[linux-elitists] Re: Looking back ten years: Another Cypherpunksfailure (fwd)

Derek Atkins derek at ihtfp.com
Mon Jan 28 12:41:32 EST 2002


There are other problems with using IPsec for VoIP..  In many cases
you are sending a large number of rather small packets of data.  In
this case, the extra overhead of ESP can potentially double the size
of your data.  In certain cases (such as cablemodem networks) this
implies that using IPsec effectively halves the number of active
VoIP sessions that a carrier can handle.

"Enzo Michelangeli" <em at who.net> writes:

> If everything is tunnelled inside SSH, its ultimate transport is TCP, which
> is bad for data types like voice where reliability is less important than
> low delay. The right thing to do is to build decent security into the RTP
> layer (the standard transport for voice applications, RFC1889): the SRTP
> draft (http://www.ietf.org/internet-drafts/draft-ietf-avt-srtp-02.txt) goes
> in this direction. Authentication and key exchange are supposed to be
> handled in the session initiation phase (e.g., through SIP or H.323).
> 
> Alternatively, one could rely on IPSEC, but its support on the target
> machine cannot (yet?) be taken for granted; the RTP stack, on the opposite,
> is usually built into the application rather than the kernel.
> 
> Enzo

-- 
       Derek Atkins, Computer and Internet Security Consultant
       IHTFP Consulting (www.ihtfp.com)
       derek at ihtfp.com



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list