Re: [Sip] draft-state-sip-relay-attack-00

Raphael Coeffic <rco@iptel.org> Tue, 10 March 2009 10:05 UTC

Return-Path: <rco@iptel.org>
X-Original-To: sip@core3.amsl.com
Delivered-To: sip@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 509BB3A67F5 for <sip@core3.amsl.com>; Tue, 10 Mar 2009 03:05:53 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.319
X-Spam-Level:
X-Spam-Status: No, score=-2.319 tagged_above=-999 required=5 tests=[AWL=0.281, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gPv0wXOeRrW1 for <sip@core3.amsl.com>; Tue, 10 Mar 2009 03:05:52 -0700 (PDT)
Received: from mail.iptel.org (smtp.iptel.org [213.192.59.67]) by core3.amsl.com (Postfix) with ESMTP id 341763A672F for <sip@ietf.org>; Tue, 10 Mar 2009 03:05:52 -0700 (PDT)
Received: by mail.iptel.org (Postfix, from userid 103) id E0AA41810C4A; Tue, 10 Mar 2009 11:06:25 +0100 (CET)
Received: from rco-imac.local (unknown [217.9.54.26]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mail.iptel.org (Postfix) with ESMTPSA id 0638B1811242; Tue, 10 Mar 2009 11:06:24 +0100 (CET)
Message-ID: <49B63B9F.9000101@iptel.org>
Date: Tue, 10 Mar 2009 11:06:23 +0100
From: Raphael Coeffic <rco@iptel.org>
User-Agent: Thunderbird 2.0.0.19 (Macintosh/20081209)
MIME-Version: 1.0
To: Hadriel Kaplan <HKaplan@acmepacket.com>
References: <49AE593F.6080807@iptel.org> <e4c7495a3f98d5a2a85ccf85047515f0.squirrel@www.ohlmeier.com> <20090307183313.GA4364@x61s.janakj.ryngle.net> <E6C2E8958BA59A4FB960963D475F7AC314C4DE6292@mail> <49B2F7F2.6030804@ohlmeier.org> <E6C2E8958BA59A4FB960963D475F7AC314C4DE62D4@mail> <E6C2E8958BA59A4FB960963D475F7AC314C4DE62F0@mail> <49B5006D.8050702@iptel.org> <E6C2E8958BA59A4FB960963D475F7AC314C4FAA08C@mail>
In-Reply-To: <E6C2E8958BA59A4FB960963D475F7AC314C4FAA08C@mail>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: Nils Ohlmeier <lists@ohlmeier.org>, "sip@ietf.org" <sip@ietf.org>
Subject: Re: [Sip] draft-state-sip-relay-attack-00
X-BeenThere: sip@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Session Initiation Protocol <sip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip>
List-Post: <mailto:sip@ietf.org>
List-Help: <mailto:sip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 10 Mar 2009 10:05:53 -0000

Hadriel Kaplan wrote:
>   
>> -----Original Message-----
>> From: Raphael Coeffic [mailto:rco@iptel.org]
>> Sent: Monday, March 09, 2009 7:42 AM
>>
>> That's a good point. Requiring the user to be registered and only
>> accepting requests from the registered contacts provide a fair-enough
>> level of security concerning the attack debated. But I am still hoping
>> that we could find a solution not requiring this kind of measures, which
>> I would call "user-restricting".
>>     
>
> How is it "user-restricting" to require a UA to generate a REGISTER request?  Most humans don't generate the REGISTER request by hand - typically software does it for them.  :)
>   

Forcing registrations is the path that IMS went for, I believe. But if 
you want to take advantage of this, you may have to deploy a little more 
IMS than you'd like to. This reminds me of some email providers that 
require you to connect through POP3 prior to send any message through 
SMTP, instead of deploying any secure authentication mechnism.

Maybe just an example: let's say you have a home SIP server, doing the 
usual least cost routing. Your least cost router might have something 
like 50 different routes. Do you want this box, or maybe your phones to 
have 50 running registrations, just for the purpose of having cheap 
calls? Well, personaly, I would prefer to just install my certificate on 
this box, and use TLS. But as very very few of those PSTN providers do 
support TLS, I cannot. By the way, there are already commercial products 
supporting this scenario.

Regards,
Raphael.