On Oct 28, 2016, at 6:57 AM, Ross Finlayson <finlay...@live555.com> wrote:
> 
>> Also, whilst I'm not arguing about the validity or otherwise of the cameras 
>> response (I'm no RTP expert), isn't it reasonable to interpret this as a 
>> security hole in the live555 library?
> 
> No, because IP source addresses can always be forged - so they should never 
> be used as a security mechanism.

If that’s what we’re trying to solve — as opposed to the non-ephemeral port 
number issue — then wouldn’t switching to RTP over TCP work?

You can’t usefully forge IPs with TCP because the SYN-ACK can’t go back to the 
forged IP, so the third handshake packet never happens.  And you can’t inject a 
frame into the stream, because you probably can’t guess sequence numbers and 
such unless you’re in a MITM position.

As for MITM mitigation, that’s the same as always: TLS, VPN, or similar.

So, the security bug here is unencrypted UDP, not Live555.
_______________________________________________
live-devel mailing list
live-devel@lists.live555.com
http://lists.live555.com/mailman/listinfo/live-devel

Reply via email to