- From: Frode Kileng <frodek@tele.no>
- Date: Thu, 06 Feb 2014 23:05:01 +0100
- To: ietf-http-wg@w3.org
Great initiative Peter. Regarding "Mike's Music Service". My understanding of this is use-case is that it includes two parts: 1. Zero-rating of the mobile data traffic: As long as the encrypted traffic is not passing through a 3rd party proxy, the mobile operator can achieve this using traffic-meta data. 2. Identity binding Similar to the functionality in "Liam's Mobile Identity Proxy". I.e. where the MITM proxy inserts an identity binding in the header for authentication towards a 3rd party service. Regards frodek On 06.02.2014 18:19, Peter Lepeska wrote: > In Zurich there was a request to look into the viability of > alternative technologies for the trusted proxy use cases. To help > organize thoughts around this, I've created a table listing each use > case from https://github.com/http2/http2-spec/wiki/Proxy-User-Stories > and an attempt to describe how each of these cases can be addressed > using today's technology as well as alternatives: > https://github.com/bizzbyster/TrustedProxy/wiki/Trusted-Proxy-Use-Case-Analysis-and-Alternatives > > This is just a straw man attempt to provide some organization so feel > free to question, comment and suggest improvements. > > In summary, I think all use cases where the user owns the device are > inadequately solved by today's technology. As for alternatives, CDNs > partially address a subset of the use cases potentially, and then only > on a site by site basis. > > Thanks, > > Peter
Received on Thursday, 6 February 2014 22:05:24 UTC