Download presentation
Presentation is loading. Please wait.
Published byNaomi Justina Curtis Modified over 9 years ago
1
IETF70, Vancouver, December 2007draft-wing-sip-identity-media-011 SIP Identity using Media Path draft-wing-sip-identity-media-01 Dan Wing, dwing@cisco.com Hadriel Kaplan, hkaplan@acmepacket.com
2
IETF70, Vancouver, December 2007draft-wing-sip-identity-media-012 IPR Notice Cisco has claimed IPR on this technique http://www1.ietf.org/ietf/IPR/cisco-ipr-draft-wing-sip-identity-media-00.txt
3
IETF70, Vancouver, December 2007draft-wing-sip-identity-media-013 Motivation: SBCs Break SIP-Identity (RFC4474) Signatures RFC4474 signs the SIP body –including SDP SBCs rewrite SDP (m=/c= lines) Requirement Identity should survive rewriting of SDP
4
IETF70, Vancouver, December 2007draft-wing-sip-identity-media-014 Retaining Identity SIP-Identity-Media retains the originating domain’s signature Works with SBCs that modify SDP SIP-Identity-Media dwing@cisco.com +14085255314@cisco.com SIP-Identity (RFC4474) dwing%cisco.com@sp1.example.com +14085255314@sp1.example.net +14085255314@sp2.example.net
5
IETF70, Vancouver, December 2007draft-wing-sip-identity-media-015 Diagram of Operation Domain A Domain B Service Provider(s) 1. Sign user’s identity dwing@cisco.com +14085551212@cisco.com 2. Validate signature 3. Perform ICE, TLS, DTLS-SRTP, or HIP on media path SBC SIP Proxy SBC
6
IETF70, Vancouver, December 2007draft-wing-sip-identity-media-016 Call Flow Domain-A Domain-B Auth. Auth. Endpoint-A Service SBCs Service Endpoint-B | | | | | 1. |--Invite->| | | | 2. | sign | | | 3. | |-Invite-->|-Invite-->| | 4. | | | validate | 5. | | | |-------->| 6. | | 7. | | | | validate 8. | | | | ring phone | | | | |
7
IETF70, Vancouver, December 2007draft-wing-sip-identity-media-017 Questions draft-wing-sip-identity-media-01 Dan Wing, dwing@cisco.com Hadriel Kaplan, hkaplan@acmepacket.com
8
IETF70, Vancouver, December 2007draft-wing-sip-identity-media-018 Backup Slides
9
IETF70, Vancouver, December 2007draft-wing-sip-identity-media-019 Technical Differences from SIP-Identity (RFC4474) Replay protection requires running ICE (with extension), DTLS-SRTP, TLS, or HIP –On endpoint or domain-operated SBC –Firewalls or SBCs may block media path until ‘200 Ok’ Avoids public key operations for intermediate domains (service providers) Endpoint does a public key operation –Might already be doing it (DTLS-SRTP, HIP)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.