16 sep 2011 kl. 14:18 skrev DRAGE, Keith (Keith): >> So IMHO SIPS and TLS is broken and it can only work when the full path >> is secure (which is unfeasible in most of the environments). This >> needs a rework ... > > This conclusion is nothing new - it was essentially the conclusion of those > working on RFC 5630. But it is not RFC 5630 that needs the rework; that > document is pretty much correct within the constraints we gave it, which is > to define what happens with the existing protocol and make minimum fixes to > the existing protocol (indeed the original charter item was only the first > half of this). > > There was a recognition that more could be achieved with a new mechanism (for > example there was a draft from Vijay Gurbani), but that would have been a > separate charter item, and noone seemed to have the enthusiasm at the time to > work on it. That doesn't mean that that situation still persists and I'm sure > you understand the process for bringing new work into IETF if you want to do > something. But that is what it is, new work.
Thank you very much Keith for this clarification, which gives us the background we need. Time to allocate resources to be able to work on this then. /O _______________________________________________ Sip mailing list https://www.ietf.org/mailman/listinfo/sip This list is essentially closed and only used for finishing old business. Use [email protected] for questions on how to develop a SIP implementation. Use [email protected] for new developments on the application of sip. Use [email protected] for issues related to maintenance of the core SIP specifications.
