[Rucus] Proposed Charter Text

Hannes Tschofenig <Hannes.Tschofenig@gmx.net> Tue, 26 February 2008 18:23 UTC

Return-Path: <rucus-bounces@ietf.org>
X-Original-To: ietfarch-rucus-archive@core3.amsl.com
Delivered-To: ietfarch-rucus-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5ABCA28C1D4; Tue, 26 Feb 2008 10:23:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.665
X-Spam-Level:
X-Spam-Status: No, score=-0.665 tagged_above=-999 required=5 tests=[AWL=-0.228, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_ORG=0.611, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wvB-CzH249RQ; Tue, 26 Feb 2008 10:23:54 -0800 (PST)
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 798C23A6C19; Tue, 26 Feb 2008 10:23:54 -0800 (PST)
X-Original-To: rucus@core3.amsl.com
Delivered-To: rucus@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2055F3A6CCB for <rucus@core3.amsl.com>; Tue, 26 Feb 2008 10:23:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 35WXHAq4CcAi for <rucus@core3.amsl.com>; Tue, 26 Feb 2008 10:23:53 -0800 (PST)
Received: from mail.gmx.net (mail.gmx.net [213.165.64.20]) by core3.amsl.com (Postfix) with SMTP id D42093A680E for <rucus@ietf.org>; Tue, 26 Feb 2008 10:23:52 -0800 (PST)
Received: (qmail invoked by alias); 26 Feb 2008 18:23:46 -0000
Received: from a91-154-103-163.elisa-laajakaista.fi (EHLO [192.168.255.5]) [91.154.103.163] by mail.gmx.net (mp018) with SMTP; 26 Feb 2008 19:23:46 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/BwzoHOfDBIzVZrRyM4+JfEMVd2Rsznq0uNM1xUO mF71rzwe+oaOj/
Message-ID: <47C45927.3060102@gmx.net>
Date: Tue, 26 Feb 2008 20:23:35 +0200
From: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
User-Agent: Thunderbird 2.0.0.12 (Windows/20080213)
MIME-Version: 1.0
To: rucus BoF <rucus@ietf.org>
X-Y-GMX-Trusted: 0
Subject: [Rucus] Proposed Charter Text
X-BeenThere: rucus@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Hannes.Tschofenig@gmx.net
List-Id: <rucus.ietf.org>
List-Unsubscribe: <http://www.ietf.org/mailman/listinfo/rucus>, <mailto:rucus-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/rucus>
List-Post: <mailto:rucus@ietf.org>
List-Help: <mailto:rucus-request@ietf.org?subject=help>
List-Subscribe: <http://www.ietf.org/mailman/listinfo/rucus>, <mailto:rucus-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: rucus-bounces@ietf.org
Errors-To: rucus-bounces@ietf.org

Here is the current proposal for the charter that includes some of 
suggestions I received.

--------------

The Session Initiation Protocol (SIP) defines a system for user-to-user 
multimedia communications.
Therefore, it is susceptible to unwanted communication attempts. RFC 
5039 analyzes the problem of
spam in SIP and examines various possible solutions that have been 
discussed for email and considers
their applicability to SIP.

RFC 5039 gives good, high-level recommendations regarding future work, 
namely

    * Strong Identity
    * White Lists
    * Solve the Introduction Problem
    * Don't Wait Until It's Too Late

Strong identities and white lists will be essential but do do not 
address all problems. Among the
challenges are compromised  hosts controlled by a botnet, even with 
access to credentials, are
the major source of email spam today and expected to remain the main 
source of SIP spam in the future.

Among the many individual solution building blocks that are discussed in 
RFC 5039 (including content
filtering, black lists, white lists, consent-based communication, 
reputation systems, address
obfuscation, limited use addresses, turing tests, computational puzzles, 
payments at risk, circles
of trust, and many others) there is no framework outlined how various 
mechanisms work together to
produce a complete solution nor does the document attempt to offer a 
ranking to determine which
solutions could form an initial set of candidate for subsequent 
standardization.

This exploratory group chartered for one year aims to create a venue 
where discussions on unwanted
communication in SIP can take place. The main goal of the group is to 
produce an architecture
document that sheds light on the interworking between a minimal set of 
building blocks.
The architectural investigations should cover different threat models, 
including those of
compromised end hosts.

The group will consider prior work on SIP identity and related 
techniques and will consult with
privacy experts to deal with the regulatory aspects of blocking 
communication attempts.

Outside the scope of the group are investigations in the area of voice 
analysis and algorithms for
statistical analysis.


Milestones

Mar 08.....BoF @ IETF#71
Jul 08........Formation of an exploratory working group
Jan 09.......First WG draft on the architecture document
Jun 09.......Submit architecture document to the IESG for consideration 
as informational RFC
Jul 09........Close group and decide on future work

_______________________________________________
Rucus mailing list
Rucus@ietf.org
http://www.ietf.org/mailman/listinfo/rucus