[VOIPSEC] Using SRTP for University project

Andrew Graydon securityrequirements at voipsa.org
Sun Mar 26 08:14:58 CST 2006


I'm not sure there is currently a 'normally' situation ! 


_____

Andrew Graydon

Chair Security Requirements Committee 
VOIPSA

agraydon at voipsa.org
http://www.voipsa.org
-----Original Message-----
From: Nathan Allen Stratton [mailto:nathan at robotics.net] 
Sent: March 26, 2006 8:32 AM
To: Weidong Shao
Cc: Voipsec at voipsa.org; Christian Stredicke
Subject: Re: [VOIPSEC] Using SRTP for University project

On Sat, 25 Mar 2006, Weidong Shao wrote:

> Yes, I think simplicity of sdescriptions is the key.  D-H type
ofmechanisms are end-to-end secure but are more complex.
> Another factor is that most enterprises and, of course, thegovernment,
would like to have the capability of call monitoring orrecording. So vendors
may choose to avoid Diffie-Hellman key exchangeto make the solutions easier
for everyone.
> W. Shao

Actually sdes works fine for that, normally you would run TLS/sdes from CPE
to SBC. If you had any intercept request everything inside your private
network would be clear.


><>
Nathan Stratton
nathan at robotics.net
http://www.robotics.net

_______________________________________________
Voipsec mailing list
Voipsec at voipsa.org
http://voipsa.org/mailman/listinfo/voipsec_voipsa.org








More information about the Voipsec mailing list