>
Dan,

> The wordsmithing task falls to me, I suppose.
>
> Here is another straw man, which I think captures your sentence
> above your signature and your [0] comment:
>
>      R-CERTS:
>
>      The media security key management protocol MUST NOT require
>      using a trust anchor to validate credentials (e.g., a
>      certificate) or to obtain credentials (e.g., a private key)
>      used in the protocol.

Your wordsmithing is fine by me.  I also liked the discussion you  
included in section 4.9 which explains the rationale for this  
requirement more.

        4.9. Certificates       
                                
                        The discussion in this section relates to R-CERTS.      
                                
                        On the Internet and on some private networks, 
validating another        
                        peer's certificate is often done through a trust anchor 
-- a list of    
                        Certificate Authorities that are trusted. It can be 
difficult or        
                        expensive for a peer to obtain these certificates. In 
all cases,        
                        both parties to the call would need to trust the same 
trust anchor      
                        (i.e., "certificate authority"). For these reasons, it 
is important     
                        that authentication mechanisms that utilize trust 
anchors not rely      
                        exclusively on such Certificate Authority-issued 
certificates, but  
to      
                        also allow self-signed certificates. By allowing the 
use of such        
                        self-signed certificates, an out-of-band mechanism 
(e.g., manual        
                        configuration) can be used to trust a peer's 
certificate.

Regards,
Dan

-- 
Dan York, CISSP, Director of Emerging Communication Technology
Office of the CTO    Voxeo Corporation     [EMAIL PROTECTED]
Phone: +1-407-455-5859  Skype: danyork  http://www.voxeo.com
Blogs: http://blogs.voxeo.com  http://www.disruptivetelephony.com

Build voice applications based on open standards.
Find out how at http://www.voxeo.com/free





_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to