Trapezoidal VoIP is Evil
-
Upload
aswath-rao -
Category
Technology
-
view
1.117 -
download
0
description
Transcript of Trapezoidal VoIP is Evil
![Page 1: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/1.jpg)
Trapezoidal VoIP is Evil
Aswath Raowww.enthinnai.com
VoIP Users Conference9/11/2009
![Page 2: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/2.jpg)
Trapezoid SIP?
A’s UA
B’s ProxyA’s Proxy
B’s UA
STP message flow
RTP flow
![Page 3: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/3.jpg)
Originator’s Proxy is called
Outbound Proxy
(evil!)
![Page 4: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/4.jpg)
Yes, it provides authentication(though unreliable)
![Page 5: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/5.jpg)
A needs to have a service provider
![Page 6: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/6.jpg)
The two providers must agree to federate
![Page 7: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/7.jpg)
Akin to ISPs requiring HTTP Proxy
![Page 8: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/8.jpg)
Security needs may require it
![Page 9: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/9.jpg)
Otherwise undesirable
![Page 10: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/10.jpg)
Authentication?
![Page 11: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/11.jpg)
OpenID is an answer
Everybody (almost) has it
![Page 12: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/12.jpg)
Let us turn to B’s Proxy
![Page 13: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/13.jpg)
B’s Proxy is required
![Page 14: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/14.jpg)
Discovery
Dynamic DNS is a possibility. But how to handle white/black lists?
![Page 15: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/15.jpg)
NAT/FW Traversal
![Page 16: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/16.jpg)
Triangle is a fact of life
![Page 17: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/17.jpg)
But B’s Proxy could be a self-hosted server
![Page 18: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/18.jpg)
Putting it all together …
![Page 19: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/19.jpg)
A uses OpenID to autheticate herself
![Page 20: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/20.jpg)
B’s Proxy uses white/black list
![Page 21: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/21.jpg)
Use of ICE for NAT/FW traversal
![Page 22: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/22.jpg)
But common servers must be able to run Proxy/ICE SW
![Page 23: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/23.jpg)
EnThinnai is a realization of these objectives
![Page 24: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/24.jpg)
EnThinnai is an UC platform
![Page 25: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/25.jpg)
Presence
![Page 26: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/26.jpg)
Text/voice chat
Exclusive use of Speex
![Page 27: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/27.jpg)
Sharing of Digital information
![Page 28: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/28.jpg)
Permissions based
![Page 29: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/29.jpg)
Minimal client requirement – Java enabled browser
![Page 30: Trapezoidal VoIP is Evil](https://reader035.fdocuments.us/reader035/viewer/2022062418/55669f18d8b42acd288b48c5/html5/thumbnails/30.jpg)
Minimal server requirement