Re: [Sip] draft-state-sip-relay-attack-00

Raphael Coeffic <rco@iptel.org> Mon, 09 March 2009 11:41 UTC

Return-Path: <rco@iptel.org>
X-Original-To: sip@core3.amsl.com
Delivered-To: sip@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5D9453A6C78 for <sip@core3.amsl.com>; Mon, 9 Mar 2009 04:41:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.283
X-Spam-Level:
X-Spam-Status: No, score=-2.283 tagged_above=-999 required=5 tests=[AWL=0.316, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WNLoXlVjx4o3 for <sip@core3.amsl.com>; Mon, 9 Mar 2009 04:41:02 -0700 (PDT)
Received: from mail.iptel.org (smtp.iptel.org [213.192.59.67]) by core3.amsl.com (Postfix) with ESMTP id 794AE3A67EA for <sip@ietf.org>; Mon, 9 Mar 2009 04:41:02 -0700 (PDT)
Received: by mail.iptel.org (Postfix, from userid 103) id 2C6EF1811CE1; Mon, 9 Mar 2009 12:41:35 +0100 (CET)
Received: from rco-imac.local (unknown [217.9.54.26]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mail.iptel.org (Postfix) with ESMTPSA id 5339D1811CD8; Mon, 9 Mar 2009 12:41:34 +0100 (CET)
Message-ID: <49B5006D.8050702@iptel.org>
Date: Mon, 09 Mar 2009 12:41:33 +0100
From: Raphael Coeffic <rco@iptel.org>
User-Agent: Thunderbird 2.0.0.19 (Macintosh/20081209)
MIME-Version: 1.0
To: Hadriel Kaplan <HKaplan@acmepacket.com>
References: <49AE593F.6080807@iptel.org> <e4c7495a3f98d5a2a85ccf85047515f0.squirrel@www.ohlmeier.com> <20090307183313.GA4364@x61s.janakj.ryngle.net> <E6C2E8958BA59A4FB960963D475F7AC314C4DE6292@mail> <49B2F7F2.6030804@ohlmeier.org> <E6C2E8958BA59A4FB960963D475F7AC314C4DE62D4@mail> <E6C2E8958BA59A4FB960963D475F7AC314C4DE62F0@mail>
In-Reply-To: <E6C2E8958BA59A4FB960963D475F7AC314C4DE62F0@mail>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: Nils Ohlmeier <lists@ohlmeier.org>, "sip@ietf.org" <sip@ietf.org>
Subject: Re: [Sip] draft-state-sip-relay-attack-00
X-BeenThere: sip@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Session Initiation Protocol <sip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip>
List-Post: <mailto:sip@ietf.org>
List-Help: <mailto:sip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 Mar 2009 11:41:03 -0000

Hadriel Kaplan wrote:
>   
>> -----Original Message-----
>> From: sip-bounces@ietf.org [mailto:sip-bounces@ietf.org] On Behalf Of
>> Hadriel Kaplan
>> Sent: Saturday, March 07, 2009 7:31 PM
>>
>> But anyway, I'm not sure what you mean by the question.  How is what going
>> to work?  Stopping INVITE-based authentication relay-attacks?  You don't
>> need an SBC-type box to stop that.  Just disconnect the cable.  :)
>> Or, use the counter-measures in the draft.  Or change the protocol, or at
>> least the authentication mechanism.
>>     
>
> BTW, you don't need to be an SBC to have such policies.  There is nothing in RFC 3261 which prohibits a pure Proxy from restricting who it accepts INVITEs from, and when.  There are even some clever tricks one can do to make it a stateless mechanism.
>
>   
That's a good point. Requiring the user to be registered and only 
accepting requests from the registered contacts provide a fair-enough 
level of security concerning the attack debated. But I am still hoping 
that we could find a solution not requiring this kind of measures, which 
I would call "user-restricting".

-Raphael.