Re: [cnit] CNIT Charter bashing..

"DOLLY, MARTIN C" <md3135@att.com> Thu, 11 June 2015 11:17 UTC

Return-Path: <md3135@att.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F37D1A1B2A for <cnit@ietfa.amsl.com>; Thu, 11 Jun 2015 04:17:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.209
X-Spam-Level:
X-Spam-Status: No, score=-4.209 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3AGideVY19Du for <cnit@ietfa.amsl.com>; Thu, 11 Jun 2015 04:17:37 -0700 (PDT)
Received: from nbfkord-smmo06.seg.att.com (nbfkord-smmo06.seg.att.com [209.65.160.94]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E4681A1B27 for <cnit@ietf.org>; Thu, 11 Jun 2015 04:17:36 -0700 (PDT)
Received: from unknown [144.160.229.24] (EHLO alpi155.enaf.aldc.att.com) by nbfkord-smmo06.seg.att.com(mxl_mta-7.2.4-5) with ESMTP id 05e69755.2b5f1e696940.68867.00-2447.191719.nbfkord-smmo06.seg.att.com (envelope-from <md3135@att.com>); Thu, 11 Jun 2015 11:17:36 +0000 (UTC)
X-MXL-Hash: 55796e50455aa424-ab26014bfca73e0798ab53b02cc8741282c6018e
Received: from unknown [144.160.229.24] (EHLO alpi155.enaf.aldc.att.com) by nbfkord-smmo06.seg.att.com(mxl_mta-7.2.4-5) over TLS secured channel with ESMTP id 44e69755.0.68750.00-2313.191394.nbfkord-smmo06.seg.att.com (envelope-from <md3135@att.com>); Thu, 11 Jun 2015 11:17:25 +0000 (UTC)
X-MXL-Hash: 55796e453762e0f9-fc071f7a750335088e8a878479101cc69c4d443c
Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id t5BBHNr7024935; Thu, 11 Jun 2015 07:17:23 -0400
Received: from mlpi407.sfdc.sbc.com (mlpi407.sfdc.sbc.com [130.9.128.239]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id t5BBHGdK024885 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 11 Jun 2015 07:17:18 -0400
Received: from MISOUT7MSGHUBAC.ITServices.sbc.com (MISOUT7MSGHUBAC.itservices.sbc.com [130.9.129.147]) by mlpi407.sfdc.sbc.com (RSA Interceptor); Thu, 11 Jun 2015 11:16:56 GMT
Received: from MISOUT7MSGUSRDB.ITServices.sbc.com ([169.254.2.218]) by MISOUT7MSGHUBAC.ITServices.sbc.com ([130.9.129.147]) with mapi id 14.03.0224.002; Thu, 11 Jun 2015 07:16:56 -0400
From: "DOLLY, MARTIN C" <md3135@att.com>
To: Richard Shockey <richard@shockey.us>, Brian Rosen <br@brianrosen.net>, Henning Schulzrinne <Henning.Schulzrinne@fcc.gov>
Thread-Topic: [cnit] CNIT Charter bashing..
Thread-Index: AQHQo/Wmd4mIgS3m+kqeJkvhgMQzyp2nKEEQ
Date: Thu, 11 Jun 2015 11:16:56 +0000
Message-ID: <E42CCDDA6722744CB241677169E8365603611F84@MISOUT7MSGUSRDB.ITServices.sbc.com>
References: <D13EDE15.22E45%richard@shockey.us> <CAHBDyN7KX9dPTHiuWGk-yqqkDt+LYqnDwY_pBWpnLdJFCMvPeg@mail.gmail.com> <CAHBDyN5KZpiA4bU_gvcB+Wk0Bv9AS0+bvU9OsCS3OpMDbUGchA@mail.gmail.com> <D1890314.25B94%richard@shockey.us> <D52BE1C0-20EA-40A0-A0CC-28197574E0BB@standardstrack.com> <D18CCD06.25EF7%richard@shockey.us> <DC70415A-A553-411C-B96F-D5FB59C36AD5@brianrosen.net> <D1935329.26322%richard@shockey.us> <D19E6FBB.26C5B%richard@shockey.us>
In-Reply-To: <D19E6FBB.26C5B%richard@shockey.us>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [135.70.170.154]
Content-Type: multipart/alternative; boundary="_000_E42CCDDA6722744CB241677169E8365603611F84MISOUT7MSGUSRDB_"
MIME-Version: 1.0
X-RSA-Inspected: yes
X-RSA-Classifications: public
X-AnalysisOut: [v=2.0 cv=NdFRIR/4 c=1 sm=1 a=dhB6nF3YHL5t/Ixux6cINA==:17 a]
X-AnalysisOut: [=57hriNzNDrAA:10 a=BLceEmwcHowA:10 a=zQP7CpKOAAAA:8 a=XIqp]
X-AnalysisOut: [o32RAAAA:8 a=XAFQembCKUMA:10 a=48vgC7mUAAAA:8 a=OTLVf7z5AA]
X-AnalysisOut: [AA:8 a=HLLxP2VMAAAA:8 a=ll-iCDY8AAAA:8 a=M0OflfRGAAAA:8 a=]
X-AnalysisOut: [bfLuiRfvAAAA:8 a=pGLkceISAAAA:8 a=a5WBIJHMAqT_G6dV7MUA:9 a]
X-AnalysisOut: [=CjuIK1q_8ugA:10 a=ivbTfD_dPm4A:10 a=6fpOX-4qs7AA:10 a=BQY]
X-AnalysisOut: [h4w-RC7EA:10 a=h7FFQaHNOm0A:10 a=-FEs8UIgK8oA:10 a=NWVoK91]
X-AnalysisOut: [CQyQA:10 a=YjslTbWl2Kh1mXfy:21 a=AgCM2ckP_584_VTE:21 a=yMh]
X-AnalysisOut: [MjlubAAAA:8 a=SSmOFEACAAAA:8 a=tUPRzhJqMJBkg069AVcA:9 a=gK]
X-AnalysisOut: [O2Hq4RSVkA:10 a=UiCQ7L4-1S4A:10 a=hTZeC7Yk6K0A:10 a=frz4Au]
X-AnalysisOut: [Cg-hUA:10 a=HcZJvQPTZL6vOaws:21 a=3D7E5WQWfelHWsfl:21 a=kS]
X-AnalysisOut: [lJqWJs9iNENKBn:21]
X-Spam: [F=0.2000000000; CM=0.500; S=0.200(2014051901)]
X-MAIL-FROM: <md3135@att.com>
X-SOURCE-IP: [144.160.229.24]
Archived-At: <http://mailarchive.ietf.org/arch/msg/cnit/ek7JRUAYWPq0jIFuJg3NWAWKyg8>
Cc: "cnit@ietf.org" <cnit@ietf.org>
Subject: Re: [cnit] CNIT Charter bashing..
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit/>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Jun 2015 11:17:41 -0000

Richard this is my understanding.

From: cnit [mailto:cnit-bounces@ietf.org] On Behalf Of Richard Shockey
Sent: Wednesday, June 10, 2015 11:01 PM
To: Brian Rosen; Henning Schulzrinne
Cc: cnit@ietf.org
Subject: Re: [cnit] CNIT Charter bashing..



Here is what I want to know now.

Before we start to process this concept I want to know how relevant the existing CNAM service is deployed outside North America.

I'm told by reliable sources that the CNAM service is not deployed anywhere among the major telecom markets in Europe or Asia. Not Japan China or South Korea UK Italy France and in fact it might actually be illegal under the strict privacy regulations in Germany.

I don't know.

That said our friends at Apple seem to understand there is a problem here. I have tried to engage the most senior management at Google about who would be responsible for defining how the VoLTE CUA could actually display an advanced call display data and frankly no one knows.

http://www.businessinsider.com/apple-update-in-ios9-suggests-caller-id-2015-6

There is a realistic question if this is simply a North American specific problem why is this  a IETF issue. You might ask the same question of MODERN but I frankly don't want to go there.




From: Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>>
Date: Tuesday, June 2, 2015 at 12:35 PM
To: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>
Cc: <cnit@ietf.org<mailto:cnit@ietf.org>>
Subject: Re: [cnit] CNIT Charter bashing..


Hopefully but I still haven't seen any response to my concern about normative dependencies on STIR.

If we can define the object/headers first then I don't have a issue.

-
Richard Shockey
Shockey Consulting LLC
Chairman of the Board SIP Forum
www.shockey.us<http://www.shockey.us>
www.sipforum.org<http://www.sipforum.org>
richard<at>shockey.us
Skype-Linkedin-Facebook rshockey101
PSTN +1 703-593-2683


From: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>
Date: Tuesday, June 2, 2015 at 12:26 PM
To: Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>>
Cc: Eric Burger <eburger@standardstrack.com<mailto:eburger@standardstrack.com>>, <cnit@ietf.org<mailto:cnit@ietf.org>>
Subject: Re: [cnit] CNIT Charter bashing..

Are we planning to submit a charter in the next couple of days, and then see if we can get a slot at the next IETF?

Brian
On May 28, 2015, at 1:55 PM, Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>> wrote:


A fair argument but I don't want to spend 5 years waiting for a series of normative dependencies on the trust model before actually understanding what headers can/should be used here.


Its much too difficult to get things done in the IETF as it is.   I'd much prefer building from success starting with the definition of the data object then ..then folding that into a trust model and frankly given what we have seen in STIR I'm not sure your argument holds up. Again the MARTINI model.

Didn't you recently  say something about "perfection is the enemy of the good"  :-)



From: Eric Burger <eburger@standardstrack.com<mailto:eburger@standardstrack.com>>
Date: Wednesday, May 27, 2015 at 10:11 PM
To: <cnit@ietf.org<mailto:cnit@ietf.org>>
Subject: Re: [cnit] CNIT Charter bashing..

On May 25, 2015, at 5:31 PM, Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>> wrote:

From: Mary Barnes <mary.ietf.barnes@gmail.com<mailto:mary.ietf.barnes@gmail.com>>
Date: Friday, May 22, 2015 at 12:58 PM
Attached is what I have at this point. Really, the only thing I'm struggling with is the milestones as I don't think we can request publication of the data object and headers without having defined the trust model.


RS> Mary I'm not sure about that statement. I can certainly anticipate several deployment models where the trust mechanism (aka signing) does not need to be formally integrated in the solution especially those where the exchange of data is more bi-lateral and the trust mechanism is at lower layers of the stack than the signaling. My initial concern  is what is the header and what is the data object(s) carried in the header. How the CNIT data is created should not be our concern.

I do not buy it. If there are private agreements between service providers, they have private agreements. They can do whatever they want.

Last I looked, this is the Internet Engineering Task Force. Assume untrusted transport across the wide open Internet, and trust no endpoint that cannot cryptographically prove who they are. If it happens two service providers exchange CNIT data over a single, yellow cable, then it is a benefit that no state-sponsored security service can listen in on the cable.

I do not want to take three years to build a protocol and two more years after that for products to be available just to have a system that only works in walled gardens. I do not want to be the person that has to explain to the media why Calling Name Delivery is just as broken as it always was and it will be another five years before the world sees a real solution.

Let us get this right the first time.
[snip]
_______________________________________________ cnit mailing list cnit@ietf.org<mailto:cnit@ietf.org>https://www.ietf.org/mailman/listinfo/cnit
_______________________________________________
cnit mailing list
cnit@ietf.org<mailto:cnit@ietf.org>
https://www.ietf.org/mailman/listinfo/cnit

_______________________________________________ cnit mailing list cnit@ietf.org<mailto:cnit@ietf.org> https://www.ietf.org/mailman/listinfo/cnit