Examining Session Policy Topologies

Slides:



Advertisements
Similar presentations
SIP(Session Initiation Protocol) - SIP Messages
Advertisements

SIP Session-ID draft-kaplan-sip-session-id-02 Hadriel Kaplan.
1 © 2001, Cisco Systems, Inc. All rights reserved. © 2004, Cisco Systems, Inc. All rights reserved. Location Conveyance in SIP draft-ietf-sipping-location-requirements-02.
SIP, Firewalls and NATs Oh My!. SIP Summit SIP, Firewalls and NATs, Oh My! Getting SIP Through Firewalls Firewalls Typically.
Fall VoN 2000 SIP Servers SIP Servers: A Buyers Guide Jonathan Rosenberg Chief Scientist.
SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-02 David Hancock, Daryl Malas.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
SIP issues with S/MIME and CMS Rohan Mahy SIP, SIPPING co-chair.
Session-Independent Policies draft-ietf-sipping-session-indep-policy-01 Volker Hilt Gonzalo Camarillo
STUN Date: Speaker: Hui-Hsiung Chung 1.
STUN Tutorial Jonathan Rosenberg Chief Technology Officer.
Session Initiation Protocol Winelfred G. Pasamba.
ICE Jonathan Rosenberg dynamicsoft. Issue 1: Port Restricted Flow This case does not work well with ICE right now Race condition –Works if message 13.
Proposed Fix to HERFP* (Heterogeneous Error Response Forking Problem) Rohan Mahy * for INVITE transactions.
Rohan Mahy draft-ietf-sip-join and Semantics of REFER.
1 SIP WG meeting 73rd IETF - Minneapolis, MN, USA November, 2008 Return Routability Check draft-kuthan-sip-derive-00 Jiri
Request History – Solution Mary Barnes SIP WG Meeting IETF-57 draft-ietf-sip-history-info-00.txt.
The Session Initiation Protocol (SIP) Common Log Format (CLF)‏ IETF 74, March 2009, San Francisco, CA (USA)‏ Vijay K. Gurbani Eric Burger Humberto Abdelnur.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
RTCWEB Signaling Matthew Kaufman. Scope Web Server Browser.
Jonathan Rosenberg dynamicsoft. Problem Statement We still don’t have a good answer for NAT traversal in SIP!! That is clear from nat-scenarios –Tons.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Cullen Jennings Certificate Directory for SIP.
SIPPING IETF 57 Jonathan Rosenberg dynamicsoft.
1 SPEERMINT Use Cases for Cable IETF 66 Montreal 11 JULY 2006 Presented by Yiu L. Lee.
SIP:Session Initiation Protocol Che-Yu Kuo Computer & Information Science Department University of Delaware May 11, 2010 CISC 856: TCP/IP and Upper Layer.
Draft-elwell-sipping- redirection-reason-00 Author: John Elwell
IMS 架構與話務分析 網路管理維運資源中心 日期 : 2013/07/25 網路管理維運資源中心 日期 : 2013/07/25 限閱.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
NSIS NAT/Firewall NSLP Martin Stiemerling, Hannes Tschofenig, Miquel Martin, Cedric Aoun NSIS WG, 59th IETF.
SIP Connection Reuse Efficiency Rohan Mahy—Airespace
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
Name that User John Elwell Cullen Jennings Venkatesh Venkataramanan
1 Media Session Authorization Dan Wing draft-wing-session-auth-00.txt.
March 20, 2007BLISS BOF IETF-681 Requirements and Implementation Options for the Multiple Line Appearance Feature using the Session Initiation Protocol.
GRUU Jonathan Rosenberg Cisco Systems. Changes in -06 Editorial as a result of RFC-ED early copy experiment.
July 28, 2008BLISS WG IETF-721 The Multiple Appearance Feature using the Session Initiation Protocol (SIP) draft-johnston-bliss-mla-req-02 Alan Johnston.
Call Completion using BFCP draft-roach-sipping-callcomp-bfcp IETF 67 – San Diego November 7, 2006.
Indication of Terminated Dialog draft-holmberg-sipping txt Christer Holmberg NomadicLab Ericsson.
SIPWG Slides for IETF 51 Jonathan Rosenberg dynamicsoft.
1 End-to-middle Security in SIP Kumiko Ono NTT Corporation March 1, 2004 draft-ietf-sipping-e2m-sec-reqs-01.txt draft-ono-sipping-end2middle-security-01.txt.
Andrew Allen ROUTING OUT OF DIALOG REQUESTS draft-allen-dispatch-routing-out-of-dialog-request-01 Dispatch IETF 92 March 23 rd 2015.
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
Peer-to-Peer Solutions Between Service Providers David A. Bryan CTO, Jasomi Networks October 10, 2002 – Fall VON, Atlanta, GA.
SIP Extension Changes Jonathan Rosenberg dynamicsoft IETF 52.
SIP wg Items Jonathan Rosenberg dynamicsoft Caller Preferences: Changes Discussion of Redirects –Previous draft only proxy –Nothing different for redirect.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
Jonathan Rosenberg dynamicsoft
NAT (Network Address Translation)
Volker Hilt SIP Session Policies Volker Hilt
Session-Independent Policies draft-ietf-sipping-session-indep-policy-02 Volker Hilt Jonathan Rosenberg Gonzalo.
End-to-middle Security in SIP
DMET 602: Networks and Media Lab
VoIP over Wireless Networks
sip-identity-04 Added new response codes for various conditions
Jonathan Rosenberg dynamicsoft
ECRIT Interim: SIP Location Conveyance
Session Initiation Protocol
Request History Capability – Requirements & Solution
Request-URI Param Delivery
Session Initiation Protocol (SIP)
Requirements and Implementation Options for the Multiple Line Appearance Feature using the Session Initiation Protocol (SIP) draft-johnston-bliss-mla-req-00.
Alfredo Terzoli / Mosioua Tsietsi
TCP Extended Option Space in the Payload of a Supplementary Segment
DMET 602: Networks and Media Lab
Running SIP behind NAT Dr. Christian Stredicke, snom technology AG
IETF 101 (London) STIR WG Mar2018
Proposal for a Generic Emergency Call Support
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
SIP Session Timer Glare Handling
Presentation transcript:

Examining Session Policy Topologies Rohan Mahy rohan@cisco.com

Typical Applications Cooperative NAT and Firewall Traversal Bandwidth / Media / Codec Policy Logging

Explicit Policy Fetch atlanta.com biloxi.com Alice Bob Works great when policies don’t depend on who you call, or dynamic properties like load. Obviates the need to mucking with typical INVITE flow much of the time. Still need another solution.

Full Redirect Model atlanta.com biloxi.com Alice Bob Minimal session policy possible Doesn’t work at all through middleboxes Doesn’t work with the GRUU mechanism

Triangle Redirect Model atlanta.com biloxi.com Alice Bob Most preferred model when allowed by policy Incompatible with policy requirements of many organizations

Trapezoid Redirect Model atlanta.com biloxi.com Alice Bob Adds lots of extra RTTs Unclear what Alice is consenting to and how she can authorize the inclusion of arbitrary opaque data if this implies her “consent” Reveals information potentially private between Bob and biloxi.com

Foreign Piggyback Model atlanta.com biloxi.com Alice Bob Meets both Alice’s and Bob’s consent requirement without leaking Bob’s data to Alice Fewer RTTs Requires Addition of bodies by biloxi.com. Backward compatible using “repack” option-tag (more on this later) Security is better. Authorization by Alice is simple Can also address AOR—Contact correlation problem

Full Piggyback Model atlanta.com biloxi.com Alice Bob Doesn’t permit Alice to consent to modifications/insertions made by atlanta.com

Adding Bodies Safely: Secure and Backwards Compatible biloxi.com may only add a body to a request when retargeting to a UAS registered in the biloxi.com domain (for example: Bob). Never responses. Any additions are always marked as “added-by” biloxi.com. Biloxi either signs its additions with S/MIME or forwards them directly over TLS to Bob Bob includes an option-tag in a REGISTER to indicate it supports body repacking. Q: Is this secure? See the Contact— AOR correlation problem…

Contact Correlation Problem How does Alice know that <sip:line2@17.18.32.4> (a contact) corresponds to <sip:bob@biloxi.com> (an AOR)? Not really a problem in a triangle topology. Slightly problematic in a trapezoid if either user is roaming. (Alice is using what appears to be a hotel lobby wireless network with a mandatory SIP proxy. No way to automatically judge trust of this proxy) Obvious solution is request history. Proxies that retarget, provided signed “cookie trail” to the eventual Contact. Works with proposal to add/repack bodies

Addressing Requirements with Foreign Piggyback Session Policies of UAC and UAS are independent (only one needs to support session policies) Consent principle still applies Works even better when used in concert with out-of-band mechanism (STUN for NATs, SUB/NOT for more general policies)

Midbox traversal–offer in INV atlanta.com biloxi.com Alice Bob Alice can try to get STUN/TURN addresses If address in offer are not valid, atlanta sends 4xx proposing new addresses; if they are valid, open pinholes/create bindings Bob can try STUN to fetch addresses biloxi adds proposed answer for Bob, and forwards Bob responds with an answer for Alice, and (in NAT case) can include Bob’s actual addresses

Midbox traversal–late offer atlanta.com biloxi.com Alice Bob biloxi adds either proposed generic offer for Bob or address of STUN server, and forwards Bob responds with an offer for Alice, and (in NAT case) can include Bob’s actual addresses Alice can try to get STUN/TURN addresses, sends addresses in answer in PRACK or ACK