Re: [Sip] draft-state-sip-relay-attack-00

Nils Ohlmeier <lists@ohlmeier.org> Fri, 06 March 2009 22:51 UTC

Return-Path: <lists@ohlmeier.org>
X-Original-To: sip@core3.amsl.com
Delivered-To: sip@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 3A0FA3A6923 for <sip@core3.amsl.com>; Fri, 6 Mar 2009 14:51:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.58
X-Spam-Level:
X-Spam-Status: No, score=-2.58 tagged_above=-999 required=5 tests=[AWL=0.019, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LdRpdt6A7bdB for <sip@core3.amsl.com>; Fri, 6 Mar 2009 14:51:43 -0800 (PST)
Received: from bespin.rfc3261.net (cl-395.ede-01.nl.sixxs.net [IPv6:2001:7b8:2ff:18a::2]) by core3.amsl.com (Postfix) with ESMTP id 6EC813A681C for <sip@ietf.org>; Fri, 6 Mar 2009 14:51:43 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by bespin.rfc3261.net (Postfix) with ESMTP id 94A2A7F82; Fri, 6 Mar 2009 23:52:12 +0100 (CET)
X-Virus-Scanned: Debian amavisd-new at bespin.rfc3261.net
Received: from bespin.rfc3261.net ([127.0.0.1]) by localhost (bespin.rfc3261.net [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WAAdOg6COxjs; Fri, 6 Mar 2009 23:52:12 +0100 (CET)
Received: from Nils-MacBook-2.local (unknown [78.52.228.60]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by bespin.rfc3261.net (Postfix) with ESMTPSA id 1D3007F55; Fri, 6 Mar 2009 23:52:12 +0100 (CET)
Message-ID: <49B1A91B.9060308@ohlmeier.org>
Date: Fri, 06 Mar 2009 23:52:11 +0100
From: Nils Ohlmeier <lists@ohlmeier.org>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; de; rv:1.9.1b3pre) Gecko/20090223 Thunderbird/3.0b2
MIME-Version: 1.0
To: Theo Zourzouvillys <theo@crazygreek.co.uk>
References: <49AE593F.6080807@iptel.org> <e4c7495a3f98d5a2a85ccf85047515f0.squirrel@www.ohlmeier.com> <1236368519.3762.20.camel@victoria-pingtel-com.us.nortel.com> <49B1A1E1.8070007@ohlmeier.org> <167dfb9b0903061429r635e3a64i2353a8900fbace37@mail.gmail.com>
In-Reply-To: <167dfb9b0903061429r635e3a64i2353a8900fbace37@mail.gmail.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Cc: sip@ietf.org
Subject: Re: [Sip] draft-state-sip-relay-attack-00
X-BeenThere: sip@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Session Initiation Protocol <sip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip>
List-Post: <mailto:sip@ietf.org>
List-Help: <mailto:sip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Mar 2009 22:51:44 -0000

Am 06.03.2009 23:29 Uhr, schrieb Theo Zourzouvillys:
> On Fri, Mar 6, 2009 at 10:21 PM, Nils Ohlmeier<lists@ohlmeier.org>  wrote:
>
>> Except that a REFER is not relevant for this replay attack
>
> an authenticated OOD REFER may be used to initiate a call with some SIP devices.

Sure, but that is totally different story (of another bad UA 
implementation) which is not related to this auth relay attack.

   Nils