Hannes Tschofenig

Personal blog about various IETF and Internet related activities

 

Archive for February, 2007

Feb
25
2007

This document describes an extension to the TLS protocol to allow TLS clients to authenticate with legacy credentials using the Extensible Authentication Protocol (EAP). This allows many secure authentication and key exchange protocols to be used for client-side authentication even in an HTTP-based environment, ideally suited for many of the currently discussed identity management proposals. An […]

Feb
25
2007

Summoning police, fire department, ambulance or other emergency services in case of emergency is one of the fundamental and most-valued functions of the telephone. As telephone functionality moves from circuit-switched telephony to Internet telephony, its users rightfully expect that this core functionality will continue to work at least as well as is has for the […]

Feb
25
2007

Dan Wing, Steffen Fries, Francois Audet and myself have recently released a new Internet Draft called “Disclosing Secure RTP (SRTP) Session Keys with a SIP Event Package” that addresses situations where you want both the secure encryption of all voice and also the ability to record calls. However, right now this is difficult to do in any “standard” […]

Feb
18
2007

Another LoST draft update has been submitted, namely the -04 draft version http://www.ietf.org/internet-drafts/draft-ietf-ecrit-lost-04.txt LoST is an XML-based protocol for mapping service identifiers and geodetic or civic location information to service contact URIs.  In particular, it can be used to determine the location-appropriate PSAP for emergency services. The changes include clarifications from the -03 document reviews, the biggest […]

Feb
18
2007

Common Policy, see http://www.ietf.org/rfc/rfc4745.txt, is a XML-based format for expressing privacy preferences. In order to be used it needs to be extended for a specific application usage. One such application using the Common Policy framework is for presence authorization (see http://tools.ietf.org/wg/simple/draft-ietf-simple-presence-rules/). A further example is location-based authorization policies (see Geolocation Policy described in http://tools.ietf.org/wg/geopriv/draft-ietf-geopriv-policy/). Let us consider a […]




Forgot?

Categories

Tags

Hannes Tschofenig's Recent Tweets