[VOIPSEC] VoIP Attack : How feasible

Dan Wing dwing at cisco.com
Tue Jul 25 12:41:59 CDT 2006


> Doesn't this approach just create a registration storm when there is a
> failure? 

No, you're registered at both proxies all the time.  See section 3
of the Internet Draft.  It has a beautiful ASCII diagram:

       +-------------------+
       | Domain            |
       | Logical Proxy/Reg |
       |                   |
       |+-----+     +-----+|
       ||Host1|     |Host2||
       |+-----+     +-----+|
       +---\------------/--+
            \          /
             \        /
              \      /
               \    /
              +------+
              | User |
              | Agent|
              +------+

> The I-CSCF/Routing proxy has to be told that each of the
> clients moved to another edge proxy.

That is necessary whenever a P-CSCF (edge proxy) dies, unless
the "new" P-CSCF assumes the now-dead P-CSCF's identity (IP
address).  That can still be done with the scheme described
in sip-outbound.

-d


> Geoff
> 
> -----Original Message-----
> From: Dan Wing [mailto:dwing at cisco.com] 
> Sent: Tuesday, July 25, 2006 12:46 PM
> To: 'DePietro, John'; Geoff Devine; 'Pankaj Shroff'
> Cc: Voipsec at voipsa.org
> Subject: RE: [VOIPSEC] VoIP Attack : How feasible
> 
> > Regarding, sip-outbound's approach.  Do you have a 
> > description of this, draft-rfc or whitepaper? 
> 
> Sorry, I should have included a citation:
> http://www.ietf.org/internet-drafts/draft-ietf-sip-outbound-04.txt
> 
> -d




More information about the Voipsec mailing list