Dan Wing | 5 Sep 00:50 2007
Picon

Security Analysis of Voice-over-IP Protocols


I expect this paper will be of interest.

  http://www.cyber-ta.org/pubs/shmat_csf071.pdf

-d

Dan Wing | 20 Sep 20:25 2007
Picon

RE: DTLS-SRTP - more work for the SIP group

I support this plan.  

To that end, the authors of draft-wing-media-security-requirements and
draft-wing-rtpsec-keying-eval have combined the documents into one document,
and added Brian Stucker as another co-author of this joint document,

 
http://www.ietf.org/internet-drafts/draft-wing-media-security-requirements-05.
txt
  "Requirements and Analysis of Media Security Key Management Protocols"

   Abstract:
   A number of proposals have been published to address the need of
   securing media traffic.  A summary of the proposals available at that
   time is available in the appendix of this document.  Different
   assumptions, requirements, and usage environments justify every one
   of them.  This document aims to summarize the discussed media
   security requirements.  A comparison of the requirements against the
   individual proposals is provided.

-d

> -----Original Message-----
> From: DRAGE, Keith (Keith) [mailto:drage <at> alcatel-lucent.com] 
> Sent: Tuesday, September 18, 2007 11:41 AM
> To: sip <at> ietf.org
> Subject: [Sip] DTLS-SRTP - more work for the SIP group
> 
> (As WG co-chair)
> 
(Continue reading)


Gmane