[VOIPSA Best Practices] LAST CALL for comment on Best Practicesdocument structure - #2 or #4?
dan_york at Mitel.com
dan_york at Mitel.com
Wed Jan 17 08:49:21 CST 2007
Oliver,
> Dan, I think the #4 is not enough complete on your webpage. The
interface list doesn’t mention the dialog between 2 Call Controllers.
<snip>
I believe Eugene Nechamkin meant his message as a suggestion for a general
direction, not necessarily a complete list. If we were to decide to
organize around interfaces, we would next need to ensure we had a complete
list. That was my interpretation of his intent, anyway.
> - Where can we found the solution to a threat or the specific testing
tool of this threat? Perhaps it is a little out-subject. But I think in
each part
> the list of all solved problems should be printed with references to
threat taxonomy document.
Yes, I completely agree that we should include that. If you look on the
web page http://wiki.voipsa.org/tiki-index.php?page=Development+Process
just above the document structure area, I suggested info to include for
each best practice and one of those is a cross-link to the relevant threat
taxonomy area.
I'd now also expand that to include references to specific testing tools
since, as noted in an earlier message by list member Dustin Trammell,
Dustin and Shawn Merdinger have been working up a comprehensive list of
test tools (that we're not really ready to release yet, but will do so in
conjunction with this BP project). So in the end, we'll have this nice
little interlinked set of documents:
- Threat Taxonomy outlining threats to and vulnerabilities in VoIP
- Tools that can be used to test those threats/vulnerabilities
- Best Practices you can use to guard/defend against those threats (and
tools)
It's a nice story for VOIPSA that, assuming we execute on all of it,
should go far in helping the industry, in my opinion.
> - How the “Securing Call Control” of #2 will be treated ? BP following
the VoIP protocol used ?
Well, assuming we go with structure #2, I'm going to leave the precise
answer of that to Eric Chen over at NTT who volunteered as a section
leader and said "call control" would be his first preference for a
section. So since he stepped forward and was the first one to ask (hint,
hint), I'll say he's the man for call control. And, not wanting to step
on section leaders toes, I'll defer to him. :-)
I will give the general guidance that our intent is to create
*vendor-neutral* best practices. Which in my mind means general
statements (ex. "Call control signaling should be encrypted, ideally using
TLS.") which could apply across all VoIP protocols. So a customer could
take that BP statement and, one would hope, be able to read enough in our
document to be able to ask their vendor questions like "Do you encrypt
call signaling?" and "Do you use TLS to encrypt it? If not, why not?" Or
something like that. The point is that we should stick to the
vendor-neutral aspects and leave it to the vendors to explain their
individual protocols.
The exception would be things like SIP, which are truly "industry
standard" and so there is, in my opinion, a case to be made for including
best practices for securing SIP inside our BP document.
I'd also note that assuming we go with #2, we also have to flesh out
exactly what we throw in the bucket marked "Call Control". Is endpoint
authentication in there as well? Perhaps, but then again maybe it's in
the endpoint section... there's a number of nuances like that that we
still have to sort out. But that's the *next* debate..
> I vote for #2 !
Thanks. I've had several other direct replies voting for #2. At this
point it's definitely heading toward a near-consensus on #2, so if you
have a different opinion, now is definitely the time to say so. Otherwise,
about 24 hours from now I'm going to declare #2 the way forward and start
structuring things around that.
Thanks,
Dan
--
Dan York, CISSP
Dir of IP Technology, Office of the CTO
Mitel Corp. http://www.mitel.com
dan_york at mitel.com +1-613-592-2122
PGP key (F7E3C3B4) available for
secure communication
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://voipsa.org/pipermail/bestpractices_voipsa.org/attachments/20070117/a63bb3db/attachment.htm>
More information about the bestpractices
mailing list