Dan York wrote:
So after writing my response to Paul Kyzivat's response to Cullen, I thought about it some more and realized that I ought to collect those thoughts into an I-D, which I have now submitted. I did so primarily because I haven't really seen discussion of the end user's *experience* of working with "trusted identity" (if I missed such a discussion, please feel free to point it out to me).

Dan: A while ago -- maybe early last year -- we had a great
big thread on the idea of showing a locked padlock to impart
the notion of a secure call.  This discussion was in the
context of the sipsec URI draft (see
http://tools.ietf.org/html/draft-gurbani-sip-sipsec-01).  The
allegory we adopted, which is also discussed in the draft, was
that of a "hopping bunny with a lock in its mouth" (as a
tribute to SIP's hop-by-hop security model.)  In any case,
among other discussions that resulted in the thread were
reasons why this is not completely attainable (although at that
time, the work on dtls-srtp was not as advanced as it is now.)

The draft is a good starting point that distills a lot of
the discussion that preceded it, so it may be worth a read.
I will attempt to find the threaded discussion in the mailing
list archives and send you a link to it tomorrow.

Ciao.

- vijay
--
Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
2701 Lucent Lane, Rm. 9F-546, Lisle, Illinois 60532 (USA)
Email: [EMAIL PROTECTED],bell-labs.com,acm.org}
WWW:   http://www.alcatel-lucent.com/bell-labs
_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to