> -----Original Message-----
> From: Hannes Tschofenig [mailto:[EMAIL PROTECTED]
> Sent: Thursday, February 14, 2008 1:40 AM
> To: Dan Wing
> Cc: [email protected]
> Subject: Re: [Sip] R-REUSE, media-security-requirements
>
> Hi Dan,
>
> MUST specify, SHOULD implement and MAY use seems fine for me.
So far you're the only person to respond to my email. I had asked for
feedback because I had received push-back on the requirement to store state
from previous sessions, because such storage weakens the security of the
system by destroying perfect forward secrecy. PFS is a 'must be able to
support' requirement in the document right now. Any thoughts on this
requirements collision?
> I can imagine that not only end hosts would benefit from this
> mechanisms.
>
> There are two mechanisms that offered slightly different
> functionality regarding this security context reuse, namely
> * Re-use of a previously established security context based on state
> that has been established by both end points
> * Re-use of a previously established security context by caching
> security context only on the client side.
On the second bullet, I assume you are referring to RFC5077 ("TLS Session
Resumption without Server-Side State")?
> I can imagine that both approaches are useful in certain
> scenarios. The requirement does not differentiate these two cases.
Should the requirement be reworded to differentiate between those two cases?
-d
> Ciao
> Hannes
>
>
>
>
> Dan Wing wrote:
> > In draft-ietf-sip-media-security-requirements-02, I changed
> the following
> > requirement from MAY to MUST:
> >
> > R-REUSE The media security key management protocol MUST
> support the
> > re-use of a previously established security context, and
> > implementations SHOULD implement the re-use mechanism.
> >
> > A discussion of this requirement appears in Section 4.6 of
> the document,
> >
> http://tools.ietf.org/html/draft-ietf-sip-media-security-requi
> rements-02#secti
> > on-4.6
> >
> >
> > Does anyone have equipment that they would implement this
> feature in? In the
> > past, I have heard that some embedded devices (intelligent
> SIMs) could benefit
> > from key re-use.
> >
> > Would it be reasonable to soften this requirement back to a MAY?
> >
> > -d
> >
> >
> >
> >
> >
> > _______________________________________________
> > Sip mailing list http://www.ietf.org/mailman/listinfo/sip
> > This list is for NEW development of the core SIP Protocol
> > Use [EMAIL PROTECTED] for questions on current sip
> > Use [EMAIL PROTECTED] for new developments on the application of sip
> >
>
_______________________________________________
Sip mailing list http://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip