--
You received this message because you are subscribed to the Google Groups "net-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to net-dev+u...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/net-dev/CAC_ixdzFf1J4BQPpR%2B2XO7VgxnWegrzHQaw3iROYwsQN1eKvWQ%40mail.gmail.com.
I don't think the intent process is well suited for urgent security issues. In fact I was surprised to find there wasn't already an explicit exception.I have filed an intent to implement and ship at https://groups.google.com/a/chromium.org/g/blink-dev/c/tTGznHWRB9U/m/5h2nMRsoAQAJ.
--On Tue, 10 Nov 2020 at 04:35, Mike West <mk...@chromium.org> wrote:Hey Adam!This does not feel like an FYI to me. It's a web-facing change that's certainly visible to developers. I'm happy to see that the change is happening in conjunction with other vendors, but it seems reasonable to me to run this through the same intent process that we use for other potentially breaking changes. That ensures that folks are notified of the change, and have a chance to weigh in on aspects you may not have considered.As it stands, I'll be happy to LGTM an intent, as there's security value to making the change, the breakage risk seems intuitively low, and the value of a TAG review seems equally low given the narrow nature of the change. But nothing about this change seems to me to require bypassing that process.-mikeOn Thu, Nov 5, 2020 at 3:22 AM Adam Rice <ri...@chromium.org> wrote:As a workaround for the "Slipstream" NAT bypass attack, we will be blocking HTTP and HTTPS connections to the SIP ports 5060 and 5061. This will mean that connections to servers on those ports will fail.--Impact:
- Connections to servers on those ports, for example http://example.com:5060/ or https://example.com:5061/ will no longer work. This is expected to be rare.
- Tests that spin up a server on an arbitrary port and then expect to be able to connect to it will be slightly more flaky than they are already.
Firefox and Safari are also implementing this mitigation. See https://github.com/whatwg/fetch/pull/1109 for the standard change.See https://samy.pl/slipstream/ for details of the attack. Briefly, a carefully-crafted HTTP request to port 5060 on an attacker's server can fool some NAT devices into treating it as a SIP packet and setting up port forwarding to an attacker-controlled port number. The attacker's server can then connect back to the client on that port.
You received this message because you are subscribed to the Google Groups "net-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to net-dev+u...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/net-dev/CAC_ixdzFf1J4BQPpR%2B2XO7VgxnWegrzHQaw3iROYwsQN1eKvWQ%40mail.gmail.com.
You received this message because you are subscribed to the Google Groups "net-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to net-dev+u...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/net-dev/CAC_ixdz%2Bkjiu4ewpQ9-M8ucwqPVVF1vhQtk%2B-gZsftnCU-x9Vw%40mail.gmail.com.
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CACj%3DBEhX51FHQfSbm0LBrsRmiLLq2tAr87WcVFXR5MTk17_UGA%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADnb78gin8MNEQ21ngn%3DE1wUOFuU%2Bn-c6wpo8Vc8FDeFYcxEig%40mail.gmail.com.
In the absence of DNS SRV resource records or an explicit port, the default port for a SIP URI using the "sip" scheme and the "ws" transport parameter is 80, and the default port for a SIP URI using the "sips" scheme and the "ws" transport parameter is 443.