This is related to a point that someone [My apologies for not remember who] raised at the Chicago meeting:

What problem will sipsec solve that existing (and not well deployed) security measures do not solve?

Given that current transitive-trust models of security are well-deployed, my inclination is that it is important to provide guidence to on the strengths and weaknesses of transitive-trust models (in the hope that we can dissuade people from making false assumptions about the systems they are deploying). I'm less convinced that it's important to move forward with a brand new security measure, unless we have good reason to believe that it will be more effective than existing mechanisms.

- Matt Lepinski :->

Dean Willis wrote:


On Aug 14, 2007, at 12:02 AM, Cullen Jennings wrote:


I will note that we do have security mechanism to provide confidentially over the bodies (but not headers) for attacks from proxies we do not have a trust relationship with - and this is one of the aspects used in determining if certain semantics might be better in a body or header.


And you've got working examples of this security mechanism in deployed networks?

--
Dean


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip





_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to