Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Media Session Authorization Dan Wing draft-wing-session-auth-00.txt.

Similar presentations


Presentation on theme: "1 Media Session Authorization Dan Wing draft-wing-session-auth-00.txt."— Presentation transcript:

1 1 Media Session Authorization Dan Wing dwing@cisco.com draft-wing-session-auth-00.txt

2 2 IPR Declaration Cisco will be declaring IPR on draft-wing-session-auth-00.txt

3 3 Session Authorization Overview Authorize UDP Media Sessions –Uses username/passwords of ICE –Authority comes from call controller Natural packet routing –No NAT, no SBC –Allows multihomed networks No topology awareness No topology constraints

4 4 ICE Overview Interactive Connectivity Establishment –Useful for traversing NATs Per-flow usernames (and passwords) are exchanged in ICE signaling To verify connectivity, ICE endpoints send the username in media path –STUN Request / Reply (RFC3489)

5 5 Media Session Authorization Per-call username is seen by SIP proxy SIP proxy gives policy server call info. Firewall identifies STUN Request Firewall asks policy server to authorize flow Firewall opens pinhole Result: secure authorization of a legitimate flow

6 6 ICE with Policy Authorization, Slide 1 Alice Bob FW-BFW-A Bob's Call Controller Alice's Call Controller STUN Request 2 5 INVITE From: Alice To: Bob IP=X, UDP=x, Token=A1 1 79 8 11 12 X, x Alice’s Policy Server Bob’s Policy Server 3 4 610 informational

7 7 ICE with Policy Authorization, Slide 2 Alice Bob FW-BFW-A 13 14 16 SIP 183 or 200 From: Bob To: Alice IP=Z, UDP=z, Token=B1 15 STUN Response Bob's Call Controller Alice's Call Controller No external authorization check is necessary because the same STUN transaction-id and (flipped) 5-tuple are in STUN Request and Response

8 8 Asymmetric Routing: Problem Firewall can’t learn about bi-directional flow, because it only sees one direction –Thus, can’t use transaction-id and 5-tuple to authorize STUN Response message Firewall-AtlantaFirewall-Dallas Gateway

9 9 Asymmetric Routing: Approach A Firewall asks policy server about STUN Responses, too –Continue using same protocol –Solution A causes additional STUN Request/Response delay

10 10 Approach A (slide 1) Alice Bob FW-B-1FW-A Bob's Call Controller Alice's Call Controller STUN Request 2 5 INVITE From: Alice To: Bob IP=X, UDP=x, Token=A1 1 79 8 11 12 X, x Alice’s Policy Server Bob’s Policy Server 3 4 610 FW-B-2 informational

11 11 FW-B-2 Approach A (slide 2) Alice Bob FW-B-1FW-A Bob's Call Controller Alice's Call Controller Alice’s Policy Server Bob’s Policy Server 183 or 200 From: Bob To: Alice IP=Z, UDP=z, Token=B1 13 17 14 15 1618 19 Z, z STUN Response informational

12 12 Asymmetric Routing: Approach B Tell other firewalls about every valid STUN transaction-id –Example: secure multicast protocol (GDOI?) –Optimization 1: tell firewalls that might need to know (but how do you know?) –Optimization 2: firewalls only need to remember authorized STUN transaction-id for a short time (5-10 seconds) –Solution B adds more state to firewalls

13 13 Approach B Alice Bob FW-B-1FW-A Bob's Call Controller Alice's Call Controller STUN Request 2 5 INVITE From: Alice To: Bob IP=X, UDP=x, Token=A1 1 79 8 11 12 X, x Alice’s Policy Server Bob’s Policy Server 3 4 610 FW-B-2 6a FW-B-3 FW-B-4 informational

14 14 FW-B-2 Solution B: Tell Firewall (slide 2) Alice Bob FW-B-1FW-A Bob's Call Controller Alice's Call Controller Alice’s Policy Server Bob’s Policy Server 183 or 200 From: Bob To: Alice IP=Z, UDP=z, Token=B1 13 17 14 15 16 19 STUN Response FW-B-2 needs no external authorization check because the same STUN transaction-id and (flipped) 5-tuple are in STUN Request and Response FW-B-3 FW-B-4 FW-B-3 and FW- B-4 time out the STUN transaction-id aggressively (5- 10 seconds) informational

15 15 Features No topology awareness Supports multi-homed networks –Including asymmetric routing

16 16 Drawbacks Endpoints must cooperate in the scheme ICE-capable endpoints cooperate as a side-effect of their normal ICE operation –Note well: Only a portion of ICE is needed -- only the exchange of tokens in signaling and the STUN Request/Response in media

17 17 Going Forward Standardize interfaces –SIP proxy to Policy Server –Policy Server to Firewall Decide on approach A or B for multihomed asymmetric routing


Download ppt "1 Media Session Authorization Dan Wing draft-wing-session-auth-00.txt."

Similar presentations


Ads by Google