On Aug 14, 2007, at 10:12 AM, Matt Lepinski wrote:

This is related to a point that someone [My apologies for not remember who] raised at the Chicago meeting:

What problem will sipsec solve that existing (and not well deployed) security measures do not solve?

Given that current transitive-trust models of security are well- deployed, my inclination is that it is important to provide guidence to on the strengths and weaknesses of transitive-trust models (in the hope that we can dissuade people from making false assumptions about the systems they are deploying). I'm less convinced that it's important to move forward with a brand new security measure, unless we have good reason to believe that it will be more effective than existing mechanisms.

- Matt Lepinski :->

yes - that makes sense.

The other thing that I think is important is considering sipsec is why is the proxy in the path in the first place? If the proxy does not need to see or change any of the headers why is the message traversing the proxy at all?

Cullen <with my individual hat on>


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to