> -----Original Message-----
> From: Paul Kyzivat [mailto:[EMAIL PROTECTED] 
> Sent: Thursday, November 08, 2007 4:17 PM
> To: Stucker, Brian (RICH1:AR00)
> Cc: Dean Willis; IETF SIP List; Joel M. Halpern
> Subject: Re: [Sip] media-security-requirements and lawful intercept
> 
> 
> 
> Brian Stucker wrote:
> 
> >> Apparently at the moment communications within a private 
> enterprise, 
> >> even a distributed one with VPN interconnects via carriers, hasn't 
> >> resulted in demanding that enterprises support LI.
> > 
> > No, because their ISPs are required to cooperate with law 
> enforcement 
> > and another aspect of LI is that you don't want the target of the 
> > intercept to be aware that they're being intercepted. It'd 
> have been 
> > pretty tough for the FBI to go to ENRON and tell them that 
> they'd like 
> > to collect all of their VPN traffic as part of an SEC 
> investigation, 
> > so they go to the ISP instead.
> 
> But the end effect is that if the enterprise starts 
> encrypting all of its voice traffic over the VPN then tapping 
> the ISP isn't going to help much in getting a tap.
> 
> So if that starts happening much will the Feds insist that 
> enterprises turn over the keys to their VPNs and to each 
> voice session?
> 
>       Paul
> 

Yeah, I'm sure they could. This is all very cat and mouse. I don't know
that it's going to get us anywhere to continue down this path. Everyone
can spot imperfections in the various LI schemes. The bottom line here
is that there are a lot of users out there on networks that have LI
requirements today and the question is, do we want SIP to wind up
reverting to party-line type behaviors on these networks.

Regards,
Brian


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to