[VOIPSEC] Identity Management and VoIP and More
Lee Dilkie
lee_dilkie at mitel.com
Fri Jun 30 07:37:00 CDT 2006
Zmolek, Andrew (Andy) wrote:
> I've already got a mobile phone that I can't use to make calls unless I
> enter my GoodLink password (thankfully I can receive a call without
> entering it, but can't send DTMF or do much of anything else without
> that password. Given the amount of sensitive information on the phone
> and the public places it travels across, it's something I can deal with
> (though a biometric lock would be more convenient).
>
> But when I think about having to lock and unlock my desk phone, I'm
> having a hard time justifying that kind of distraction unless I work in
> a public space, and a lot of other questions immediately spring to mind,
> many related to mobility as well:
>
> - What kind of timeout is reasonable for my phone login?
> - Do I have to buy an expensive phone with a proximity reader that can
> sense that may RFID badge?
> - Should I be able to receive a call when the phone is locked?
> - Should the phones in my conference rooms require a login, and when I
> login should they take on my extension?
> - If I had an RFID badge, should I allow any phone in my proximity to
> ring when someone is calling me?
> - How do I handle the lobby phone?
> - How do I meet E911 regulations phones can be locked?
>
> And that doesn't even get into more practical issues of managing phones
> as authenticators and handling priority and precedence beyond the E911
> case. Suffice it to say that there are as many human issues here as
> engineering ones, but I'd love to hear what others on the list think
> would be both implementable and practical as we move to a more
> data-oriented authentication model for phones and other voice-oriented
> devices.
>
>
>
I think that we would do ourselves a favour if we limited identity and
authentication discussions to device identity and not try and include
people identity. At the device level the only strong identity that we
can validate is, well, at the device level. In our case that is a dialed
number (DN) or a sip URL perhaps.
That means that if I'm setting up a call with 1234, I need to ensure
that any security associations I negotiate with 1234 aren't tampered
with, that ongoing communications are secured and that call teardown is
also authenticated. At the device level, that is the only information
we have to authenticate. If it turns out that Bob stole Fred's phone and
is using it, I think the responsibility for authenticating that lies
outside our scope.
I'm not saying that person authentication isn't a bad idea, and certain
product markets (mobile phones) and some companies will implement
solutions. But we should adopt the "onion skin" approach to securing our
layer. Otherwise I fear we will get paralyzed by spiraling "what if"
scenarios.
Personally, if I had to unlock my desk phone, I'd just heave it out the
window. :)
-lee dilkie
More information about the Voipsec
mailing list