[VIPR] Minutes for 2011/09/30 conference call
Marc Petit-Huguenin <petithug@acm.org> Mon, 03 October 2011 14:57 UTC
Return-Path: <petithug@acm.org>
X-Original-To: vipr@ietfa.amsl.com
Delivered-To: vipr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix)
with ESMTP id 57ACF21F8505 for <vipr@ietfa.amsl.com>;
Mon, 3 Oct 2011 07:57:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.294
X-Spam-Level:
X-Spam-Status: No, score=-102.294 tagged_above=-999 required=5 tests=[AWL=0.306,
BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com
[127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KFL-M51tV9mr for
<vipr@ietfa.amsl.com>; Mon, 3 Oct 2011 07:56:59 -0700 (PDT)
Received: from implementers.org (implementers.org
[IPv6:2604:3400:dc1:41:216:3eff:fe5b:8240]) by ietfa.amsl.com (Postfix) with
ESMTP id DB9CB21F84A7 for <vipr@ietf.org>;
Mon, 3 Oct 2011 07:56:58 -0700 (PDT)
Received: from [IPv6:2001:470:1f05:616:213:d4ff:fe04:3e08] (shalmaneser.org
[IPv6:2001:470:1f05:616:213:d4ff:fe04:3e08]) (using TLSv1 with cipher
AES256-SHA (256/256 bits)) (Client CN "petithug", Issuer "implementers.org"
(verified OK)) by implementers.org (Postfix) with ESMTPS id C3D93202D1 for
<vipr@ietf.org>; Mon, 3 Oct 2011 14:53:08 +0000 (UTC)
Message-ID: <4E89CDEE.5040000@acm.org>
Date: Mon, 03 Oct 2011 07:59:58 -0700
From: Marc Petit-Huguenin <petithug@acm.org>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US;
rv:1.9.2.21) Gecko/20110831 Iceowl/1.0b2 Icedove/3.1.13
MIME-Version: 1.0
To: "vipr@ietf.org" <vipr@ietf.org>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Subject: [VIPR] Minutes for 2011/09/30 conference call
X-BeenThere: vipr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Verification Involving PSTN Reachability working group <vipr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/vipr>,
<mailto:vipr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/vipr>
List-Post: <mailto:vipr@ietf.org>
List-Help: <mailto:vipr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/vipr>,
<mailto:vipr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Oct 2011 14:57:04 -0000
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VIPR Design Team conference call on Friday September 30th, from 9:05am to 9:55am PST. o Attendees: Mary Barnes Hakim Mehmood Muthu Arul Mozhi Perumal Jon Peterson Marc Petit-Huguenin John Ward Dean Willis o Regrets: Daryl Malas Michael Procter o Agenda - - Security section of -overview (5 min) - - SIP Intermediaries (10 min) - - Capabilities (10 min) - - RELOAD registration (5 min) - - PVP privacy (10 min) - - PVP method priority and registration (10 min) - - PVP method entropy (10 min) - - Replacement ticket by client certificate (10 min) - - Ticket renewal (10 min) - - Infrastructure overlays (5 min) o Action items - - Mary will send an improved text for the -overview Security Considerations section to the mailing-list. - - Marc will send an email describing the problem and use cases for SIP intermediaries. o Minutes - - Security section of -overview Marc: Mary published a new version of the -overview document. Security section still need some work. Mary: My impression is that it's 80% there. Not sure what it's in there will get us past AD security review. Hakim: Any concern on the test of phone numbers? Mary: The idea of the attacker claiming phone numbers as its own was part of the concerns that Richard Shockey brought forward. Dean: There is potential for denial of service by claiming a lot of numbers. Hakim: The idea with VIPR is that you bring your own resources. There should be a way for the overlay to reject excessive requests. Mary: Does RELOAD handle that? Dean: The fundamental problem with RELOAD is that someone can dedicate 10000's CPU to mess up the overlay. But that's a RELOAD problem, not a VIPR problem Hakim: DHTs perform better as more nodes are added. Dean: Only if those nodes are performing correctly. Hakim: It's an attack on performance. Jon: In the security section we must be careful to enumerate the limitations of the system. One thing that is missing is the property of the token that is carried in SIP. What are the protocols that are securing the actual network interaction, e.g. TLS. Should list the counter-measures, for example for the phone number mechanism it would be a combination of the overlay validation mechanism and the generation of the SIP token. Marc: The methods that are described in -pvp are just examples, and the security of these should be deferred to the document where they are defined. Mary: It's OK to point solution in other documents but we need to be sure that we have a comprehensive security overview. Jon: Is there an authentication problem, is there an integrity problem? Then saying that there is a token in this other draft. Marc: So who want to contribute? Mary: I can make a pass at the modifications suggested and send it to the mailing-list. - - SIP Intermediaries Marc: We agreed on the previous call that SIP intermediaries should not be only for toll bypass, but to improve the SIP situation. I put a proposal together and this proposal is to carry both the SDP to the PSTN gateway (aka SIPconnect profile) and the SDP with SIP enhanced feature (aka SIPbeyond, which could be defined in collaboration with RTCWEB) in a multipart/alternative body. Jon: I am not initially a huge fan of this. We want to keep VIPR as close as possible to standard SIP. As said in the previous call, the high level solution is to be clear that VIPR is intended to provide feature transparency. If you just provide a great PSTN service, then you should not be doing this. Marc: I agree 100%, but what VIPR domains who want to participate should do? Hakim: I agree with Jon, the original intent of VIPR was to use SIP has is. I am not sure there is a good solution. One of the approach is to collect all the routes you can and then use a policy to choose one, a policy could be to choose the route that have the best features, or your policy could be to choose the least cost. Marc: It's a different topic. It is not about choosing the best route, but for intermediate VIPR domains on an outgoing call. We all agree that a domain that is not improving SIP should not participate. The question is what do we do when an intermediate want to do the right thing. Jon: Same answer that I gave last time, if we do that, we completely missed what we want to do with VIPR. Any entity that is advertizing a route to an endpoint should doing so only if it is a route to the features of the endpoint. Dean: It's almost a denial of service on the intent of VIPR. Jon: We want to have a story to how VIPR is gonna work with federations, but I see that as a distant goal for us. I am not saying that intermediaries should not participate, but we need to understand how to work with this kind of systems. Marc: We all agree on this, but we are not proposing a solution. I think that we should not exclude intermediaries, and I disagree that we should do this later. If we exclude them then we will not have enough participants. [The next 15 minutes of audio recording are lost. Next call will have one more recording point to prevent this to happen again. Sorry for that] Jon: ...we should not give up on the idea that we can have one route per phone number provisioned in your VIPR entity. John: We should definitively talk more about this. For us to know as a provider, a carrier, the capabilities of a given endpoint is something that will be more and more possible. So having a route to an endpoint at this capability level is something that we really want support. Jon: If it is desirable for an endpoint to defer to an upstream entity, it's perhaps possible to have a kind of negotiation. There is other ways than forcing this complexity. John: Your issue is that it is the endpoint that should decide based on all the entities that reported back. Jon: I am trying to deal with the issue which is how do you deal with sending a SIP INVITE that there is multiple places it could land and how do you build the richest connection features. How does an INVITE will reach the entity with the richest feature, which is not a trivial problem to solve. John: Unless each of these routes are reporting their supported feature set. Hakim: But intermediaries will not really know. John: I am not convinced that's a valid assumption. Suppose that a provider knows the features supported by the devices. Why shouldn’t this provider been able to participate in VIPR? Hakim: OK, but what about an entity one step further? John: They shouldn't be advertizing it. Hakim: Then how do you prevent it? John: If you do not allow the proxy, then you can never, ever, have non-VIPR players play with VIPR federations. Hakim: I am not suggesting that. Everybody should publish, but we need to have a way to pick the right route. Marc: Sorry to interrupt, but we are running out of time. I will send another email only describing the problem, and use cases. But we need discussion on the mailing-list to accelerate decisions. - -- Marc Petit-Huguenin Personal email: marc@petit-huguenin.org Professional email: petithug@acm.org Blog: http://blog.marc.petit-huguenin.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAk6JzewACgkQ9RoMZyVa61euoQCeIKs3wfKt18UGiSzGIKs87LVU lfUAnR6eihekvGGixAumXYF82kr9jKJ0 =G+WT -----END PGP SIGNATURE-----
- [VIPR] Minutes for 2011/09/30 conference call Marc Petit-Huguenin