See inline.

David R Oran wrote:
> In the absence of a reputation service and separate authentication of
> the source domain I don't see any at all. What are your assumed
> preconditions for this authentication to have value?

I agree that it requires a separate identity service.
It's my understanding that the SIP-Identity mechanism [RFC4474]
makes use of separate authentication services to verify identities.


Dean Willis wrote:
> There is a distinct difference between a caller who is unknown to me but
> known to someone who is known to me and a caller who is truly anonymous.
> In the first case, if the caller proves to be "a problem", I have some
> recourse through channels. In the second, I do not.
>
> So let us take the typical public network scenario.  If all caller's
> identities are known to the operator, an anonymized identifier asserted
> by that operator could be used to trace a nuisance call back to the
> source. That's useful: It could drive "black listing" operations, "white
> listing" operations, and support legal investigation into harassment
> calls, etc.

Thank you for clarifying the use cases of authenticated anonymous address.
I would like to include such use cases in the next version of the draft
if those will be accepted as useful.

Regards,
Mayumi
_______________________________________________
Sip mailing list  http://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to