The SIP protocol provides authentication and authorization of SIP requests through a challenge-response authentication scheme inherited by the HTTP protocol and named HTTP Digest Authentication. The current specification defines a particular algorithm for calculating the challenge response that uses the MD5 hash of a combination of user name, realm, and password. Unfortunately, a lot of authentication systems maintain the user credentials protected with a one-way function (usually a hash) in a way that is incompatible with the information required by the current HTTP Digest Authentication. Some examples are given by the mechanisms used for storing passwords by the Unix OS, LDAP servers, or other applications. In this paper, we propose to extends the original HTTP Digest Authentication by adding a new and flexible scheme that uses an arbitrary hash function and an arbitrary combination of various information such as user name, realm, password, salt, and/or other data. The proposed authentication scheme has been implemented within two testbeds in which a SIP UA authenticates itself with a remote proxy server (acting as authenticator) that uses respectively a LDAP server or a users' password file of a Joomla Content Management System.

Salsano, S.d., Polidoro, A., Veltri, L. (2008). Extending SIP authentication to exploit user credentials stored in existing authentication databases. In Software, Telecommunications and Computer Networks, 2008. SoftCOM 2008. 16th International Conference on (pp.375-379) [10.1109/SOFTCOM.2008.4669513].

Extending SIP authentication to exploit user credentials stored in existing authentication databases

SALSANO, STEFANO DOMENICO;VELTRI, LUCA
2008-01-01

Abstract

The SIP protocol provides authentication and authorization of SIP requests through a challenge-response authentication scheme inherited by the HTTP protocol and named HTTP Digest Authentication. The current specification defines a particular algorithm for calculating the challenge response that uses the MD5 hash of a combination of user name, realm, and password. Unfortunately, a lot of authentication systems maintain the user credentials protected with a one-way function (usually a hash) in a way that is incompatible with the information required by the current HTTP Digest Authentication. Some examples are given by the mechanisms used for storing passwords by the Unix OS, LDAP servers, or other applications. In this paper, we propose to extends the original HTTP Digest Authentication by adding a new and flexible scheme that uses an arbitrary hash function and an arbitrary combination of various information such as user name, realm, password, salt, and/or other data. The proposed authentication scheme has been implemented within two testbeds in which a SIP UA authenticates itself with a remote proxy server (acting as authenticator) that uses respectively a LDAP server or a users' password file of a Joomla Content Management System.
16th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2008)
Split – Dubrovnik, Croatia
2008
Rilevanza internazionale
contributo
2008
Settore ING-INF/03 - TELECOMUNICAZIONI
English
Intervento a convegno
Salsano, S.d., Polidoro, A., Veltri, L. (2008). Extending SIP authentication to exploit user credentials stored in existing authentication databases. In Software, Telecommunications and Computer Networks, 2008. SoftCOM 2008. 16th International Conference on (pp.375-379) [10.1109/SOFTCOM.2008.4669513].
Salsano, Sd; Polidoro, A; Veltri, L
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2108/104172
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 0
social impact