Juha,
I host for example multiple domains for multiple users. This means that users rely on my services entirely to provide them with identity services. Ideally I would like to present the Certificate of domain X from user in domain X when I forward his calls through my proxy. Alternatively I could say I put certificate with CN=ag-projects.com in all request going outside my domains but then my white-label customers will become yellow.
So something to match business with the technicalities is required, don't you think?
Adrian
But then, the whole authorization thing would be nonsens.
Just imagine a host named "sip.badguy.com". This host has a valid certificate for its hostname. Then, this SIP proxy sends a SIP
request
with the header: From: "Klaus Darilion" <sip:klaus at darilion.com>
Now, what is the receiving proxy interested in? Does it want to
validate
the host or the sender (From header)?
there are other ietf means to validate the sender. usually they involve signing of from uri with the certificate of its domain. see for example
draft-rosenberg-sip-identity-privacy-00
for a good summary of the issues and problems involved. in proxy-to-proxy case, all that needs to be done is to validate the remote proxy.
IMO, I want to authenticate the sender in the From header. Thus, the certificate would have to match the SIP domain, and not the host name.
see above.
-- juha