On Dec 10, 2008, at 5:46 PM, Jiri Kuthan wrote:

If I start getting nuisance rings, I might want to turn on null- auth so that I at least have a traceback to a responsible IP address so that I can send the lawyer-ninjas after somebody. In this context, what does DERIVE give me that a null-auth doesn't?

just to be safe -- are you referring to
http://www.cs.columbia.edu/sip/drafts/sip/draft-schulzrinne-sip-null-00.pdf?

Yes, that's the one.


We need to distinguish exactly which likely cases DERIVE might work against that null-auth doesn't; this becomes part of the "threat model" that is needed to get past the security droids.

--
Dean
_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to