> Two I-Ds have been proposed which will survive B2BUAs and SBCs: You would have to show that what is valid for identity can be extended to any type of application.
> TLS and IPsec work through transport- and network-layer intermediaries (NATs > and NAPTs), and NAPTs destroy the e2e principle. Same as above. Can this be generalized? What complexity costs are involved? This is an interesting discussion to pursue with the IAB. Henry On 6/25/08 10:17 AM, "Dan Wing" <[EMAIL PROTECTED]> wrote: >>> So the title of the document would be "Validating SIP From >>> Considered >>> Harmful". After writing that document, do you feel the >>> community would >>> then see the need for designing a B2BUA-survivable identity >>> mechanism?? >>> >>> -d >> >> No mechanism can survive with B2BUAs and intermediaries in general. > > Two I-Ds have been proposed which will survive B2BUAs and SBCs: > > http://tools.ietf.org/html/draft-fischer-sip-e2e-sec-media-00 > http://tools.ietf.org/html/draft-wing-sip-identity-media-02 > >> That's why we have the e2e principle on the Internet. > > TLS and IPsec work through transport- and network-layer intermediaries (NATs > and NAPTs), and NAPTs destroy the e2e principle. > > -d > _______________________________________________ Sip mailing list https://www.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use [EMAIL PROTECTED] for questions on current sip Use [EMAIL PROTECTED] for new developments on the application of sip
