Dan York wrote:
So after writing my response to Paul Kyzivat's response to Cullen, I thought about it some more and realized that I ought to collect those thoughts into an I-D, which I have now submitted. I did so primarily because I haven't really seen discussion of the end user's *experience* of working with "trusted identity" (if I missed such a discussion, please feel free to point it out to me).
Dan: A while ago -- maybe early last year -- we had a great big thread on the idea of showing a locked padlock to impart the notion of a secure call. This discussion was in the context of the sipsec URI draft (see http://tools.ietf.org/html/draft-gurbani-sip-sipsec-01). The allegory we adopted, which is also discussed in the draft, was that of a "hopping bunny with a lock in its mouth" (as a tribute to SIP's hop-by-hop security model.) In any case, among other discussions that resulted in the thread were reasons why this is not completely attainable (although at that time, the work on dtls-srtp was not as advanced as it is now.) The draft is a good starting point that distills a lot of the discussion that preceded it, so it may be worth a read. I will attempt to find the threaded discussion in the mailing list archives and send you a link to it tomorrow. Ciao. - vijay -- Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent 2701 Lucent Lane, Rm. 9F-546, Lisle, Illinois 60532 (USA) Email: [EMAIL PROTECTED],bell-labs.com,acm.org} WWW: http://www.alcatel-lucent.com/bell-labs _______________________________________________ Sip mailing list https://www.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use [EMAIL PROTECTED] for questions on current sip Use [EMAIL PROTECTED] for new developments on the application of sip
