SlideShare a Scribd company logo
1
SIP WG meeting
73rd IETF - Minneapolis, MN, USA
November, 2008
Return Routability Check
draft-kuthan-sip-derive-00
Jiri Kuthan Jiri.Kuthan@tekelec.com
Dorgham Sisalem Dorgham.Sisalem@tekelec.com
Raphael Coeffic Raphael.Coeffic@tekelec.com
Victor Pascual Victor.Pascual@tekelec.com
2
Problem statement
• When someone is calling you, you ‘d like to be
able to know the identity of the caller
– “who are you?”
• But this is not always possible to determine
– draft-elwell-sip-e2e-identity-important
• Are we comfortable enough to answer the
question “are you calling me?” by determining:
– whoever is calling me (even unknown party) can be reached at
the address it is claiming in the From header field
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
3
Return Routability Check in a
nutshell
• It is a simple “better-than-nothing“ approach to
URI verification
– End-to-end solution based on SIP routing
• It leverages the location service retargeting
– No trust models
– No additional infrastructures apart from what it takes
to route the INVITE message
• It is NOT a solution for the whole identity
problem
• It does not determine identity (“who are you?”), just the
source URI of the call (“are you calling me?”)
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
4
Known Limitations
• It can at best confirm URI veracity. DERIVE
cannot provide a refute claim
• Reverse Routability is known not to be available
in many cases
– unregistered phone, call forwarding, etc.
• Additional latency in call setup
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
5
Security Considerations
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
• Reliance on security of the Registrar, DNS
and IP routing systems
• DoS opportunity with indirection
– DERIVE allows attacker to drive other UAs to
send DERIVE requests to a victim
• Privacy
– In the absence of some sort of authorization
mechanism it can reveal sensitive information
6
Open Issues (1/3):
Is Dialog Package Usable for This?
• Dialog package support exists
• Interpretations differ in how they may implement the
negative case: “4xx vs empty NOTIFY”
• Only for INVITE-initiated dialogs
• If we don't re-use the dialog event package
– we need to find some other widely-deployed and well-
defined UA behavior that we can leverage
– or we need to define new behavior on both the caller
and callee equipment
• new method for call-back validation?
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
7
Open Issues (2/3):
B2BUA traversal
• There is no normative reference in B2BUA
behavior we can lean upon and which
would be guaranteed to travel end-to-end
• Possible solutions:
–“if you break it, you fix it” (if you are
lucky to be on the reverse path)
–start working on a token that normatively
survives B2BUA traversal
• draft-kaplan-sip-session-id
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
8
Open Issues (3/3):
PSTN interworking
• SIP URIs (even with telephone numbers)
verifiable with the originating domain using
DERIVE
• Unlike TEL URIs which are not clearly
associated with an owner
• Do you think it makes sense to attack the TEL
URIs?
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
9
WG Survey
• Who thinks that life is good without a light-weight
way to verify a SIP URI? (and who thinks it
isn’t?)
• If folks see the problem, who thinks that reverse
URI checking can help to solve it? (not
necessarily based on the dialog-package)
• And out of those who would actually like to
contribute to this?
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
10
BACKUP
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
11
A proposed solution
• Use SIP to ask the caller as claimed in From URI “are you
calling me”?
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
atlanta.com biloxi.com bob@biloxi.comalice@atlanta.com
Call
Call
Call
Are you calling me?
Are you calling me?
Yes
Yes
Ring
Ring
Ring
12
A Proposed Solution (cont.)
• A subscription to the Dialog event package is used to check if the UA
registered at the AOR in the “From” header is aware of the call.
• The subscription is restricted to the “half-dialog” formed by Call-ID and
From-tag from the INVITE.
• For this, a SUBSCRIBE message is sent to the AOR in the “From” header
field from the original INVITE.
• Depending on the result of the subscription, we conclude that the “From”
was legitimate, or that we do not know exactly.
• Assumptions:
– The Location Service at atlanta.com (caller’s domain) is somehow trustworthy
– Alice is currently registered at atlanta.com
– IP routing and DNS are not compromised
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
13
A Proposed Solution (cont.)
Provisional responses are omitted from the illustration for the sake of clarity
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
14
Related work
• Return routability check:
– draft-wing-sip-e164-rrc
• Identity:
– RFC 4474, RFC 3325, RFC 3893, RFC 4916
– draft-ietf-sipping-update-pai
– draft-elwell-sip-identity-handling-ua
– draft-elwell-sip-e2e-identity-important
– draft-york-sip-visual-identifier-trusted-identity
– draft-ietf-sip-privacy
– draft-kaplan-sip-asserter-identity
• Issues with e164 URIs:
– draft-elwell-sip-e164-problem-statement
• Identity / security on the media path:
– draft-fischer-sip-e2e-sec-media (expired)
– draft-wing-sip-identity-media (expired)
... And many others
{Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73

More Related Content

PPTX
WebRTC standards overview -- WebRTC Barcelona Meetup MWC16
PDF
IETF 78 - Alto - Server Discovery
PDF
PFPファシグラ(2009/07/03)
PDF
Live Streaming over P2PSIP
PPT
IETF-71 P2PSIP Clients
PDF
International SIP conference 2009
PPT
Green Guerrillas Youth Media Tech Collective Ona Move
PDF
WebRTC from the service provider prism
WebRTC standards overview -- WebRTC Barcelona Meetup MWC16
IETF 78 - Alto - Server Discovery
PFPファシグラ(2009/07/03)
Live Streaming over P2PSIP
IETF-71 P2PSIP Clients
International SIP conference 2009
Green Guerrillas Youth Media Tech Collective Ona Move
WebRTC from the service provider prism

Similar to IETF-73 SIP Derive (20)

PPTX
Battling Robocall Fraud with STIR/SHAKEN
PPT
Sinnreich Henry Johnston Alan Pt 3
PDF
Battling Robocall Fraud with STIR/SHAKEN
PPT
IETF-76 SIP Identity Adhoc
PDF
Analysis of VoIP Forensics with Digital Evidence Procedure
PPT
Sinnreich Henry Johnston Alan Pt 1
PDF
SIP & TLS - a very brief overview for the POSH BOF at IETF 87
PPT
BLISS Problem Statement and Motivation
PPT
Presentation To Vo Ip Round Table V2
PPT
Authenticated Identites in VoIP Call Control
PPT
Securty Issues from 1999
PDF
STIR-SHAKEN Top 10 FAQ
ODP
Communication Privacy for Free Societies at Harvard
PPTX
STIR-SHAKEN Top 10 FAQ
PDF
Securing Voice Communication
PPTX
Advanced RingCentral API Use Cases
PDF
D basic flows-routing-issues-vt00r00
PPT
SIP for geeks
PDF
Watch out - The Norwegian Version
PDF
LinuxCon North America: SIPPing from the Open Source Well
Battling Robocall Fraud with STIR/SHAKEN
Sinnreich Henry Johnston Alan Pt 3
Battling Robocall Fraud with STIR/SHAKEN
IETF-76 SIP Identity Adhoc
Analysis of VoIP Forensics with Digital Evidence Procedure
Sinnreich Henry Johnston Alan Pt 1
SIP & TLS - a very brief overview for the POSH BOF at IETF 87
BLISS Problem Statement and Motivation
Presentation To Vo Ip Round Table V2
Authenticated Identites in VoIP Call Control
Securty Issues from 1999
STIR-SHAKEN Top 10 FAQ
Communication Privacy for Free Societies at Harvard
STIR-SHAKEN Top 10 FAQ
Securing Voice Communication
Advanced RingCentral API Use Cases
D basic flows-routing-issues-vt00r00
SIP for geeks
Watch out - The Norwegian Version
LinuxCon North America: SIPPing from the Open Source Well
Ad

More from Victor Pascual Ávila (20)

PPTX
IETF98 - 3rd-Party Authentication for SIP
PDF
IETF meeting - SIP OAuth use cases
PDF
WebRTC standards update (April 2015)
PDF
Upperside WebRTC conference - WebRTC intro
PDF
WebRTC standards update - November 2014
PDF
Guidelines to support RTCP end-to-end in Back-to-Back User Agents (B2BUAs)
PDF
DTLS-SRTP Handling in SIP B2BUAs
PDF
WebRTC Standards Update (October 2014)
PPTX
IETF 90 - DTLS-SRTP Handling in SIP B2BUAs
PDF
IETF 90 -- Guidelines to support RTCP end-to-end in SIP Back-to-Back User Age...
PDF
WebRTC standards update (Jul 2014)
PPTX
Digital Services Congress - OTT track - WebRTC panel: "Will WebRTC Mean a Mor...
PDF
WebRTC standards update (April 2014)
PDF
WebRTC DataChannels demystified
PDF
IMS Value in a World of WebRTC and Mobile -- WebRTC Expo, Santa Clara, CA (No...
PDF
Realistic Future Service Provider Opportunities -- WebRTC Expo, Santa Clara, ...
PDF
WebRTC standards update (13 Nov 2013)
PDF
WebRTC Standards -- The 10 Minutes guide
PDF
WebRTC and VoIP: bridging the gap (Kamailio world conference 2013)
PDF
Telco-OTT: infrastructure challenges and solutions
IETF98 - 3rd-Party Authentication for SIP
IETF meeting - SIP OAuth use cases
WebRTC standards update (April 2015)
Upperside WebRTC conference - WebRTC intro
WebRTC standards update - November 2014
Guidelines to support RTCP end-to-end in Back-to-Back User Agents (B2BUAs)
DTLS-SRTP Handling in SIP B2BUAs
WebRTC Standards Update (October 2014)
IETF 90 - DTLS-SRTP Handling in SIP B2BUAs
IETF 90 -- Guidelines to support RTCP end-to-end in SIP Back-to-Back User Age...
WebRTC standards update (Jul 2014)
Digital Services Congress - OTT track - WebRTC panel: "Will WebRTC Mean a Mor...
WebRTC standards update (April 2014)
WebRTC DataChannels demystified
IMS Value in a World of WebRTC and Mobile -- WebRTC Expo, Santa Clara, CA (No...
Realistic Future Service Provider Opportunities -- WebRTC Expo, Santa Clara, ...
WebRTC standards update (13 Nov 2013)
WebRTC Standards -- The 10 Minutes guide
WebRTC and VoIP: bridging the gap (Kamailio world conference 2013)
Telco-OTT: infrastructure challenges and solutions
Ad

IETF-73 SIP Derive

  • 1. 1 SIP WG meeting 73rd IETF - Minneapolis, MN, USA November, 2008 Return Routability Check draft-kuthan-sip-derive-00 Jiri Kuthan Jiri.Kuthan@tekelec.com Dorgham Sisalem Dorgham.Sisalem@tekelec.com Raphael Coeffic Raphael.Coeffic@tekelec.com Victor Pascual Victor.Pascual@tekelec.com
  • 2. 2 Problem statement • When someone is calling you, you ‘d like to be able to know the identity of the caller – “who are you?” • But this is not always possible to determine – draft-elwell-sip-e2e-identity-important • Are we comfortable enough to answer the question “are you calling me?” by determining: – whoever is calling me (even unknown party) can be reached at the address it is claiming in the From header field {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
  • 3. 3 Return Routability Check in a nutshell • It is a simple “better-than-nothing“ approach to URI verification – End-to-end solution based on SIP routing • It leverages the location service retargeting – No trust models – No additional infrastructures apart from what it takes to route the INVITE message • It is NOT a solution for the whole identity problem • It does not determine identity (“who are you?”), just the source URI of the call (“are you calling me?”) {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
  • 4. 4 Known Limitations • It can at best confirm URI veracity. DERIVE cannot provide a refute claim • Reverse Routability is known not to be available in many cases – unregistered phone, call forwarding, etc. • Additional latency in call setup {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
  • 5. 5 Security Considerations {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73 • Reliance on security of the Registrar, DNS and IP routing systems • DoS opportunity with indirection – DERIVE allows attacker to drive other UAs to send DERIVE requests to a victim • Privacy – In the absence of some sort of authorization mechanism it can reveal sensitive information
  • 6. 6 Open Issues (1/3): Is Dialog Package Usable for This? • Dialog package support exists • Interpretations differ in how they may implement the negative case: “4xx vs empty NOTIFY” • Only for INVITE-initiated dialogs • If we don't re-use the dialog event package – we need to find some other widely-deployed and well- defined UA behavior that we can leverage – or we need to define new behavior on both the caller and callee equipment • new method for call-back validation? {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
  • 7. 7 Open Issues (2/3): B2BUA traversal • There is no normative reference in B2BUA behavior we can lean upon and which would be guaranteed to travel end-to-end • Possible solutions: –“if you break it, you fix it” (if you are lucky to be on the reverse path) –start working on a token that normatively survives B2BUA traversal • draft-kaplan-sip-session-id {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
  • 8. 8 Open Issues (3/3): PSTN interworking • SIP URIs (even with telephone numbers) verifiable with the originating domain using DERIVE • Unlike TEL URIs which are not clearly associated with an owner • Do you think it makes sense to attack the TEL URIs? {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
  • 9. 9 WG Survey • Who thinks that life is good without a light-weight way to verify a SIP URI? (and who thinks it isn’t?) • If folks see the problem, who thinks that reverse URI checking can help to solve it? (not necessarily based on the dialog-package) • And out of those who would actually like to contribute to this? {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
  • 10. 10 BACKUP {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
  • 11. 11 A proposed solution • Use SIP to ask the caller as claimed in From URI “are you calling me”? {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73 atlanta.com biloxi.com bob@biloxi.comalice@atlanta.com Call Call Call Are you calling me? Are you calling me? Yes Yes Ring Ring Ring
  • 12. 12 A Proposed Solution (cont.) • A subscription to the Dialog event package is used to check if the UA registered at the AOR in the “From” header is aware of the call. • The subscription is restricted to the “half-dialog” formed by Call-ID and From-tag from the INVITE. • For this, a SUBSCRIBE message is sent to the AOR in the “From” header field from the original INVITE. • Depending on the result of the subscription, we conclude that the “From” was legitimate, or that we do not know exactly. • Assumptions: – The Location Service at atlanta.com (caller’s domain) is somehow trustworthy – Alice is currently registered at atlanta.com – IP routing and DNS are not compromised {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
  • 13. 13 A Proposed Solution (cont.) Provisional responses are omitted from the illustration for the sake of clarity {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73
  • 14. 14 Related work • Return routability check: – draft-wing-sip-e164-rrc • Identity: – RFC 4474, RFC 3325, RFC 3893, RFC 4916 – draft-ietf-sipping-update-pai – draft-elwell-sip-identity-handling-ua – draft-elwell-sip-e2e-identity-important – draft-york-sip-visual-identifier-trusted-identity – draft-ietf-sip-privacy – draft-kaplan-sip-asserter-identity • Issues with e164 URIs: – draft-elwell-sip-e164-problem-statement • Identity / security on the media path: – draft-fischer-sip-e2e-sec-media (expired) – draft-wing-sip-identity-media (expired) ... And many others {Jiri.Kuthan, Dorgham.Sisalem, Raphael.Coeffic, Victor.Pascual}@tekelec.com IETF73