70 likes | 90 Views
SIP and HIP. < draft-tschofenig-hiprg-host-identities-02.txt > H. Tschofenig, J. Ott, H. Schulzrinne, T. Henderson, G. Camarillo <draft-tschofenig-hiprg-hip-srtp-01.txt> H. Tschofenig, F. Muenz, M. Shanmugam. J. F. M. A. M. J. J. A. S. O. N. D. 2004. J. F. M. A. M. J. J.
E N D
SIP and HIP <draft-tschofenig-hiprg-host-identities-02.txt> H. Tschofenig, J. Ott, H. Schulzrinne, T. Henderson, G. Camarillo <draft-tschofenig-hiprg-hip-srtp-01.txt> H. Tschofenig, F. Muenz, M. Shanmugam
J F M A M J J A S O N D 2004 J F M A M J J A S O N D 2005 Timeline Indiv-02 Indiv-01 Indiv-00 IETF#64 hiprg-host-identities hiprg-hip-srtp Indiv-00 Indiv-01
SIP – HIP InteractionBig Picture • Analysis where HIP could be useful. • SIP seems to be a prime application. Investigated aspects: • Mobility / Multi-homing • Middlebox Traversal • Denial of Service Prevention • Exchanging Host Identities with SIP • SRTP and HIP
HIP usage in SIP HIT/HI HIT/HI HIT/HI Proxy Proxy • Host Identities / Host Identity Tags are exchanged in HIP (via SIP hops) • Various mechanisms can be used to prevent MITM attacks • Example: Authenticated Identity Body • End-to-end communication experiences HIP benefits • Benefit: • Multi-homing and mobility due to locator / identifier split SIP SIP SIP HIP Exchange RTP/RTCP/SIP Alice Bob
SRTP and HIP • IPsec protection for media traffic is suboptimal with regard to compression • Instead of IPsec SA establishment an SRTP SA will be negotiated and established. • Challenge: • Export SRTP parameters and keying material from HIP daemon to SIP/SRTP daemon
Next Steps • Split analysis from solution specific part • Solicit feedback