Re: Trusted Proxy Alternatives Analysis

Hi Emilie

On 07.02.2014 12:23, emile.stephan@orange.com wrote:
 > Hi Frode,
 >
 >  The term MITM in not appropriate for these cases: the service 
augmentation
 >  is performed by the reverse proxy of the mobile operator. This 
reverse proxy
 >  receives and processes the requests for the service provided by the 
mobile
 >  operator.

Is the client configured to use this proxy? If not, I prefer to use MITM 
although the wording may not be the the most important isue...

Regarding the "identity binding", an alternative is of course to do this 
end-2-end. If this for some reason isn't an alternative, I would propose 
that the use case description clearly states why, both in regard to 
end-user experience ("User benefit") and/or service/network provider 
issues ("Admin Benefit").

Regards
Frode Kileng

Received on Friday, 7 February 2014 11:54:54 UTC