Can SIP benefit from HIP (or vice versa)? Exchanging Host Identities in SIP Hannes Tschofenig, Vesa Torvinen, Joerg Ott, Henning Schulzrinne, Tom Henderson,

Slides:



Advertisements
Similar presentations
Using HIP to solve MULTI-HOMING IN IPv6 networks YUAN Zhangyi Beijing University of Posts and Telecommunications.
Advertisements

HTTP Dereference (draft-winterbottom-geopriv-deref-protocol-00) IETF-71 Philadelphia, March 2008 James Winterbottom Hannes Tschofenig Henning Schulzrinne.
March 2008IETF 71 (Philadelphia) - ECRIT1 Unauthenticated emergency communications Henning Schulzrinne Gabor Bajko S. McCann Hannes Tschofenig draft-schulzrinne-ecrit-unauthenticated-access-02.
ECRIT Direct Calling draft-winterbottom-ecrit-direct-01 James Winterbottom, Martin Thomson, Hannes Tschofenig, Henning Schulzrinne 1draft-winterbottom-ecrit-direct-01.
M2M Architecture Inge Grønbæk, Telenor R&I ETSI Workshop on RFID and The Internet Of Things, 3rd and 4th December 2007.
HIP working group 1 HIP-WG meeting, IETF61 HIP-mm update November 8, 2004 Tom Henderson.
1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Establishing Host Identity Protocol Opportunistic Mode with TCP Option draft-lindqvist-hip-opportunistic-01.txt Janne.
Geographical distribution of Media Relays Part of Global SIP framework Adrian Georgescu Dan Pascu
Enabling SIP to the Enterprise Steve Johnson, Ingate Systems Security: How SIP Improves Telephony.
1 The Critical Role of Sip&H.323 Internetworking in Next- Generation Telephony Dr. Samir Chatterjee Associate Professor School of Information Science ;
1/32 Internet Architecture Lukas Banach Tutors: Holger Karl Christian Dannewitz Monday C. Today I³SI³HIPHI³.
1 © NOKIA NSIS MIPv6 FW/ November 8 th 2004 Mobile IPv6 - NSIS Interaction for Firewall traversal draft-thiruvengadam-nsis-mip6-fw-01 S. Thiruvengadam.
Telematics group University of Göttingen, Germany Overhead and Performance Study of the General Internet Signaling Transport (GIST) Protocol Xiaoming.
© 2006 Solegy LLC Internal Use Only Getting Connected with SIP Encryption _______________________________ By Eric Hernaez Solegy LLC May 16, 2007.
T Computer Networks II Introduction Adj. Prof. Sasu Tarkoma.
SIP, NAT, Firewall SIP NAT Firewall How to Traversal NAT/Firewall for SIP.
Towards a New Naming Architectures
Issues of HIP in an Operators Network Nick Papadoglou Thomas Dietz.
Host Identity Protocol
Voice over Internet Services and Privacy. Agenda Problem Description Scope Recommendations.
NAT Traversal Speaker: Chin-Chang Chang Date:
IETF 77 1 HIP mobility (RFC 5206bis) issue review March 31, 2011 Tom Henderson (editor)
Protecting VoIP networks against denial of service and service theft Henning Schulzrinne with Gaston Ormazabal (Verizon) and IRT graduate students Dept.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Naming Examples UUID (universal unique ID) – 128 bit numbers, locally generated, guaranteed globally unique Uniform Resource Identifier (URI) URL (uniform.
Simultaneous Mobility: Problem Statement K. Daniel Wong, Malaysia University of Science & Technology
7/14/2003IETF57 PANA enabling IPsec based Access control draft-mohanp-pana-ipsec-00.txt Mohan Parthasarathy Tahoe Networks - Presented by Hannes Tschofenig.
NSIS Path-coupled Signaling for NAT/Firewall Traversal Martin Stiemerling, Miquel Martin (NEC) Hannes Tschofenig (Siemens AG) Cedric Aoun (Nortel)
Gonzalo Camarillo Advanced Signalling Research Lab 48th IETF MMUSIC WG Gonzalo Camarillo draft-camarillo-sip-sdp-00.txt.
0 NAT/Firewall NSLP IETF 62th – March 2005 draft-ietf-nsis-nslp-natfw-05.txt Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
The HIP-HOP proposal draft-matthews-p2psip-hip-hop-00 Philip Matthews
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
DNS SRV and NAPTR Use for SPEERMINT - Tom Creighton, Gaurav Khandpur Comcast SPEERMINT Intermin Meeting Philadelphia Sept
1 IPv6 for the Network Edge Steve Deering March 20, 2000.
Mediactrl Framework draft-melanchuk-mediactrl-framework-00 Tim Melanchuk
HIP proxy Patrik Salmela Contents Background: ID-locator split HIP Why a HIP proxy Functionality of a HIP proxy The prototype.
RSVP Myungchul Kim From Ch 12 of book “ IPng and the TCP/IP protocols ” by Stephen A. Thomas, 1996, John Wiley & Sons. Resource Reservation.
Peering: A Minimalist Approach Rohan Mahy IETF 66 — Speermint WG.
BRIAN ROSEN HANNES TSCHOFENIG HENNING SCHULZRINNE draft-rosen-ecrit-data-only-ea.
Moving HIP to Standards Track Robert Moskowitz ICSAlabs an Independent Div of Verizon Business Systems March 25, 2010
SAML for SIP Hannes Tschofenig, Jon Peterson, James Polk, Douglas Sicker, Marcus Tegnander.
Using SAML for SIP H. Tschofenig, J. Peterson, J. Polk, D. Sicker, M. Tegnander.
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
Public Safety Answering Point (PSAP) Callbacks draft-ietf-ecrit-psap-callback-02.txt H. Schulzrinne, H. Tschofenig, M. Patel.
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture 13 th April 2007, THE FIRST INTERNATIONAL WORKSHOP ON RESEARCH.
File Transfer Services in the Context of SIP Based Communication Markus Isomäki draft-isomaki-sipping-file-transfer-00.
17 February 2016 SIPPING - IEPREP Joint Meeting Fred Baker - IEPREP co-chair Rohan Mahy - SIPPING co-chair.
Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats-01.txt Hannes Tschofenig, Henning Schulzrinne, Murugaraj.
HIP & MIP V 6 SECURITY Research: Security Architecture IRT Lab, Columbia University.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
NSIS NAT/Firewall Signaling NSIS Interim Meeting Romsey/UK, June 2004 Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
7/11/2005ECRIT Security Considerations1 ECRIT Security Considerations draft-taylor-ecrit-security-threats-00.txt Henning Schulzrinne, Raj Shanmugam, Hannes.
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
SHIP: Performance Reference: “SHIP mobility management hybrid SIP-HIP scheme” So, J.Y.H.; Jidong Wang; Jones, D.; Sixth International Conference on
HIP-Based NAT Traversal in P2P-Environments
Preferred Alternatives for Tunnelling HIP (PATH)
Class 4 & Class 5 Softswitch
Preferred Alternatives for Tunnelling HIP (PATH)
In-network Support for VoIP and Multimedia Applications
Hannes Tschofenig, Henning Schulzrinne, Bernard Aboba
LOCSER + HIP draft-hautakorpi-p2psip-peer-protocol-00
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
Evaluating Proxy Caching Algorithms in Mobile Environments
LbyR discussion Henning Schulzrinne Hannes Tschofenig Richard Barnes
IETF 105 HotRFC: Trustworthy Multipurpose Remote ID
BINDing URIs to SIP AORs
Presentation transcript:

Can SIP benefit from HIP (or vice versa)? Exchanging Host Identities in SIP Hannes Tschofenig, Vesa Torvinen, Joerg Ott, Henning Schulzrinne, Tom Henderson, Gonzalo Camarillo

Scope SIP / RTP Proxy SIP Signaling Traffic — Securing SIP signaling using HIP — Traversing NATs/Firewalls located between SIP proxies using HIP — Exchanging Host Identities in SIP between the end points — Using HITs instead of IP addresses or FQDNs in SIP/SDP Data Traffic — Securing the end-to-end communication via HIP (using IPsec or ???) — E2E NAT/Firewall traversal — Multi-homing and mobility capabilities SIP Trapezoid Proxy

Draft Content Exchanging Host Identities in SIP Host Identities / Host Identity Tags are exchanged in HIP (via SIP hops) End-to-end communication experiences HIP benefits Host Identities can be tight to the SIP URIs Cached locally at the end host (for future communication) "Purpose-Built-Key Idea" HIP Exchange Proxy SIP Proxy HIT/HI AliceBob RTP (SIP,...) HIT/HI

Next Steps Investigating the details — Draft mentions the usefulness of replacing IP addresses with Host Identities. Implementation work