Feeds

SIP pundit fires broadside at Skype

VoIP catfight hots up

  • alert
  • submit to reddit

Application security programs and practises

Last week we carried our thoughts and impressions from the VON (voice over networks) conference in London and focused on the difference between the instantaneous gratification of Skype for private individuals and the safe and efficient enterprise wide VoIP implementations, reliant mostly on the SIP protocol.

Rohan Mahy, co-chair IETF SIP and SIPPING Working Groups, took issue with some of the things that Niklas Zennstrom of Skype and Kazaa fame said at the conference, and although enterprise VoIP isn't a central technology to Faultline, it is a valid and radical cost pressure on telcos and an opportunity for various vendors.

Much of the irritation that Mahy showed at the VON conference relates to the Zennstrom view that SIP is a poor protocol because of its inability to handle firewall and NAT traversal. So in Mahy's own words we thought we'd offer the other side of the argument.

"There are very few people in the VoIP industry who understand firewall and NAT traversal well. Lots of people in the VoIP industry think that they have some technique which is new and good. Unfortunately the parts that are new are rarely good and the parts that are good are usually not new. Explaining to these people what is technically broken with their proposals and why is an extremely time consuming process, and is repeated every time a handful of new companies start to go into the operational phase. As a result, the folks who understand these issues either go on a holy war each time a 'new great NAT solution' crops or just ignore the new folks.

"Implementers want a one-size fits-all solution where one does not exist. I can describe significant limitations with every approach, but by implementing a handful of these tools and applying the best tool for the situation, you can do much better than just implementing one. When an implementer comes to me or Jonathan Rosenberg, or Jon Peterson and asks how to do NAT or Firewall traversal, most of them are frankly not willing to invest the attention and energy needed to implement real solutions to this problem for VoIP (not for SIP, but for VoIP).

"I believe that Niklas [Zennstrom of Skype] is in this category. He is not willing to admit that his solution is completely broken by firewalls that try to block p2p music sharing, that the algorithms which gives his product good sound quality can be implemented on any product, and that the supernode model not so occasionally results in very bizarre routing (example: a call within Europe going through Australia)

"As with anybody who has technical problems with IETF protocols, I invite them to write a description of what problem they are trying to solve which they feel is not addressed by existing protocols and provide some motivation. Zennstrom has not provided any rigorous analysis or even detailed explanation of these alleged technical problems.

"The traditional telecom folks want to reproduce an environment which is familiar to them. SIP does things differently, but many folks generally stop there and don't try very hard to understand how to accomplish their goals 'the-SIP-way'.

"I believe that Zennstrom has a different motivation. He is providing a packaged service and I believe that he is afraid of the idea of open services and open protocols, because these things directly threaten his business model."

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.