Hi Cullen,

well, apart from the Q&A bellow, would not it make sense to ask ourselves first:
is there a problem to be solved?

my 2 cents are: yes, absence of a simple way of checking "is it you who is calling
me" is a problem.

Simple means to me application(sip)-based, end-to-end, without
communicating to other infrastructure.

I'm just wondering if you, as well as other WG participants have an opinion on this
very basic question.

I suppose those who were recently getting the 3AM unsolicited calls would agree with me, even without knowing what SIP is. In fact, attackers seem to be less
concerned about all the intriguing solution aspects being debated right now.


-jiri

Cullen Jennings wrote:

We have had a few meetings on the topic of Identity in various forms. At many of them I have mentioned that I did not think we agreement on what the trust relationships were between the parties and what we were trying to accomplish - without that, it is hard to make progress. So I would answer your questions as:

On Oct 31, 2008, at 12:51 PM, Victor Pascual Ávila wrote:

After some discussion, the following questions come to my mind:
- Do we have clear requirements for e2e verification?
no


- Do we have clear application scenarios?
no

Cullen <with my individual contributor hat on>


_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to