On Aug 14, 2007, at 10:12 AM, Matt Lepinski wrote:
This is related to a point that someone [My apologies for not
remember who] raised at the Chicago meeting:
What problem will sipsec solve that existing (and not well
deployed) security measures do not solve?
Given that current transitive-trust models of security are well-
deployed, my inclination is that it is important to provide
guidence to on the strengths and weaknesses of transitive-trust
models (in the hope that we can dissuade people from making false
assumptions about the systems they are deploying). I'm less
convinced that it's important to move forward with a brand new
security measure, unless we have good reason to believe that it
will be more effective than existing mechanisms.
- Matt Lepinski :->
yes - that makes sense.
The other thing that I think is important is considering sipsec is
why is the proxy in the path in the first place? If the proxy does
not need to see or change any of the headers why is the message
traversing the proxy at all?
Cullen <with my individual hat on>
_______________________________________________
Sip mailing list https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip