Re: [cnit] CNIT Charter bashing..

Richard Shockey <richard@shockey.us> Tue, 02 June 2015 16:55 UTC

Return-Path: <richard@shockey.us>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB2DD1A6EF1 for <cnit@ietfa.amsl.com>; Tue, 2 Jun 2015 09:55:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 2.382
X-Spam-Level: **
X-Spam-Status: No, score=2.382 tagged_above=-999 required=5 tests=[BAYES_50=0.8, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, MIME_QP_LONG_LINE=0.001, RCVD_IN_BL_SPAMCOP_NET=1.347, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id foJFeB596PZd for <cnit@ietfa.amsl.com>; Tue, 2 Jun 2015 09:55:37 -0700 (PDT)
Received: from qproxy5-pub.mail.unifiedlayer.com (qproxy5-pub.mail.unifiedlayer.com [69.89.21.30]) by ietfa.amsl.com (Postfix) with SMTP id A48271B3432 for <cnit@ietf.org>; Tue, 2 Jun 2015 09:55:37 -0700 (PDT)
Received: (qmail 27301 invoked by uid 0); 2 Jun 2015 16:55:37 -0000
Received: from unknown (HELO cmgw3) (10.0.90.84) by qproxy5.mail.unifiedlayer.com with SMTP; 2 Jun 2015 16:55:37 -0000
Received: from box462.bluehost.com ([74.220.219.62]) by cmgw3 with id baUf1q00T1MNPNq01aUi8k; Tue, 02 Jun 2015 16:28:45 -0600
X-Authority-Analysis: v=2.1 cv=d9Vml3TE c=1 sm=1 tr=0 a=jTEj1adHphCQ5SwrTAOQMg==:117 a=jTEj1adHphCQ5SwrTAOQMg==:17 a=cNaOj0WVAAAA:8 a=f5113yIGAAAA:8 a=j1VUBDpLDLYA:10 a=MKtGQD3n3ToA:10 a=1oJP67jkp3AA:10 a=ZZnuYtJkoWoA:10 a=8WrITzYgnNwA:10 a=-h4zUWlAkX4A:10 a=XAFQembCKUMA:10 a=PeFO9FbFhS32YxYntvkA:9 a=dci_DRCyiIAA:10 a=CiRkrLRW1GAA:10 a=iycWLhIX580A:10 a=ll-iCDY8AAAA:8 a=M0OflfRGAAAA:8 a=HLLxP2VMAAAA:8 a=bfLuiRfvAAAA:8 a=48vgC7mUAAAA:8 a=pGLkceISAAAA:8 a=rVJLarO3Jijctql1XjoA:9 a=DHqZKblqtk1asM1G:21 a=eJa_48NMxDuTL5zB:21 a=wPNLvfGTeEIA:10 a=ivbTfD_dPm4A:10 a=6fpOX-4qs7AA:10 a=BQYh4w-RC7EA:10 a=PRbaxNLCZWG2UeMc41kA:9 a=5opRPf3ef9wBm6ni:21 a=5cgQo5oj_-PiFvCz:21 a=DLxVWb4qe9OfuVm4:21 a=_W_S_7VecoQA:10
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-type:Mime-version:In-Reply-To:References:Message-ID:CC:To:From:Subject:Date; bh=4z/CovSqXQO0EZWv5w8OPsOreXqUroCgKq7/7Gyjx/8=; b=JmAs99PAGfUF+YZQ83lh+kRrYQc7b+VlY0BQ1WqmQPUVsiISyP3ls6wNI1B9JVoyW7rBc7qbT2dW03h6WImz++QY2AiqZCF2Y+ldVkGHf/zQGZxTxGvf3ouzfE95aCBM;
Received: from [108.56.131.149] (port=54979 helo=[192.168.1.12]) by box462.bluehost.com with esmtpa (Exim 4.84) (envelope-from <richard@shockey.us>) id 1YzpA3-0007Kl-8i; Tue, 02 Jun 2015 10:35:31 -0600
User-Agent: Microsoft-MacOutlook/14.5.1.150515
Date: Tue, 02 Jun 2015 12:35:27 -0400
From: Richard Shockey <richard@shockey.us>
To: Brian Rosen <br@brianrosen.net>
Message-ID: <D1935329.26322%richard@shockey.us>
Thread-Topic: [cnit] CNIT Charter bashing..
References: <D13EDE15.22E45%richard@shockey.us> <CAHBDyN7KX9dPTHiuWGk-yqqkDt+LYqnDwY_pBWpnLdJFCMvPeg@mail.gmail.com> <CAHBDyN5KZpiA4bU_gvcB+Wk0Bv9AS0+bvU9OsCS3OpMDbUGchA@mail.gmail.com> <D1890314.25B94%richard@shockey.us> <D52BE1C0-20EA-40A0-A0CC-28197574E0BB@standardstrack.com> <D18CCD06.25EF7%richard@shockey.us> <DC70415A-A553-411C-B96F-D5FB59C36AD5@brianrosen.net>
In-Reply-To: <DC70415A-A553-411C-B96F-D5FB59C36AD5@brianrosen.net>
Mime-version: 1.0
Content-type: multipart/alternative; boundary="B_3516093331_419067"
X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 108.56.131.149 authed with richard+shockey.us}
Archived-At: <http://mailarchive.ietf.org/arch/msg/cnit/A0EI1b-N64AzwN3O-49FXtPLRfQ>
Cc: cnit@ietf.org
Subject: Re: [cnit] CNIT Charter bashing..
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit/>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jun 2015 16:55:41 -0000

Hopefully but I still haven¹t seen any response to my concern about
normative dependencies on STIR.

If we can define the object/headers first then I don¹t have a issue.

‹ 
Richard Shockey
Shockey Consulting LLC
Chairman of the Board SIP Forum
www.shockey.us
www.sipforum.org
richard<at>shockey.us
Skype-Linkedin-Facebook rshockey101
PSTN +1 703-593-2683


From:  Brian Rosen <br@brianrosen.net>
Date:  Tuesday, June 2, 2015 at 12:26 PM
To:  Richard Shockey <richard@shockey.us>
Cc:  Eric Burger <eburger@standardstrack.com>, <cnit@ietf.org>
Subject:  Re: [cnit] CNIT Charter bashing..

Are we planning to submit a charter in the next couple of days, and then see
if we can get a slot at the next IETF?

Brian
> On May 28, 2015, at 1:55 PM, Richard Shockey <richard@shockey.us> wrote:
> 
> 
> A fair argument but I don¹t want to spend 5 years waiting for a series of
> normative dependencies on the trust model before actually understanding what
> headers can/should be used here.
> 
> 
> Its much too difficult to get things done in the IETF as it is.   I¹d much
> prefer building from success starting with the definition of the data object
> then ..then folding that into a trust model and frankly given what we have
> seen in STIR I¹m not sure your argument holds up. Again the MARTINI model.
> 
> Didn¹t you recently  say something about ³perfection is the enemy of the good²
> :-) 
> 
> 
> 
> From:  Eric Burger <eburger@standardstrack.com>
> Date:  Wednesday, May 27, 2015 at 10:11 PM
> To:  <cnit@ietf.org>
> Subject:  Re: [cnit] CNIT Charter bashing..
> 
> On May 25, 2015, at 5:31 PM, Richard Shockey <richard@shockey.us> wrote:
>> 
>> From:  Mary Barnes <mary.ietf.barnes@gmail.com>
>> Date:  Friday, May 22, 2015 at 12:58 PM
>> Attached is what I have at this point. Really, the only thing I'm struggling
>> with is the milestones as I don't think we can request publication of the
>> data object and headers without having defined the trust model.
>> 
>> 
>> RS> Mary I¹m not sure about that statement. I can certainly anticipate
>> several deployment models where the trust mechanism (aka signing) does not
>> need to be formally integrated in the solution especially those where the
>> exchange of data is more bi-lateral and the trust mechanism is at lower
>> layers of the stack than the signaling. My initial concern  is what is the
>> header and what is the data object(s) carried in the header. How the CNIT
>> data is created should not be our concern.
> 
> I do not buy it. If there are private agreements between service providers,
> they have private agreements. They can do whatever they want.
> 
> Last I looked, this is the Internet Engineering Task Force. Assume untrusted
> transport across the wide open Internet, and trust no endpoint that cannot
> cryptographically prove who they are. If it happens two service providers
> exchange CNIT data over a single, yellow cable, then it is a benefit that no
> state-sponsored security service can listen in on the cable.
> 
> I do not want to take three years to build a protocol and two more years after
> that for products to be available just to have a system that only works in
> walled gardens. I do not want to be the person that has to explain to the
> media why Calling Name Delivery is just as broken as it always was and it will
> be another five years before the world sees a real solution.
> 
> Let us get this right the first time.
> [snip]
> _______________________________________________ cnit mailing list
> cnit@ietf.orghttps://www.ietf.org/mailman/listinfo/cnit
> _______________________________________________
> cnit mailing list
> cnit@ietf.org
> https://www.ietf.org/mailman/listinfo/cnit