| < draft-tschofenig-hiprg-host-identities-02.txt | draft-tschofenig-hiprg-host-identities-03.txt > | |||
|---|---|---|---|---|
| HIPRG H. Tschofenig | HIPRG H. Tschofenig | |||
| Internet-Draft Siemens | Internet-Draft Siemens | |||
| Expires: January 19, 2006 J. Ott | Expires: September 7, 2006 J. Ott | |||
| Universitaet Bremen | Helsinki University of Technology | |||
| H. Schulzrinne | H. Schulzrinne | |||
| Columbia U. | Columbia U. | |||
| T. Henderson | T. Henderson | |||
| The Boeing Company | The Boeing Company | |||
| G. Camarillo | G. Camarillo | |||
| Ericsson | Ericsson | |||
| July 18, 2005 | March 6, 2006 | |||
| Interaction between SIP and HIP | Interaction between SIP and HIP | |||
| draft-tschofenig-hiprg-host-identities-02.txt | draft-tschofenig-hiprg-host-identities-03.txt | |||
| Status of this Memo | Status of this Memo | |||
| By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||
| applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||
| have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||
| aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
| skipping to change at page 1, line 41 ¶ | skipping to change at page 1, line 41 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on January 19, 2006. | This Internet-Draft will expire on September 7, 2006. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (C) The Internet Society (2005). | Copyright (C) The Internet Society (2006). | |||
| Abstract | Abstract | |||
| This document investigates the interworking between the Session | This document investigates the interworking between the Session | |||
| Initiation Protocol (SIP) and the Host Identity Protocol (HIP) and | Initiation Protocol (SIP) and the Host Identity Protocol (HIP) and | |||
| the benefits that may arise from their combined operation. | the benefits that may arise from their combined operation. | |||
| The aspect of exchanging Host Identities (or Host Identity Tags) in | The aspect of exchanging Host Identities (or Host Identity Tags) in | |||
| SIP/SDP for later usage with the Host Identity Protocol Protocol | SIP/SDP for later usage with the Host Identity Protocol Protocol | |||
| (HIP) is described in more detail as an example of this interworking. | (HIP) is described in more detail as an example of this interworking. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 6 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 3. Exchanging Host Identities with SIP . . . . . . . . . . . . . 7 | 3. Exchanging Host Identities with SIP . . . . . . . . . . . . . 7 | |||
| 3.1 Concept . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 3.1. Concept . . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 3.2 SDP Extension . . . . . . . . . . . . . . . . . . . . . . 8 | 3.2. SDP Extension . . . . . . . . . . . . . . . . . . . . . . 8 | |||
| 3.3 Example . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 3.3. Example . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 4. Security Considerations . . . . . . . . . . . . . . . . . . . 19 | 4. Security Considerations . . . . . . . . . . . . . . . . . . . 19 | |||
| 5. Open Issues . . . . . . . . . . . . . . . . . . . . . . . . . 20 | 4.1. UPDATE . . . . . . . . . . . . . . . . . . . . . . . . . . 19 | |||
| 6. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 21 | 4.2. SIPS . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 | |||
| 7. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 22 | 4.3. S/MIME . . . . . . . . . . . . . . . . . . . . . . . . . . 20 | |||
| 8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 23 | 4.4. Single-sided Verification . . . . . . . . . . . . . . . . 20 | |||
| 8.1 Normative References . . . . . . . . . . . . . . . . . . . 23 | 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 22 | |||
| 8.2 Informative References . . . . . . . . . . . . . . . . . . 23 | 6. Open Issues . . . . . . . . . . . . . . . . . . . . . . . . . 23 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 25 | 7. Contributors . . . . . . . . . . . . . . . . . . . . . . . . . 24 | |||
| Intellectual Property and Copyright Statements . . . . . . . . 27 | 8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 25 | |||
| 9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 26 | ||||
| 9.1. Normative References . . . . . . . . . . . . . . . . . . . 26 | ||||
| 9.2. Informative References . . . . . . . . . . . . . . . . . . 26 | ||||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 29 | ||||
| Intellectual Property and Copyright Statements . . . . . . . . . . 31 | ||||
| 1. Introduction | 1. Introduction | |||
| SIP [1] enables a pair of user agents to establish and maintain | SIP [1] enables a pair of user agents to establish and maintain | |||
| sessions. The communication typically involves SIP proxies before | sessions. The communication typically involves SIP proxies before | |||
| prior to communication between the end points taking place. As part | prior to communication between the end points taking place. As part | |||
| of the initial exchange, a number of parameters are exchanged. | of the initial exchange, a number of parameters are exchanged. | |||
| Certain of these parameters are relevant to security. Examples of | Certain of these parameters are relevant to security. Examples of | |||
| such parameters are keying material and other cryptographic | such parameters are keying material and other cryptographic | |||
| information that is used in order to establish a security association | information that is used in order to establish a security association | |||
| skipping to change at page 7, line 7 ¶ | skipping to change at page 7, line 7 ¶ | |||
| as described in Section 3. | as described in Section 3. | |||
| 2. Terminology | 2. Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in RFC 2119 [5]. | document are to be interpreted as described in RFC 2119 [5]. | |||
| 3. Exchanging Host Identities with SIP | 3. Exchanging Host Identities with SIP | |||
| 3.1 Concept | 3.1. Concept | |||
| In order to provide security between two HIP end hosts beyond | In order to provide security between two HIP end hosts beyond | |||
| opportunistic encryption it is necessary to securely retrieve the | opportunistic encryption it is necessary to securely retrieve the | |||
| Host Identities. A number of mechanisms can be used including | Host Identities. A number of mechanisms can be used including | |||
| directories (such as DNS) or more advanced concepts for example based | directories (such as DNS) or more advanced concepts for example based | |||
| on Distributed Hash Tables typically used in peer-to-peer networks. | on Distributed Hash Tables typically used in peer-to-peer networks. | |||
| This document suggests to exchange the Host Identities (or Host | This document suggests to exchange the Host Identities (or Host | |||
| Identity Tags) as part of the initial SIP exchange inside the SDP | Identity Tags) as part of the initial SIP exchange inside the SDP | |||
| payload. As such, the Host Identities can also be bound to the user | payload. As such, the Host Identities can also be bound to the user | |||
| identities - a concept not used in HIP. | identities - a concept not used in HIP. | |||
| The figure below illustrates the main idea: | Figure 1 illustrates the main idea: | |||
| +-----------+ +-----------+ | +-----------+ +-----------+ | |||
| HI/HIT |SIP | HI/HIT |SIP | HI/HIT | HI/HIT |SIP | HI/HIT |SIP | HI/HIT | |||
| +------>|Proxy |<---------->|Proxy |<------+ | +------>|Proxy |<---------->|Proxy |<------+ | |||
| | |Server X | TLS |Server Y | | | | |Server X | TLS |Server Y | | | |||
| | +-----------+ +-----------+ | | | +-----------+ (+auth.id.)+-----------+ | | |||
| | | | | | | |||
| | TLS or TLS or | | | TLS or TLS or | | |||
| | SIP Digest SIP Digest | | | SIP Digest SIP Digest | | |||
| | | | | (+auth.id.) | | |||
| | | | | | | |||
| v v | v v | |||
| +-----------+ SIP and HIP +-----------+ | +-----------+ SIP and HIP +-----------+ | |||
| |SIP | <---------------------------------> |SIP | | |SIP | <---------------------------------> |SIP | | |||
| |User Agent | RTP |User Agent | | |User Agent | RTP |User Agent | | |||
| |Alice | <=================================> |Bob | | |Alice | <=================================> |Bob | | |||
| +-----------+ +-----------+ | +-----------+ +-----------+ | |||
| Legend: | Legend: | |||
| <--->: Signaling Traffic | <--->: Signaling Traffic | |||
| <===>: Data Traffic | <===>: Data Traffic | |||
| Figure 1: SIP Trapezoid | Figure 1: SIP Trapezoid | |||
| The initial SIP signaling messages between Alice and Bob often take | The initial SIP signaling messages between Alice and Bob often take | |||
| place via the proxy servers. This exchange may be protected with TLS | place via the proxy servers. This exchange may be protected with TLS | |||
| (between SIP proxies but also between SIP UAs and SIP proxies) or | (between SIP proxies but also between SIP UAs and SIP proxies) or | |||
| with SIP digest authentication between SIP UAs and the outbound | with SIP digest authentication between SIP UAs and the outbound | |||
| proxy. Furthermore, SIP end-to-end security mechanisms are also | proxy. Further SIP security mechanisms should be used in combination | |||
| available with S/MIME. | with this proposal. The security consideration section, see | |||
| Section 4, provides a discussion about the possible approaches to | ||||
| secure the Host Identity Tag and to relate it ongoing session. | ||||
| This allows two hosts to securely exchange keys even if there are | This allows two hosts to securely exchange keys even if there are | |||
| only domain-level public and private keys, as well as secure | only domain-level public and private keys, as well as secure | |||
| associations within a domain, thus avoiding the need for a global | associations within a domain, thus avoiding the need for a global | |||
| user-level PKI. | user-level PKI. | |||
| This initial message exchange is used to exchange Host Identities | This initial message exchange is used to exchange Host Identities | |||
| between the end points within the SDP payload. | between the end points within the SDP payload. | |||
| Subsequently, when both user agents Alice and Bob communicate | Subsequently, when both user agents Alice and Bob communicate | |||
| skipping to change at page 8, line 32 ¶ | skipping to change at page 8, line 34 ¶ | |||
| support. | support. | |||
| The security of this approach relies on two properties: | The security of this approach relies on two properties: | |||
| The signaling messages and the data traffic traverse a different | The signaling messages and the data traffic traverse a different | |||
| path. Hence, an adversary needs to be located where it is able to | path. Hence, an adversary needs to be located where it is able to | |||
| see both, the signaling and the the data traffic. | see both, the signaling and the the data traffic. | |||
| The signaling traffic is often protected. | The signaling traffic is often protected. | |||
| 3.2 SDP Extension | 3.2. SDP Extension | |||
| This document proposes to enhance the SDP [6] 'k' or 'a' parameter. | This document proposes to enhance the SDP [6] 'k' or 'a' parameter. | |||
| The 'k' parameter has the following structure: | The 'k' parameter has the following structure: | |||
| k=<method>:<encryption key> | k=<method>:<encryption key> | |||
| This document defines two new method fields: | This document defines two new method fields: | |||
| k=host-identity:<HIP Host Identity> | k=host-identity:<HIP Host Identity> | |||
| skipping to change at page 10, line 5 ¶ | skipping to change at page 10, line 5 ¶ | |||
| the mechanisms from [6]/ [7] would be preferred. | the mechanisms from [6]/ [7] would be preferred. | |||
| SDP only deals with media streams and does not have a notion of | SDP only deals with media streams and does not have a notion of | |||
| user or main device in the background. Hence, the SIP HI(T) may | user or main device in the background. Hence, the SIP HI(T) may | |||
| need to go into SIP signaling (rather than be carried in SDP). | need to go into SIP signaling (rather than be carried in SDP). | |||
| Logically, this appears to belong to the 'Contact:' header which | Logically, this appears to belong to the 'Contact:' header which | |||
| may be conveyed protected in an S/MIME body (signed and | may be conveyed protected in an S/MIME body (signed and | |||
| encrypted). | encrypted). | |||
| 3.3 Example | 3.3. Example | |||
| This example contains the full details of the example session setup | This example contains the full details of the example session setup | |||
| taken from Section 4 of [1]. The message flow is shown in Figure 1 | taken from Section 4 of [1]. The message flow is shown in Figure 1 | |||
| of [1] and resembles the architecture shown in Figure 1. Note that | of [1] and resembles the architecture shown in Figure 1. Note that | |||
| these flows show the minimum required set of header fields; some | these flows show the minimum required set of header fields; some | |||
| other header fields such as Allow and Supported would normally be | other header fields such as Allow and Supported would normally be | |||
| present. | present. | |||
| In our example Alice uses the following Host Identity Tag | In our example Alice uses the following Host Identity Tag | |||
| (7214148E0433AFE2FA2D48003D31172E) and Bob uses | (7214148E0433AFE2FA2D48003D31172E) and Bob uses | |||
| skipping to change at page 19, line 7 ¶ | skipping to change at page 19, line 7 ¶ | |||
| Alice <- Bob: R2: {LSI(R), SPI(R), HMAC}SIG | Alice <- Bob: R2: {LSI(R), SPI(R), HMAC}SIG | |||
| As a result of this exchange, two IPsec SAs (one for each direction) | As a result of this exchange, two IPsec SAs (one for each direction) | |||
| is established. RTP media traffic can be exchanged between the two | is established. RTP media traffic can be exchanged between the two | |||
| end hosts, Alice and Bob, protected by IPsec. If end host mobility | end hosts, Alice and Bob, protected by IPsec. If end host mobility | |||
| takes place then a HIP readdressing exchange takes place which is not | takes place then a HIP readdressing exchange takes place which is not | |||
| detected at the upper layer by UDP/RTP or SIP. | detected at the upper layer by UDP/RTP or SIP. | |||
| 4. Security Considerations | 4. Security Considerations | |||
| The security considerations currently deal with the proposal of | The standard HIP strategy for authenticating the communicating | |||
| exchanging Host Identities within SIP. A future version of this | parties is to give the Initiator and the Responder a Host Identity | |||
| document will investigate security considerations that address other | and to assure the authenticity of the Host Identity via external | |||
| parts of the interworking as well. | mechanisms, such as DNSSEC (if the Host Identities are stored in the | |||
| DNS). The Initiator then verifies the Host Identity and checks its | ||||
| validity. The complexity of ensuring that the Host Identity has not | ||||
| been tampered with is pushed to DNS (and DNSSEC), as the only | ||||
| mechanism specified for ensuring that the public key is genuine. The | ||||
| infrastructure provided for SIP can provide a similar, but more | ||||
| deployment friendly, functionality when combined with already | ||||
| available SIP security mechanisms. | ||||
| This proposal is closely aligned towards the usage of the 'k' | The design described in this document is intended to leverage the | |||
| parameter in SDP [8]. As a difference, an asymmetric key is | authenticity of the signaling channel (while not requiring | |||
| confidentiality). As long as each side of the connection can verify | ||||
| the integrity of the SDP INVITE then the HIP base exchange handshake | ||||
| cannot be hijacked via a man-in-the-middle attack. This integrity | ||||
| protection is easily provided by the caller to the callee via the SIP | ||||
| Identity [23] mechanism. However, it is less straightforward for the | ||||
| responder. | ||||
| Ideally Alice would want to know that Bob's SDP had not been tampered | ||||
| with and who it was from so that Alice's User Agent could indicate to | ||||
| Alice that there was a secure phone call to Bob. This is known as the | ||||
| SIP Response Identity problem and is still a topic of ongoing work in | ||||
| the SIP community. When a solution to the SIP Response Identity | ||||
| problem is finalized, it SHOULD be used here. In the meantime there | ||||
| are several approaches that can be used to mitigate this problem: Use | ||||
| UPDATE, Use SIPS, Use S/MIME, and do nothing. Each one is discussed | ||||
| here followed by the security implications of that approach. | ||||
| 4.1. UPDATE | ||||
| In this approach, Bob sends an answer, then immediately follows up | ||||
| with an UPDATE that includes the Host Identity Tag and uses the SIP | ||||
| Identity mechanism to assert that the message is from Bob's. The | ||||
| downside of this approach is that it requires the extra round trip of | ||||
| the UPDATE. However, it is simple and secure even when the proxies | ||||
| are not trusted. | ||||
| 4.2. SIPS | ||||
| In this approach, the signaling is protected by TLS from hop to hop. | ||||
| As long as all proxies are trusted, this provides integrity for the | ||||
| Host Identity Tag. It does not provide a strong assertion of who | ||||
| Alice is communicating with. However, as much as the target domain | ||||
| can be trusted to correctly populate the From header field value, | ||||
| Alice can use that. The security issue with this approach is that if | ||||
| one of the Proxies wished to mount a man-in-the-middle attack, it | ||||
| could convince Alice that she was talking to Bob when really the | ||||
| media was flowing through a man in the middle media relay. However, | ||||
| this attack could not convince Bob that he was taking to Alice. | ||||
| 4.3. S/MIME | ||||
| RFC 3261 [1] defines a S/MIME security mechanism for SIP that could | ||||
| be used to sign that the fingerprint was from Bob. This would be | ||||
| secure. However, so far there have been no deployments of S/MIME for | ||||
| SIP. | ||||
| 4.4. Single-sided Verification | ||||
| In this approach, no integrity is provided for the fingerprint from | ||||
| Bob to Alice. In this approach, an attacker that was on the | ||||
| signaling path could tamper with the fingerprint and insert | ||||
| themselves as a man-in-the-middle on the media. Alice would know | ||||
| that she had a secure call with someone but would not know if it was | ||||
| with Bob or a man-in-the-middle. Bob would know that an attack was | ||||
| happening. The fact that one side can detect this attack means that | ||||
| in most cases where Alice and Bob both wish the communications to be | ||||
| encrypted there is not a problem. Keep in mind that in any of the | ||||
| possible approaches Bob could always reveal the media that was | ||||
| received to anyone. We are making the assumption that Bob also wants | ||||
| secure communications. In this do nothing case, Bob knows the media | ||||
| has not been tampered with or intercepted by a third party and that | ||||
| it is from Alice. Alice knows that she is talking to someone and | ||||
| that whoever that is has probably checked that the media is not being | ||||
| intercepted or tampered with. This approach is certainly less than | ||||
| ideal but very usable for many situations. An alternative available | ||||
| to Alice and Bob is to use human speech to verified each others' | ||||
| identity then verify each others' Host Identity Tags also using human | ||||
| speech. Assuming that it is difficult to impersonate another's | ||||
| speech and seamlessly modify the audio contents of a call, this | ||||
| approach is relatively safe. On the other hand, SIP is not only used | ||||
| for voice communication. | ||||
| Note that this proposal is closely aligned towards the usage of the | ||||
| 'k' parameter in SDP [8]. As a difference, an asymmetric key is | ||||
| exchanged unlike the proposals illustrated in Section 6 of [8]. | exchanged unlike the proposals illustrated in Section 6 of [8]. | |||
| Section 5.12 of [22] is relevant for this discussion. | Section 5.12 of [22] is relevant for this discussion. | |||
| If an adversary aims to impersonate one of the SIP UAs in the | ||||
| subsequent HIP exchange then it is necessary to replace the Host | ||||
| Identity/Host Identity Tag exchanged in the SIP/SDP messages. | ||||
| Please note that this approach is in a certain sense a re- | Please note that this approach is in a certain sense a re- | |||
| instantiation of the Purpose-Built-Key (PBK) idea (see [23]). With | instantiation of the Purpose-Built-Key (PBK) idea (see [24]). With | |||
| PBK a hash of a public key is sent from node A to node B. If there | PBK a hash of a public key is sent from node A to node B. If there | |||
| was no adversary between A and B at that time to modify the | was no adversary between A and B at that time to modify the | |||
| transmitted hash value then subsequent communication interactions | transmitted hash value then subsequent communication interactions | |||
| which use the public key are secure. This proposal reuses the same | which use the public key are secure. This proposal reuses the same | |||
| idea but focuses on the interworking between different protocols. In | idea but focuses on the interworking between different protocols. In | |||
| fact it would be possible to use the same approach to exchange the | fact it would be possible to use the same approach to exchange the | |||
| hash of an S/MIME certificate which can later be used in subsequent | hash of an S/MIME certificate which can later be used in subsequent | |||
| SIP signaling message exchanges. | SIP signaling message exchanges. | |||
| If Host Identities for HIP can be retrieved using a different, more | 5. IANA Considerations | |||
| secure method then the Host Identities exchanged with SIP/SDP MUST | ||||
| NOT be used. | ||||
| 5. Open Issues | ||||
| The authors came accross a number of open issues while thinking about | ||||
| this topic: | ||||
| o The authors discussed the usage of SUBSCRIBE/NOTIFY to distribute | ||||
| Host Identities. This approach is particularly interesting, if | ||||
| Host Identities are subject to frequent change. As such, it would | ||||
| resemble the proposal provided with SIPPING-CERT [24]. Thereby | ||||
| the user agent would be allowed to upload its own Host Identity to | ||||
| the Credential Server. Other user agents would use the SUBSCRIBE | ||||
| method to retrieve Host Identities of a particular user. With the | ||||
| help of the NOTIFY message it is possible to learn about a changed | ||||
| Host Identity (e.g., a revoked HI). It is for further study | ||||
| whether this is more useful than the already described proposal. | ||||
| o Is an IANA registration for the method field required? | ||||
| o Is it possible to carry more than one Host Identity/Host Identity | [Editor's Note: A future version of this document will provide a | |||
| Tag in the SDP payload by listing more than one 'k' parameter? | discussion about IANA considerations.] | |||
| o Further investigations are required with regard to the mobility | 6. Open Issues | |||
| functionality provided by HIP and the potential benefits for end- | ||||
| to-end signaling using SIP, RTP etc. between the SIP UAs. | ||||
| o Middlebox traversal functionality discussed in the context of HIP | A list of open issues can be found at: | |||
| (such as STUN, TURN, ICE) could potentially be replaced by the HIP | http://www.tschofenig.com:8080/sip-hip/ | |||
| middlebox traversal functionality. | ||||
| 6. Contributors | 7. Contributors | |||
| We would like to thank Vesa Torvinen for his contributions to the | We would like to thank Vesa Torvinen for his contributions to the | |||
| initial version of this document. | initial version of this document. | |||
| 7. Acknowledgments | 8. Acknowledgments | |||
| The authors would like to thank Steffen Fries, Aarthi Nagarajan, | The authors would like to thank Steffen Fries, Aarthi Nagarajan, | |||
| Murugaraj Shanmugam, Franz Muenz, Jochen Grimminger and Joachim Kross | Murugaraj Shanmugam, Franz Muenz, Jochen Grimminger and Joachim Kross | |||
| for their feedback. | for their feedback. | |||
| 8. References | The content of the security consideration section is based on DTLS- | |||
| SIP. | ||||
| 8.1 Normative References | 9. References | |||
| 9.1. Normative References | ||||
| [1] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., | [1] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., | |||
| Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP: | Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP: | |||
| Session Initiation Protocol", RFC 3261, June 2002. | Session Initiation Protocol", RFC 3261, June 2002. | |||
| [2] Moskowitz, R., "Host Identity Protocol Architecture", | [2] Moskowitz, R. and P. Nikander, "Host Identity Protocol | |||
| draft-ietf-hip-arch-02 (work in progress), January 2005. | Architecture", draft-ietf-hip-arch-03 (work in progress), | |||
| August 2005. | ||||
| [3] Moskowitz, R., "Host Identity Protocol", draft-ietf-hip-base-03 | [3] Moskowitz, R., "Host Identity Protocol", draft-ietf-hip-base-05 | |||
| (work in progress), June 2005. | (work in progress), March 2006. | |||
| [4] Schulzrinne, H. and E. Wedlund, "Application-Layer Mobility | [4] Schulzrinne, H. and E. Wedlund, "Application-Layer Mobility | |||
| using SIP, ACM MC2R", , July 2000. | using SIP, ACM MC2R", , July 2000. | |||
| [5] Bradner, S., "Key words for use in RFCs to Indicate Requirement | [5] Bradner, S., "Key words for use in RFCs to Indicate Requirement | |||
| Levels", March 1997. | Levels", March 1997. | |||
| [6] Andreasen, F., "Session Description Protocol Security | [6] Andreasen, F., "Session Description Protocol Security | |||
| Descriptions for Media Streams", | Descriptions for Media Streams", | |||
| draft-ietf-mmusic-sdescriptions-11 (work in progress), | draft-ietf-mmusic-sdescriptions-12 (work in progress), | |||
| June 2005. | September 2005. | |||
| [7] Arkko, J., "Key Management Extensions for Session Description | [7] Arkko, J., "Key Management Extensions for Session Description | |||
| Protocol (SDP) and Real Time Streaming Protocol (RTSP)", | Protocol (SDP) and Real Time Streaming Protocol (RTSP)", | |||
| draft-ietf-mmusic-kmgmt-ext-15 (work in progress), June 2005. | draft-ietf-mmusic-kmgmt-ext-15 (work in progress), June 2005. | |||
| [8] Handley, M. and V. Jacobson, "SDP: Session Description | [8] Handley, M. and V. Jacobson, "SDP: Session Description | |||
| Protocol", RFC 2327, April 1998. | Protocol", RFC 2327, April 1998. | |||
| 8.2 Informative References | 9.2. Informative References | |||
| [9] Sparks, R., "The Session Initiation Protocol (SIP) Refer | [9] Sparks, R., "The Session Initiation Protocol (SIP) Refer | |||
| Method", RFC 3515, April 2003. | Method", RFC 3515, April 2003. | |||
| [10] Shacham, R., "Session Initiation Protocol (SIP) Session | [10] Shacham, R., "Session Initiation Protocol (SIP) Session | |||
| Mobility", draft-shacham-sipping-session-mobility-01 (work in | Mobility", draft-shacham-sipping-session-mobility-01 (work in | |||
| progress), July 2005. | progress), July 2005. | |||
| [11] Laganier, J. and L. Eggert, "Host Identity Protocol (HIP) | [11] Laganier, J. and L. Eggert, "Host Identity Protocol (HIP) | |||
| Rendezvous Extension", draft-ietf-hip-rvs-03 (work in | Rendezvous Extension", draft-ietf-hip-rvs-04 (work in | |||
| progress), July 2005. | progress), October 2005. | |||
| [12] Nikander, P., "Host Identity Indirection Infrastructure (Hi3)", | [12] Nikander, P., "Host Identity Indirection Infrastructure (Hi3)", | |||
| draft-nikander-hiprg-hi3-00 (work in progress), June 2004. | draft-nikander-hiprg-hi3-00 (work in progress), June 2004. | |||
| [13] Rosenberg, J., "Simple Traversal of UDP Through Network Address | [13] Rosenberg, J., "Simple Traversal of UDP Through Network Address | |||
| Translators (NAT) (STUN)", draft-ietf-behave-rfc3489bis-01 | Translators (NAT) (STUN)", draft-ietf-behave-rfc3489bis-02 | |||
| (work in progress), February 2005. | (work in progress), July 2005. | |||
| [14] Rosenberg, J., "Traversal Using Relay NAT (TURN)", | [14] Rosenberg, J., "Traversal Using Relay NAT (TURN)", | |||
| draft-rosenberg-midcom-turn-07 (work in progress), | draft-rosenberg-midcom-turn-08 (work in progress), | |||
| February 2005. | September 2005. | |||
| [15] Stiemerling, M., "NAT/Firewall NSIS Signaling Layer Protocol | [15] Stiemerling, M., "NAT/Firewall NSIS Signaling Layer Protocol | |||
| (NSLP)", draft-ietf-nsis-nslp-natfw-06 (work in progress), | (NSLP)", draft-ietf-nsis-nslp-natfw-09 (work in progress), | |||
| May 2005. | February 2006. | |||
| [16] Stiemerling, M., "Middlebox Traversal Issues of Host Identity | [16] Stiemerling, M., "Middlebox Traversal Issues of Host Identity | |||
| Protocol (HIP) Communication", draft-stiemerling-hip-nat-05 | Protocol (HIP) Communication", draft-stiemerling-hip-nat-05 | |||
| (work in progress), July 2005. | (work in progress), July 2005. | |||
| [17] Tschofenig, H., "NAT and Firewall Traversal for HIP", | [17] Tschofenig, H. and M. Shanmugam, "Traversing HIP-aware NATs and | |||
| draft-tschofenig-hiprg-hip-natfw-traversal-01 (work in | Firewalls: Problem Statement and Requirements", | |||
| progress), February 2005. | draft-tschofenig-hiprg-hip-natfw-traversal-03 (work in | |||
| progress), October 2005. | ||||
| [18] Rosenberg, J., "Interactive Connectivity Establishment (ICE): A | [18] Rosenberg, J., "Interactive Connectivity Establishment (ICE): A | |||
| Methodology for Network Address Translator (NAT) Traversal for | Methodology for Network Address Translator (NAT) Traversal for | |||
| Multimedia Session Establishment Protocols", | Offer/Answer Protocols", draft-ietf-mmusic-ice-06 (work in | |||
| draft-ietf-mmusic-ice-04 (work in progress), February 2005. | progress), October 2005. | |||
| [19] Jokela, P., "Using ESP transport format with HIP", | [19] Jokela, P., "Using ESP transport format with HIP", | |||
| draft-ietf-hip-esp-00 (work in progress), July 2005. | draft-ietf-hip-esp-02 (work in progress), March 2006. | |||
| [20] Tschofenig, H., "Using SRTP transport format with HIP", | [20] Tschofenig, H., "Using SRTP transport format with HIP", | |||
| draft-tschofenig-hiprg-hip-srtp-00 (work in progress), | draft-tschofenig-hiprg-hip-srtp-01 (work in progress), | |||
| July 2005. | October 2005. | |||
| [21] Arkko, J., Carrara, E., Lindholm, F., Naslund, M., and K. | [21] Arkko, J., Carrara, E., Lindholm, F., Naslund, M., and K. | |||
| Norrman, "MIKEY: Multimedia Internet KEYing", RFC 3830, | Norrman, "MIKEY: Multimedia Internet KEYing", RFC 3830, | |||
| August 2004. | August 2004. | |||
| [22] Handley, M., "SDP: Session Description Protocol", | [22] Handley, M., "SDP: Session Description Protocol", | |||
| draft-ietf-mmusic-sdp-new-24 (work in progress), February 2005. | draft-ietf-mmusic-sdp-new-26 (work in progress), January 2006. | |||
| [23] Bradner, S., Mankin, A., and J. Schiller, "A Framework for | [23] Peterson, J. and C. Jennings, "Enhancements for Authenticated | |||
| Identity Management in the Session Initiation Protocol (SIP)", | ||||
| draft-ietf-sip-identity-06 (work in progress), October 2005. | ||||
| [24] Bradner, S., Mankin, A., and J. Schiller, "A Framework for | ||||
| Purpose-Built Keys (PBK)", draft-bradner-pbk-frame-06 (work in | Purpose-Built Keys (PBK)", draft-bradner-pbk-frame-06 (work in | |||
| progress), June 2003. | progress), June 2003. | |||
| [24] Jennings, C. and J. Peterson, "Certificate Management Service | [25] Jennings, C. and J. Peterson, "Certificate Management Service | |||
| for The Session Initiation Protocol (SIP)", | for The Session Initiation Protocol (SIP)", | |||
| draft-ietf-sipping-certs-01 (work in progress), February 2005. | draft-ietf-sipping-certs-02 (work in progress), July 2005. | |||
| Authors' Addresses | Authors' Addresses | |||
| Hannes Tschofenig | Hannes Tschofenig | |||
| Siemens | Siemens | |||
| Otto-Hahn-Ring 6 | Otto-Hahn-Ring 6 | |||
| Munich, Bavaria 81739 | Munich, Bavaria 81739 | |||
| Germany | Germany | |||
| Email: Hannes.Tschofenig@siemens.com | Email: Hannes.Tschofenig@siemens.com | |||
| Joerg Ott | Joerg Ott | |||
| Universitaet Bremen | Helsinki University of Technology | |||
| Bibliothekstr. 1 | Otakaari 5A | |||
| Bremen 28359 | Espoo FI-02150 | |||
| Germany | Finland | |||
| Email: jo@tzi.org | Email: jo@netlab.hut.fi | |||
| Henning Schulzrinne | Henning Schulzrinne | |||
| Columbia University | Columbia University | |||
| Department of Computer Science | Department of Computer Science | |||
| 450 Computer Science Building | 450 Computer Science Building | |||
| New York, NY 10027 | New York, NY 10027 | |||
| USA | USA | |||
| Phone: +1 212 939 7042 | Phone: +1 212 939 7042 | |||
| Email: schulzrinne@cs.columbia.edu | Email: schulzrinne@cs.columbia.edu | |||
| skipping to change at page 27, line 41 ¶ | skipping to change at page 31, line 41 ¶ | |||
| This document and the information contained herein are provided on an | This document and the information contained herein are provided on an | |||
| "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS | |||
| OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET | OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET | |||
| ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, | ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, | |||
| INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE | INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE | |||
| INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | |||
| WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | |||
| Copyright Statement | Copyright Statement | |||
| Copyright (C) The Internet Society (2005). This document is subject | Copyright (C) The Internet Society (2006). This document is subject | |||
| to the rights, licenses and restrictions contained in BCP 78, and | to the rights, licenses and restrictions contained in BCP 78, and | |||
| except as set forth therein, the authors retain all their rights. | except as set forth therein, the authors retain all their rights. | |||
| Acknowledgment | Acknowledgment | |||
| Funding for the RFC Editor function is currently provided by the | Funding for the RFC Editor function is currently provided by the | |||
| Internet Society. | Internet Society. | |||
| End of changes. 46 change blocks. | ||||
| 103 lines changed or deleted | 173 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||