> -----Original Message----- > From: Paul Kyzivat [mailto:[EMAIL PROTECTED] > Sent: Thursday, November 08, 2007 4:17 PM > To: Stucker, Brian (RICH1:AR00) > Cc: Dean Willis; IETF SIP List; Joel M. Halpern > Subject: Re: [Sip] media-security-requirements and lawful intercept > > > > Brian Stucker wrote: > > >> Apparently at the moment communications within a private > enterprise, > >> even a distributed one with VPN interconnects via carriers, hasn't > >> resulted in demanding that enterprises support LI. > > > > No, because their ISPs are required to cooperate with law > enforcement > > and another aspect of LI is that you don't want the target of the > > intercept to be aware that they're being intercepted. It'd > have been > > pretty tough for the FBI to go to ENRON and tell them that > they'd like > > to collect all of their VPN traffic as part of an SEC > investigation, > > so they go to the ISP instead. > > But the end effect is that if the enterprise starts > encrypting all of its voice traffic over the VPN then tapping > the ISP isn't going to help much in getting a tap. > > So if that starts happening much will the Feds insist that > enterprises turn over the keys to their VPNs and to each > voice session? > > Paul >
Yeah, I'm sure they could. This is all very cat and mouse. I don't know that it's going to get us anywhere to continue down this path. Everyone can spot imperfections in the various LI schemes. The bottom line here is that there are a lot of users out there on networks that have LI requirements today and the question is, do we want SIP to wind up reverting to party-line type behaviors on these networks. Regards, Brian _______________________________________________ Sip mailing list https://www1.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use [EMAIL PROTECTED] for questions on current sip Use [EMAIL PROTECTED] for new developments on the application of sip
