Internet DRAFT - draft-srivastava-dispatch-avoidance-of-threats
draft-srivastava-dispatch-avoidance-of-threats
DISPATCH S. Srivastava
Internet-Draft Digitalall
Intended status: Standards Track Oct 5, 2011
Expires: April 7, 2012
Avoidance of Security Issues in SIP and Internet
draft-srivastava-dispatch-avoidance-of-threats-00
Abstract
This memo lists the security issues not addressed by SIPS and other
drafts in progress. It provides two solutions to it. First solution
calls for fixing issues one by one. The second solution avoids the
security issues altogether. It has potential to obviate the need of
'Security Consideration' section from IETF documents. It requires
wider acceptance from the community. Author is requesting IETF
community to voice it's opinion and share the second solution with
non-IETF members also to have their opinion.
Status of this Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on April 7, 2012.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
Srivastava Expires April 7, 2012 [Page 1]
Internet-Draft Avoidance of Threats Oct 2011
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
This document may contain material from IETF Documents or IETF
Contributions published or made publicly available before November
10, 2008. The person(s) controlling the copyright in some of this
material may not have granted the IETF Trust the right to allow
modifications of such material outside the IETF Standards Process.
Without obtaining an adequate license from the person(s) controlling
the copyright in such materials, this document may not be modified
outside the IETF Standards Process, and derivative works of it may
not be created outside the IETF Standards Process, except to format
it for publication as an RFC or to translate it into languages other
than English.
Table of Contents
1. Requirements notation . . . . . . . . . . . . . . . . . . . . . 3
2. Problem Statement . . . . . . . . . . . . . . . . . . . . . . . 3
2.1. Encryption Issues . . . . . . . . . . . . . . . . . . . . . 3
2.2. Non-Encryption Issues . . . . . . . . . . . . . . . . . . . 4
3. Proposed Solutions . . . . . . . . . . . . . . . . . . . . . . 4
3.1. Detecting And Fixing . . . . . . . . . . . . . . . . . . . 4
3.2. Avoidance Of Threats . . . . . . . . . . . . . . . . . . . 5
3.3. Future Work . . . . . . . . . . . . . . . . . . . . . . . . 6
4. Security Considerations . . . . . . . . . . . . . . . . . . . . 6
5. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 6
6. IPR Consideration . . . . . . . . . . . . . . . . . . . . . . . 6
7. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 7
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7
8.1. Normative References . . . . . . . . . . . . . . . . . . . 7
8.2. Informative References . . . . . . . . . . . . . . . . . . 7
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . 7
Srivastava Expires April 7, 2012 [Page 2]
Internet-Draft Avoidance of Threats Oct 2011
1. Requirements notation
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119] and indicate
requirement levels for compliant mechanisms.
2. Problem Statement
SIPS [RFC5630] by amending SIP [RFC3261] and
draft-jennings-sip-dtls-05 [I-D.jennings-sip-dtls] leaves following
encryption related issues unaddressed:
2.1. Encryption Issues
o 1 SIP network is used to transport other URI schemes (e.g tel, im,
pres). SIPS tells security about SIP URI but others are not
addressed. In future, we might use SIP network to transport other
URI also. SIPS for SIP, telS for tel etc is unmodular solution.
Moreover SIPS kind of solution doubles the entries in registrar and
DNS.
o 2 SIPS [RFC5630] underspecifies the feature control. e.g. It meant
that the proper authorization is needed to replace secure dialog by
unsecure etc. Dialog identifier is call-id, to-tag, from-tag. It
doesn't contain secure/unsecure (security-level) information.
o 3 SIPS [RFC5630] uses "tls" in via header and it hides whether TCP
or SCTP is used. Whereas draft-jennings-sip-dtls-05
[I-D.jennings-sip-dtls] differentiates between DTLS over UDP and
DCCP. These solutions do not take into account existence of IPSEC
tunnels between SIP addressable entities (IMS CSCF). In this case,
SIPS in its current form causes encryption to happen at two layers.
Transport and Secure protocol should be completely disjoint for
future extensability.
o 4 Secure protcol is one variant. Different cipher-suites are
supported by different secure protocols. Based on the usage scenario
different levels of security techniques are needed. US DOD considers
AES256 as top secret, whereas a small shop owner in downtown might
consider using DES, to avoid heavy resource requirement of AES256.
Moreover as the computing/networking technologies (parallelism etc)
advances and these resources become cheaper in future, breaking of
existing cipher-suites cannot be ruled out. Need of the development
of different cipher-suites in the past can be used as an indication
for this trend. Cipher-suites are not exposed in SIP. An
application cannot enforce AES256 at every SIP hop in the current
Srivastava Expires April 7, 2012 [Page 3]
Internet-Draft Avoidance of Threats Oct 2011
specification. Degradation of cipher-suites is very much possible.
o 5 SIPS [RFC5630] has modified the text to fix the issues of
retargeting, last hop exception arising out of SIP [RFC3261]. Yet it
is hard for implementors to understand it and cover each use case due
to complexity of it.
In summary secure routing and secure reachability are two different
requirements which are bundled together with resource property namely
SIPS URI scheme. The hop by hop nature of SIP makes it hard to
understand what needs to be done where. SIP is not like HTTP. There
is very thick line between resource and routing. Therefore we have
been witnessing issues in understanding of the problem itself.
2.2. Non-Encryption Issues
The above deals in encryption / integrity of SIP messages at the
hops. The above doesn't deal in other possible security issues such
as call pattern tracking (There is still possibility of an
organization to know about which research department of competitor is
talking to patent lawyers to know about the stealth projects/area of
research), Denial of service attacks, identity theft, spam etc.
There is still possibility of misuse of any confidential information
of customer/vendor etc by word of mouth by the entity keeping that
information to potential competitors or gang of cheaters. Refer
details of other unfair scenarios in different articles on The
Dreamer [1]
3. Proposed Solutions
3.1. Detecting And Fixing
Encryption related issues pertaining to SIP can be handled with the
proposed solution in draft-srivastava-sip-e2e-ciphersuites-00
[I-D.srivastava-sip-e2e-ciphersuites] with a separate header
describing secure protocols, cipher-suites; and tags for Proxy-
Require and Require header. This solution addresses the issues
described in Section 2.1.
Denial of Service Attack, Call Pattern Tracking, spam etc issues have
been always in N+1 cycle of detecting and solving. The current
solutions donot address these by avoidance.
As the vote is being sought for much bigger solution as described
below, the solution of draft-srivastava-sip-e2e-ciphersuites-00
[I-D.srivastava-sip-e2e-ciphersuites] is not described in details
here.
Srivastava Expires April 7, 2012 [Page 4]
Internet-Draft Avoidance of Threats Oct 2011
3.2. Avoidance Of Threats
Refer information pertaining to Cashless Economy on The Dreamer [1] .
Cashless Economy is achieved via Complete Digital World i.e. every
person/entity involving business transactions has computing device(s)
to do business transactions. In Complete Digital World, the common
denominator of valuation is handled ONLY in computing devices,
henceforth it is called as Soft Earning Unit (SEU). Cashless Economy
provides end-to-end traceability to earnings/spendings. Linkage of
communication records with earnings /spendings can catch the spammer
always. Therefore traceability of SEU avoids this problem. Heavy
encryption is not needed for deals resulting in direct transactions
in money. Encryption will be needed for privacy sensitive
information exchange such as stealth projects, defence mattters etc.
Financial information pertaining to earnings/spendings can be
exchanged with NULL encryption ciphers. Cashless economy avoids
other non-internet related problems (such as terrorism, illegally
printed currency bills, bribery etc) due to parallel economy of bad
guys. Conversely, it is the application which will eliminate the
digital /communication divide (which we have been talking for a
long).
Refer information pertaining to Complete Multimedia Recording on The
Dreamer [1] . The current work carried out in SIP Recording (siprec)
group deals in solutions for session recordings. Complete Multimedia
Recording captures audio and video across time and space dimensions,
even if there is no active session. In the proposed solution
computing devices will capture the recordings of the walled space and
satellites will capture recordings of open space. As everything is
captured, whenever an attacker tries to intrude, (s)he will be caught
somewhere in the recordings. As persons performing bad/illegal
activities will be caught somewhere and as evidences cannot be
manipulated (manipulation will be caught somewhere too), bad
activities will not happen. It will avoid the issues like man-in-
middle attack, denial of service attacks, identity theft, hacking of
hosted email ids, online service providers games under the cover of
hackers. This will obviate the need of complex encryption and
integrity protection mechanism of messages. In the Complete
Multimedia Recording environment, we will need bare minimum checksums
for catching malfunctioning of computing resources. It will obviate
the need of 'Security Consideration' section of the IETF documents.
Apart from fixing security related issues for internet, it avoids the
need of complex laws, misuse of any technology, miuse of any
confidential traceability information via word of mouth etc.
Due to wide spread usage of unfair business practices even by top
leaders, it has not been possible to find starting point of the
change. Everybody complains about it, but nobody wants to take lead.
Srivastava Expires April 7, 2012 [Page 5]
Internet-Draft Avoidance of Threats Oct 2011
As they argue that why they should be deprived; others should stop
first. The proposed migration plan of Cashless Economy and Complete
Multimedia Recording brings out a important silent point that things
will be changed at a SINGLE point of time. So the big chunk of
people who WANT to be fair and honest, will become advocate of the
proposed change. Moreover everyone understands very well the
difference between fair/unfair actions before commiting any unfair
actions.
3.3. Future Work
Author is humbly requesting the community to vote/voice their opinion
for the alternatives described above. Either we end up fixing the
security issues with N+1 cycle (solution of Section 3.1 ) as we have
been doing till now, or take a route to avoid the security issues via
proposed solutions in Section 3.2. Any opinion/flame even via
annonymously is welcome.
4. Security Considerations
This memo deals in Security Issues for SIP. It proposes two
solutions. The solution of avoidance of threats applies to internet
also. That solution has potential to obviate the need of this
section from IETF documents in future.
5. IANA Considerations
This document has no IANA actions.
6. IPR Consideration
Author is pursuing published patent applications PCT/US2008/066617,
PCT/US2008/069273, PCT/US2008/082929, PCT/US2008/083704, PCT/US2008/
013284, PCT/US2008/013285 alongwith other unpublished patents for
ideas descreibed in this draft
The copyright for the referred work at The Dreamer [1] is free for
individual personal usage.
For IPR related issues, please contact at srivastava_samir at hush
dot com alongwith samirs.lists at gmail dot com .
Srivastava Expires April 7, 2012 [Page 6]
Internet-Draft Avoidance of Threats Oct 2011
7. Acknowledgements
Author would like to thank Khosla Ventures whom slide set on Cashless
Economy was sent in 07 which gave author the feeling of value of the
idea. During the article on Cashless Economy author thought of
Complete Multimedia Recordings which is needed for solving white
collar terrorism and complex laws.
8. References
8.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
A., Peterson, J., Sparks, R., Handley, M., and E.
Schooler, "SIP: Session Initiation Protocol", RFC 3261,
June 2002.
[RFC5630] Audet, F., "The Use of the SIPS URI Scheme in the Session
Initiation Protocol (SIP)", RFC 5630, October 2009.
8.2. Informative References
[I-D.jennings-sip-dtls]
Jennings, C. and N. Modadugu, "Session Initiation Protocol
(SIP) over Datagram Transport Layer Security (DTLS)",
draft-jennings-sip-dtls-05 (work in progress),
October 2007.
[I-D.srivastava-sip-e2e-ciphersuites]
Srivastava, S., "Ensuring End to End Cipher Suites in
SIP", draft-srivastava-sip-e2e-ciphersuites-00 (work in
progress), June 2006.
URIs
[1] <http://samirsrivastava.typepad.com>
Srivastava Expires April 7, 2012 [Page 7]
Internet-Draft Avoidance of Threats Oct 2011
Author's Address
Samir Srivastava
Digitalall
Email: samirs.lists@gmail.com
Srivastava Expires April 7, 2012 [Page 8]