring, if he figures out how to avoid getting Alice blocked automatically, but there are even countermeasures for that available.  Bob could try an attack for the purpose of getting Alice blocked from getting service for a period of time, but if Bob knows Alice's UDP source info he can do that directly on Alice anyway, and the best the provider can do is stop it from affecting others.

-hadriel