Re: [VIPR] VIPR privacy issue

Kurt Bergsbaken <KBergsbaken@UNIVISION.NET> Thu, 26 January 2012 22:34 UTC

Return-Path: <prvs=0372a90b52=KBergsbaken@UNIVISION.NET>
X-Original-To: vipr@ietfa.amsl.com
Delivered-To: vipr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DBDF21F8624 for <vipr@ietfa.amsl.com>; Thu, 26 Jan 2012 14:34:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.031
X-Spam-Level:
X-Spam-Status: No, score=0.031 tagged_above=-999 required=5 tests=[AWL=2.630, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3jSlLybmdg9S for <vipr@ietfa.amsl.com>; Thu, 26 Jan 2012 14:34:25 -0800 (PST)
Received: from nmail.univision.net (nmail.univision.net [216.156.154.24]) by ietfa.amsl.com (Postfix) with ESMTP id 3BC6921F8613 for <vipr@ietf.org>; Thu, 26 Jan 2012 14:34:25 -0800 (PST)
From: Kurt Bergsbaken <KBergsbaken@UNIVISION.NET>
To: "'mary.ietf.barnes@gmail.com'" <mary.ietf.barnes@gmail.com>, "'petithug@acm.org'" <petithug@acm.org>
Date: Thu, 26 Jan 2012 17:34:21 -0500
Thread-Topic: [VIPR] VIPR privacy issue
Thread-Index: AczcdGEY4UqHrCCMSDyDowwpp9nwgQABkTAQ
Message-ID: <379B85522FA3D542813DF7D02EC8DF99576ED41A9F@mia-exmbx02>
In-Reply-To: <CAHBDyN5k80ijGBR4LuA+4E-XsA4Sxe=Hv-VWt5tZH6JHd9DLhw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
x-exclaimer-md-config: 355ae39f-542b-4f28-a0b5-1f4463b74c90
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Received-SPF: none
Cc: "'vipr@ietf.org'" <vipr@ietf.org>, "'dean.willis@softarmor.com'" <dean.willis@softarmor.com>
Subject: Re: [VIPR] VIPR privacy issue
X-BeenThere: vipr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Verification Involving PSTN Reachability working group <vipr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/vipr>, <mailto:vipr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/vipr>
List-Post: <mailto:vipr@ietf.org>
List-Help: <mailto:vipr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/vipr>, <mailto:vipr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Jan 2012 22:34:26 -0000

Are there viable candidates to displace RELOAD that could be shovel-ready within the acceptable event horizon?


Kurt Bergsbaken | Architect -SIP Voice Services | Univision Communications Inc. | 8550 NW 33rd Street, Miami, FL 33122
Direct: (305) 463-5745 | Fax: (786) 515-9229 | kbergsbaken@univision.net | www.univision.com

----- Original Message -----
From: Mary Barnes [mailto:mary.ietf.barnes@gmail.com]
Sent: Thursday, January 26, 2012 04:49 PM
To: Marc Petit-Huguenin <petithug@acm.org>
Cc: vipr@ietf.org <vipr@ietf.org>; Dean Willis <dean.willis@softarmor.com>
Subject: Re: [VIPR] VIPR privacy issue

Unfortunately, options 2 and 3 introduce delays that decrease the
relevance/utility of VIPR , which in my view has significant near term
(i.e., now) value, but in the long term is likely to be far less
useful.

Mary.

On Thu, Jan 26, 2012 at 3:38 PM, Marc Petit-Huguenin <petithug@acm.org> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> On 01/26/2012 01:28 PM, Dean Willis wrote:
>>
>> On Jan 26, 2012, at 10:40 AM, Richard L. Barnes wrote:
>>>
>>>
>>> Like I said, the mitigation here is the same as any situation where you
>>> want to hide your IP address: Send packets from a different network.
>>
>>
>> So we should run a great big VPN in order to run RELOAD in order to run
>> ViPR?
>>
>> Great! Now all we need is a peer-to-peer VPN capable of obscuring the IP
>> addresses being used.
>>
>> I'm trying to imagine just how badly the universe would break if one tried
>> to run RELOAD over TOR. I don't think I have that good an imagination,
>> because scenes from the movie "2012" pale by comparison, and I'm sure the
>> real situation would be far worse than what I imagine.
>>
>> But this does all come back to why I haven't been able to convince myself
>> of the real-world utility of ViPR. We're layering vast complexity onto what
>> is basically a distributed  trust-anchor problem, where the easiest thing
>> to do in the real-world is to have a centralized anchor (which might itself
>> refer to the PSTN basis anchor).
>>
>> How about an alt-root DDNS/ENUM server that itself uses PSTN reachability
>> to verify registrations submitted via DDNS?
>
> That may be worth investigating, but the first thing that the WG should
> answer, IMHO, is do we want to 1) give up, 2) delay for RELOAD, or 3) replace
> RELOAD?
>
> - --
> Marc Petit-Huguenin
> Personal email: marc@petit-huguenin.org
> Professional email: petithug@acm.org
> Blog: http://blog.marc.petit-huguenin.org
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.11 (GNU/Linux)
>
> iQIcBAEBCAAGBQJPIcfqAAoJECnERZXWan7E6sQP/2jBmenEmlsQ+Pe5V1F/qn7e
> kSQjw6EuUGKjz5oONhsbEw2N4kAHwtivQlfriJoT4NxeYspWWvg+13Btb4+OlTFU
> QNAU9rY0Zd+AZJvFBII70TGjKl5aRZ5G7LRmgfsyp88OAODs9FtHRVzTtQVSTbEV
> ZYWtzYXRWcYosH+9sML7vFn8gf5njDsR0pTEV1Xt+DVdVbec+MV35zHmX8gOtR84
> +s/LalXe8rPUdmDV7qAHHZir9gCj2FmSuJlb2KGr3IfEj+mD1FeRTfsN8bhtE0zZ
> cfg8yAYjLgvNy7O7ZXFN8GIQx40StJqRXCxuzrJ0CHHDlS3NJ8vv8IVM8mlMIt0d
> UaHnC4DcU3yQGFNGe+f3cG1KrtAIsDTUJyyppsra4Q41dP4eporG8uWZDbIJwDMI
> Jg7nwSJD6RJ8qL6zgWl1gNyfRXOKG3s3Wt8Oy/l00Q837N8+KxGRA7WeEu0PMjkR
> 8d1C/i4dPymKVA5FsdPatG+/dHee8FzbYKriGOmCXsGhx5+rcW3m3tVE+lpzqBZ9
> 0dysmnJmjNJUcsHIp+o+CWKd5FcSewxfNMHy762lmJME7srDVzENd8rWi5luHVWn
> k1KviQe82XaV6PhKb6/K3rSSotNAPKwkSiIvSsuaOeDv1Wmzi472Mp/BX0M2/s9p
> 5hv+PEtbfXzcNBh+zW3r
> =OqpG
> -----END PGP SIGNATURE-----
> _______________________________________________
> VIPR mailing list
> VIPR@ietf.org
> https://www.ietf.org/mailman/listinfo/vipr
_______________________________________________
VIPR mailing list
VIPR@ietf.org
https://www.ietf.org/mailman/listinfo/vipr

The information contained in this e-mail and any attached 
documents may be privileged, confidential and protected from 
disclosure.  If you are not the intended recipient you may not 
read, copy, distribute or use this information.  If you have 
received this communication in error, please notify the sender 
immediately by replying to this message and then delete it 
from your system.