Re: [VIPR] VIPR privacy issue
Kurt Bergsbaken <KBergsbaken@UNIVISION.NET> Thu, 26 January 2012 22:34 UTC
Return-Path: <prvs=0372a90b52=KBergsbaken@UNIVISION.NET>
X-Original-To: vipr@ietfa.amsl.com
Delivered-To: vipr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DBDF21F8624 for <vipr@ietfa.amsl.com>; Thu, 26 Jan 2012 14:34:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.031
X-Spam-Level:
X-Spam-Status: No, score=0.031 tagged_above=-999 required=5 tests=[AWL=2.630, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3jSlLybmdg9S for <vipr@ietfa.amsl.com>; Thu, 26 Jan 2012 14:34:25 -0800 (PST)
Received: from nmail.univision.net (nmail.univision.net [216.156.154.24]) by ietfa.amsl.com (Postfix) with ESMTP id 3BC6921F8613 for <vipr@ietf.org>; Thu, 26 Jan 2012 14:34:25 -0800 (PST)
From: Kurt Bergsbaken <KBergsbaken@UNIVISION.NET>
To: "'mary.ietf.barnes@gmail.com'" <mary.ietf.barnes@gmail.com>, "'petithug@acm.org'" <petithug@acm.org>
Date: Thu, 26 Jan 2012 17:34:21 -0500
Thread-Topic: [VIPR] VIPR privacy issue
Thread-Index: AczcdGEY4UqHrCCMSDyDowwpp9nwgQABkTAQ
Message-ID: <379B85522FA3D542813DF7D02EC8DF99576ED41A9F@mia-exmbx02>
In-Reply-To: <CAHBDyN5k80ijGBR4LuA+4E-XsA4Sxe=Hv-VWt5tZH6JHd9DLhw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
x-exclaimer-md-config: 355ae39f-542b-4f28-a0b5-1f4463b74c90
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Received-SPF: none
Cc: "'vipr@ietf.org'" <vipr@ietf.org>, "'dean.willis@softarmor.com'" <dean.willis@softarmor.com>
Subject: Re: [VIPR] VIPR privacy issue
X-BeenThere: vipr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Verification Involving PSTN Reachability working group <vipr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/vipr>, <mailto:vipr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/vipr>
List-Post: <mailto:vipr@ietf.org>
List-Help: <mailto:vipr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/vipr>, <mailto:vipr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Jan 2012 22:34:26 -0000
Are there viable candidates to displace RELOAD that could be shovel-ready within the acceptable event horizon? Kurt Bergsbaken | Architect -SIP Voice Services | Univision Communications Inc. | 8550 NW 33rd Street, Miami, FL 33122 Direct: (305) 463-5745 | Fax: (786) 515-9229 | kbergsbaken@univision.net | www.univision.com ----- Original Message ----- From: Mary Barnes [mailto:mary.ietf.barnes@gmail.com] Sent: Thursday, January 26, 2012 04:49 PM To: Marc Petit-Huguenin <petithug@acm.org> Cc: vipr@ietf.org <vipr@ietf.org>; Dean Willis <dean.willis@softarmor.com> Subject: Re: [VIPR] VIPR privacy issue Unfortunately, options 2 and 3 introduce delays that decrease the relevance/utility of VIPR , which in my view has significant near term (i.e., now) value, but in the long term is likely to be far less useful. Mary. On Thu, Jan 26, 2012 at 3:38 PM, Marc Petit-Huguenin <petithug@acm.org> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > On 01/26/2012 01:28 PM, Dean Willis wrote: >> >> On Jan 26, 2012, at 10:40 AM, Richard L. Barnes wrote: >>> >>> >>> Like I said, the mitigation here is the same as any situation where you >>> want to hide your IP address: Send packets from a different network. >> >> >> So we should run a great big VPN in order to run RELOAD in order to run >> ViPR? >> >> Great! Now all we need is a peer-to-peer VPN capable of obscuring the IP >> addresses being used. >> >> I'm trying to imagine just how badly the universe would break if one tried >> to run RELOAD over TOR. I don't think I have that good an imagination, >> because scenes from the movie "2012" pale by comparison, and I'm sure the >> real situation would be far worse than what I imagine. >> >> But this does all come back to why I haven't been able to convince myself >> of the real-world utility of ViPR. We're layering vast complexity onto what >> is basically a distributed trust-anchor problem, where the easiest thing >> to do in the real-world is to have a centralized anchor (which might itself >> refer to the PSTN basis anchor). >> >> How about an alt-root DDNS/ENUM server that itself uses PSTN reachability >> to verify registrations submitted via DDNS? > > That may be worth investigating, but the first thing that the WG should > answer, IMHO, is do we want to 1) give up, 2) delay for RELOAD, or 3) replace > RELOAD? > > - -- > Marc Petit-Huguenin > Personal email: marc@petit-huguenin.org > Professional email: petithug@acm.org > Blog: http://blog.marc.petit-huguenin.org > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.11 (GNU/Linux) > > iQIcBAEBCAAGBQJPIcfqAAoJECnERZXWan7E6sQP/2jBmenEmlsQ+Pe5V1F/qn7e > kSQjw6EuUGKjz5oONhsbEw2N4kAHwtivQlfriJoT4NxeYspWWvg+13Btb4+OlTFU > QNAU9rY0Zd+AZJvFBII70TGjKl5aRZ5G7LRmgfsyp88OAODs9FtHRVzTtQVSTbEV > ZYWtzYXRWcYosH+9sML7vFn8gf5njDsR0pTEV1Xt+DVdVbec+MV35zHmX8gOtR84 > +s/LalXe8rPUdmDV7qAHHZir9gCj2FmSuJlb2KGr3IfEj+mD1FeRTfsN8bhtE0zZ > cfg8yAYjLgvNy7O7ZXFN8GIQx40StJqRXCxuzrJ0CHHDlS3NJ8vv8IVM8mlMIt0d > UaHnC4DcU3yQGFNGe+f3cG1KrtAIsDTUJyyppsra4Q41dP4eporG8uWZDbIJwDMI > Jg7nwSJD6RJ8qL6zgWl1gNyfRXOKG3s3Wt8Oy/l00Q837N8+KxGRA7WeEu0PMjkR > 8d1C/i4dPymKVA5FsdPatG+/dHee8FzbYKriGOmCXsGhx5+rcW3m3tVE+lpzqBZ9 > 0dysmnJmjNJUcsHIp+o+CWKd5FcSewxfNMHy762lmJME7srDVzENd8rWi5luHVWn > k1KviQe82XaV6PhKb6/K3rSSotNAPKwkSiIvSsuaOeDv1Wmzi472Mp/BX0M2/s9p > 5hv+PEtbfXzcNBh+zW3r > =OqpG > -----END PGP SIGNATURE----- > _______________________________________________ > VIPR mailing list > VIPR@ietf.org > https://www.ietf.org/mailman/listinfo/vipr _______________________________________________ VIPR mailing list VIPR@ietf.org https://www.ietf.org/mailman/listinfo/vipr The information contained in this e-mail and any attached documents may be privileged, confidential and protected from disclosure. If you are not the intended recipient you may not read, copy, distribute or use this information. If you have received this communication in error, please notify the sender immediately by replying to this message and then delete it from your system.
- Re: [VIPR] VIPR privacy issue Marc Petit-Huguenin
- [VIPR] VIPR privacy issue Marc Petit-Huguenin
- Re: [VIPR] VIPR privacy issue Kevin P. Fleming
- Re: [VIPR] VIPR privacy issue Kurt Bergsbaken
- Re: [VIPR] VIPR privacy issue Richard L. Barnes
- Re: [VIPR] VIPR privacy issue Marc Petit-Huguenin
- Re: [VIPR] VIPR privacy issue Richard L. Barnes
- Re: [VIPR] VIPR privacy issue Marc Petit-Huguenin
- Re: [VIPR] VIPR privacy issue Richard L. Barnes
- Re: [VIPR] VIPR privacy issue Marc Petit-Huguenin
- Re: [VIPR] VIPR privacy issue Dean Willis
- Re: [VIPR] VIPR privacy issue Marc Petit-Huguenin
- Re: [VIPR] VIPR privacy issue Richard L. Barnes
- Re: [VIPR] VIPR privacy issue Mary Barnes
- Re: [VIPR] VIPR privacy issue Kurt Bergsbaken
- Re: [VIPR] VIPR privacy issue Cullen Jennings
- Re: [VIPR] VIPR privacy issue Cullen Jennings
- Re: [VIPR] VIPR privacy issue Cullen Jennings
- Re: [VIPR] VIPR privacy issue Marc Petit-Huguenin
- Re: [VIPR] VIPR privacy issue Cullen Jennings
- Re: [VIPR] VIPR privacy issue Richard L. Barnes
- Re: [VIPR] VIPR privacy issue Marc Petit-Huguenin
- Re: [VIPR] VIPR privacy issue Kevin P. Fleming
- Re: [VIPR] VIPR privacy issue Dean Willis
- Re: [VIPR] VIPR privacy issue Marc Petit-Huguenin
- Re: [VIPR] VIPR privacy issue Cullen Jennings
- Re: [VIPR] VIPR privacy issue Marc Petit-Huguenin
- Re: [VIPR] VIPR privacy issue Marc Petit-Huguenin