inline.

Dean Willis wrote:

So what? I think thats what ought to happen. I'd like to see some specific use cases where this can't work with the edge proxy performing the authentication. Keep in mind, we are talking about *certificate* authentication; that doesn't (by definition) required any kind of pre-arranged secret - only a common root CA.

My edge proxy might be provided by MCI, but I might be using a chat service from another provider overseas. This other provider might be willing to trust the certificate for authentication (given that I have a signed cert from MCI, who in turn has a signed CA cert from a recognized op-level CA). However, the chat provider might not be willing to just accept P-Asserted-Identity from MCI as an authentication mechanism, since said provider does not have a trusted peering arrangement with MCI and therefore ANYBODY could spoof my P-Asserted-Identity.

In a case where your chat provider has no relationship whatsoever with this edge proxy, for what purpose would you be connecting to it in the first place? You should connect directly to your chat provider offering the service. Then, if you have a cert - great - authenticate to it using mutual TLS.

-Jonathan R.



--
Jonathan D. Rosenberg, Ph.D.                   600 Lanidex Plaza
Cisco Fellow                                   Parsippany, NJ 07054-2711
Cisco Systems
[EMAIL PROTECTED]                              FAX:   (973) 952-5050
http://www.jdrosen.net                         PHONE: (973) 952-5000
http://www.cisco.com


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to