50 likes | 62 Views
Are “proxies” trusted?. What are intermediaries authorized to do? For example, RFC3261 allows only the target domain of a request to retarget More famously, intermediaries can’t modify bodies, etc These fundamental authorization concepts are not explicit in RFC3261
E N D
Are “proxies” trusted? • What are intermediaries authorized to do? • For example, RFC3261 allows only the target domain of a request to retarget • More famously, intermediaries can’t modify bodies, etc • These fundamental authorization concepts are not explicit in RFC3261 • “Everything that is not prevented by mechanism tends to be permitted in practice” • The reality is that SIP proxy servers behave as if UACs have no authority to exert any policy controls over the handling of their requests • The unenforcability of these restrictions creates security weaknesses for SIP • Because we allow for intermediaries, we also allow for attackers
Retargeting creates insecurity • Service hijacking • Hotel proxy retargets all requests for Pizza Hut to Domino’s • Response identity • Unanticipated respondent • Establishment of security parameters • Choosing keys for crypto when retargeting is possible • Blacklist circumvention (“consent”) • If I don’t want to be called by someone, why on earth would I want to call them? • Transitivity • Proliferation of intermediaries obscure trust and force UAs to operate on hearsay
Benefits of retargeting • Messaging efficiency • Less RTTs/messages sent • Target set privacy • Concealing location service mappings from UAs • Target set ordering enforcement • Sequential forking • Dialog control • Billing, third-party session termination of various kinds, etc • NAT Traversal for signaling • An absolute requirement
Requirements • It MUST be possible for a UAC to detect when a request has been retargeted. • A domain that changes the target of a request MUST be capable of informing the UAC of the new target(s). • The mechanism MUST allow simple intradomain retargeting in cases where persistent TLS connections are used as a NAT traversal mechanism. • It must be possible for a domain that changes the target of a request to inform the UAC of the new target(s) prior to contacting any of the new target(s). There MUST furthermore be a way for intermediaries to determine when UACs require prior information about new targets. • It MUST be possible to preserve the privacy of targets and potential targets of requests. • It MUST be possible to preserve the ordering of a target set desired by the domain that changes the target of a request.
What is the solution space? • Strategy 1: Provide a causal trace of intermediary agency after the fact • E.g., Request History (post-facto authorization at UAC) • Each intermediary sending a backwards-direction NOTIFY (i.e., an implicit SUBSCRIBE) • Strategy 2: Let the UAC explore new targets for a request rather than an intermediary • E.g., Redirection (before the fact authorization at UAC) • Spidering contacts via presence before sending a “real” request