1 Media Session Authorization Dan Wing draft-wing-session-auth-00.txt

Embed Size (px)

DESCRIPTION

3 Session Authorization Overview Authorize UDP Media Sessions –Uses username/passwords of ICE –Authority comes from call controller Natural packet routing –No NAT, no SBC –Allows multihomed networks No topology awareness No topology constraints

Citation preview

1 Media Session Authorization Dan Wing draft-wing-session-auth-00.txt 2 IPR Declaration Cisco will be declaring IPR on draft-wing-session-auth-00.txt 3 Session Authorization Overview Authorize UDP Media Sessions Uses username/passwords of ICE Authority comes from call controller Natural packet routing No NAT, no SBC Allows multihomed networks No topology awareness No topology constraints 4 ICE Overview Interactive Connectivity Establishment Useful for traversing NATs Per-flow usernames (and passwords) are exchanged in ICE signaling To verify connectivity, ICE endpoints send the username in media path STUN Request / Reply (RFC3489) 5 Media Session Authorization Per-call username is seen by SIP proxy SIP proxy gives policy server call info. Firewall identifies STUN Request Firewall asks policy server to authorize flow Firewall opens pinhole Result: secure authorization of a legitimate flow 6 ICE with Policy Authorization, Slide 1 Alice Bob FW-BFW-A Bob's Call Controller Alice's Call Controller STUN Request 2 5 INVITE From: Alice To: Bob IP=X, UDP=x, Token=A X, x Alices Policy Server Bobs Policy Server informational 7 ICE with Policy Authorization, Slide 2 Alice Bob FW-BFW-A SIP 183 or 200 From: Bob To: Alice IP=Z, UDP=z, Token=B1 15 STUN Response Bob's Call Controller Alice's Call Controller No external authorization check is necessary because the same STUN transaction-id and (flipped) 5-tuple are in STUN Request and Response 8 Asymmetric Routing: Problem Firewall cant learn about bi-directional flow, because it only sees one direction Thus, cant use transaction-id and 5-tuple to authorize STUN Response message Firewall-AtlantaFirewall-Dallas Gateway 9 Asymmetric Routing: Approach A Firewall asks policy server about STUN Responses, too Continue using same protocol Solution A causes additional STUN Request/Response delay 10 Approach A (slide 1) Alice Bob FW-B-1FW-A Bob's Call Controller Alice's Call Controller STUN Request 2 5 INVITE From: Alice To: Bob IP=X, UDP=x, Token=A X, x Alices Policy Server Bobs Policy Server FW-B-2 informational 11 FW-B-2 Approach A (slide 2) Alice Bob FW-B-1FW-A Bob's Call Controller Alice's Call Controller Alices Policy Server Bobs Policy Server 183 or 200 From: Bob To: Alice IP=Z, UDP=z, Token=B Z, z STUN Response informational 12 Asymmetric Routing: Approach B Tell other firewalls about every valid STUN transaction-id Example: secure multicast protocol (GDOI?) Optimization 1: tell firewalls that might need to know (but how do you know?) Optimization 2: firewalls only need to remember authorized STUN transaction-id for a short time (5-10 seconds) Solution B adds more state to firewalls 13 Approach B Alice Bob FW-B-1FW-A Bob's Call Controller Alice's Call Controller STUN Request 2 5 INVITE From: Alice To: Bob IP=X, UDP=x, Token=A X, x Alices Policy Server Bobs Policy Server FW-B-2 6a FW-B-3 FW-B-4 informational 14 FW-B-2 Solution B: Tell Firewall (slide 2) Alice Bob FW-B-1FW-A Bob's Call Controller Alice's Call Controller Alices Policy Server Bobs Policy Server 183 or 200 From: Bob To: Alice IP=Z, UDP=z, Token=B STUN Response FW-B-2 needs no external authorization check because the same STUN transaction-id and (flipped) 5-tuple are in STUN Request and Response FW-B-3 FW-B-4 FW-B-3 and FW- B-4 time out the STUN transaction-id aggressively (5- 10 seconds) informational 15 Features No topology awareness Supports multi-homed networks Including asymmetric routing 16 Drawbacks Endpoints must cooperate in the scheme ICE-capable endpoints cooperate as a side-effect of their normal ICE operation Note well: Only a portion of ICE is needed -- only the exchange of tokens in signaling and the STUN Request/Response in media 17 Going Forward Standardize interfaces SIP proxy to Policy Server Policy Server to Firewall Decide on approach A or B for multihomed asymmetric routing