W3C home > Mailing lists > Public > ietf-http-wg@w3.org > January to March 2014

Re: Trusted Proxy Alternatives Analysis

From: Frode Kileng <frodek@tele.no>
Date: Thu, 06 Feb 2014 23:05:01 +0100
Message-ID: <52F4070D.9010404@tele.no>
To: ietf-http-wg@w3.org
Great initiative Peter.

Regarding "Mike's Music Service". My understanding of this is use-case
is that it includes two parts:

1. Zero-rating of the mobile data traffic:
As long as the encrypted  traffic is not passing through a 3rd party 
proxy, the mobile operator can achieve this using traffic-meta data.

2. Identity binding
Similar to the functionality in "Liam's Mobile Identity Proxy". I.e. 
where the MITM proxy inserts an identity binding in the header for 
authentication towards a 3rd party service.


On 06.02.2014 18:19, Peter Lepeska wrote:
> In Zurich there was a request to look into the viability of 
> alternative technologies for the trusted proxy use cases. To help 
> organize thoughts around this, I've created a table listing each use 
> case from https://github.com/http2/http2-spec/wiki/Proxy-User-Stories 
> and an attempt to describe how each of these cases can be addressed 
> using today's technology as well as alternatives:
> https://github.com/bizzbyster/TrustedProxy/wiki/Trusted-Proxy-Use-Case-Analysis-and-Alternatives
> This is just a straw man attempt to provide some organization so feel 
> free to question, comment and suggest improvements.
> In summary, I think all use cases where the user owns the device are 
> inadequately solved by today's technology. As for alternatives, CDNs 
> partially address a subset of the use cases potentially, and then only 
> on a site by site basis.
> Thanks,
> Peter
Received on Thursday, 6 February 2014 22:05:24 UTC

This archive was generated by hypermail 2.4.0 : Friday, 17 January 2020 17:14:24 UTC