Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Trapezoidal VoIP is Evil Aswath Rao www.enthinnai.com VoIP Users Conference 9/11/2009
Trapezoid SIP? A’s UA B’s Proxy A’s Proxy B’s UA STP message flow RTP flow
Originator’s Proxy is called Outbound Proxy (evil!)
Yes, it provides authentication (though unreliable)
A  needs to have a service provider
The two providers must agree to federate
Akin to ISPs requiring HTTP Proxy
Security needs may require it
Otherwise undesirable
Authentication?
OpenID is an answer Everybody (almost) has it
Let us turn to B’s Proxy
B’s Proxy is required
Discovery Dynamic DNS is a possibility. But how to handle white/black lists?
NAT/FW Traversal
Triangle is a fact of life
But B’s Proxy could be a self-hosted server
Putting it all together …
A uses OpenID to autheticate herself
B’s Proxy uses white/black list
Use of ICE for NAT/FW traversal
But common servers must be able to run Proxy/ICE SW
EnThinnai is a realization of these objectives
EnThinnai is an UC platform
Presence
Text/voice chat Exclusive use of Speex
Sharing of Digital information
Permissions based
Minimal client requirement –  Java enabled browser
Minimal server requirement
Upcoming SlideShare
Loading in …5
×

Trapezoidal VoIP is Evil

1,477 views

Published on

Presented to VoIP Users Conference on 9/11/2009

  • Be the first to comment

  • Be the first to like this

Trapezoidal VoIP is Evil

  1. 1. Trapezoidal VoIP is Evil Aswath Rao www.enthinnai.com VoIP Users Conference 9/11/2009
  2. 2. Trapezoid SIP? A’s UA B’s Proxy A’s Proxy B’s UA STP message flow RTP flow
  3. 3. Originator’s Proxy is called Outbound Proxy (evil!)
  4. 4. Yes, it provides authentication (though unreliable)
  5. 5. A needs to have a service provider
  6. 6. The two providers must agree to federate
  7. 7. Akin to ISPs requiring HTTP Proxy
  8. 8. Security needs may require it
  9. 9. Otherwise undesirable
  10. 10. Authentication?
  11. 11. OpenID is an answer Everybody (almost) has it
  12. 12. Let us turn to B’s Proxy
  13. 13. B’s Proxy is required
  14. 14. Discovery Dynamic DNS is a possibility. But how to handle white/black lists?
  15. 15. NAT/FW Traversal
  16. 16. Triangle is a fact of life
  17. 17. But B’s Proxy could be a self-hosted server
  18. 18. Putting it all together …
  19. 19. A uses OpenID to autheticate herself
  20. 20. B’s Proxy uses white/black list
  21. 21. Use of ICE for NAT/FW traversal
  22. 22. But common servers must be able to run Proxy/ICE SW
  23. 23. EnThinnai is a realization of these objectives
  24. 24. EnThinnai is an UC platform
  25. 25. Presence
  26. 26. Text/voice chat Exclusive use of Speex
  27. 27. Sharing of Digital information
  28. 28. Permissions based
  29. 29. Minimal client requirement – Java enabled browser
  30. 30. Minimal server requirement

×