[Rucus] Proposed Charter Text
Hannes Tschofenig <Hannes.Tschofenig@gmx.net> Tue, 26 February 2008 18:23 UTC
Return-Path: <rucus-bounces@ietf.org>
X-Original-To: ietfarch-rucus-archive@core3.amsl.com
Delivered-To: ietfarch-rucus-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5ABCA28C1D4; Tue, 26 Feb 2008 10:23:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.665
X-Spam-Level:
X-Spam-Status: No, score=-0.665 tagged_above=-999 required=5 tests=[AWL=-0.228, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_ORG=0.611, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wvB-CzH249RQ; Tue, 26 Feb 2008 10:23:54 -0800 (PST)
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 798C23A6C19; Tue, 26 Feb 2008 10:23:54 -0800 (PST)
X-Original-To: rucus@core3.amsl.com
Delivered-To: rucus@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 2055F3A6CCB for <rucus@core3.amsl.com>; Tue, 26 Feb 2008 10:23:54 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 35WXHAq4CcAi for <rucus@core3.amsl.com>; Tue, 26 Feb 2008 10:23:53 -0800 (PST)
Received: from mail.gmx.net (mail.gmx.net [213.165.64.20]) by core3.amsl.com (Postfix) with SMTP id D42093A680E for <rucus@ietf.org>; Tue, 26 Feb 2008 10:23:52 -0800 (PST)
Received: (qmail invoked by alias); 26 Feb 2008 18:23:46 -0000
Received: from a91-154-103-163.elisa-laajakaista.fi (EHLO [192.168.255.5]) [91.154.103.163] by mail.gmx.net (mp018) with SMTP; 26 Feb 2008 19:23:46 +0100
X-Authenticated: #29516787
X-Provags-ID: V01U2FsdGVkX1/BwzoHOfDBIzVZrRyM4+JfEMVd2Rsznq0uNM1xUO mF71rzwe+oaOj/
Message-ID: <47C45927.3060102@gmx.net>
Date: Tue, 26 Feb 2008 20:23:35 +0200
From: Hannes Tschofenig <Hannes.Tschofenig@gmx.net>
User-Agent: Thunderbird 2.0.0.12 (Windows/20080213)
MIME-Version: 1.0
To: rucus BoF <rucus@ietf.org>
X-Y-GMX-Trusted: 0
Subject: [Rucus] Proposed Charter Text
X-BeenThere: rucus@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
Reply-To: Hannes.Tschofenig@gmx.net
List-Id: <rucus.ietf.org>
List-Unsubscribe: <http://www.ietf.org/mailman/listinfo/rucus>, <mailto:rucus-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/rucus>
List-Post: <mailto:rucus@ietf.org>
List-Help: <mailto:rucus-request@ietf.org?subject=help>
List-Subscribe: <http://www.ietf.org/mailman/listinfo/rucus>, <mailto:rucus-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: rucus-bounces@ietf.org
Errors-To: rucus-bounces@ietf.org
Here is the current proposal for the charter that includes some of suggestions I received. -------------- The Session Initiation Protocol (SIP) defines a system for user-to-user multimedia communications. Therefore, it is susceptible to unwanted communication attempts. RFC 5039 analyzes the problem of spam in SIP and examines various possible solutions that have been discussed for email and considers their applicability to SIP. RFC 5039 gives good, high-level recommendations regarding future work, namely * Strong Identity * White Lists * Solve the Introduction Problem * Don't Wait Until It's Too Late Strong identities and white lists will be essential but do do not address all problems. Among the challenges are compromised hosts controlled by a botnet, even with access to credentials, are the major source of email spam today and expected to remain the main source of SIP spam in the future. Among the many individual solution building blocks that are discussed in RFC 5039 (including content filtering, black lists, white lists, consent-based communication, reputation systems, address obfuscation, limited use addresses, turing tests, computational puzzles, payments at risk, circles of trust, and many others) there is no framework outlined how various mechanisms work together to produce a complete solution nor does the document attempt to offer a ranking to determine which solutions could form an initial set of candidate for subsequent standardization. This exploratory group chartered for one year aims to create a venue where discussions on unwanted communication in SIP can take place. The main goal of the group is to produce an architecture document that sheds light on the interworking between a minimal set of building blocks. The architectural investigations should cover different threat models, including those of compromised end hosts. The group will consider prior work on SIP identity and related techniques and will consult with privacy experts to deal with the regulatory aspects of blocking communication attempts. Outside the scope of the group are investigations in the area of voice analysis and algorithms for statistical analysis. Milestones Mar 08.....BoF @ IETF#71 Jul 08........Formation of an exploratory working group Jan 09.......First WG draft on the architecture document Jun 09.......Submit architecture document to the IESG for consideration as informational RFC Jul 09........Close group and decide on future work _______________________________________________ Rucus mailing list Rucus@ietf.org http://www.ietf.org/mailman/listinfo/rucus
- [Rucus] Proposed Charter Text Hannes Tschofenig