On Nov 9, 2007, at 10:40 AM, Ted Hardie wrote:

I would personally be happy with that result. I think the engineering problem for anyone who believes it *must* apply to C is a hard one: designing a system which 1) allows C to intercept encrypted material 2) allows C to present unencrypted material to the LI requestor 3) does not require C to ask for the keys to every flow to hide the LI (to maintain the privacy of the flows
not subject to the LI) and 4) does not reveal C's action to A or B.

I don't think C needs to go to that extent. All C can reasonably do is ask A and B for the session key. If A and B are not forthcoming, C is free to re-negotiate its peering contract between A and B. And that's how the business works today.

If we assume that A and C are also regulated operators, then in most jurisdictions they're going to have keys for every session, and it's up to their regulators to decide what peers they share keys with and what peers they don't.

--
Dean


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to