Re: Trusted Proxy Alternatives Analysis

Hi Frode,

I would like to faithfully update the table to reflect the groups thoughts
on this but I have to say I'm confused by what you are proposing. When you
say this "Regarding the "identity binding", an alternative is of course to
do this end-2-end." aren't you essentially saying that this could be solved
by reverse proxy / CDN? Which is what I've already put in the Alternatives
column for the Mike's Music Service use case.

Maybe I need to clarify some assumptions about forward versus reverse
proxy. In general, unlike a forward proxy, a reverse proxy is deployed by
the content owner or the content owner partner ("CDN") and so has the
private keys and so does not need to ask the user for "trust" in order to
decrypt the data.

Does that clarify anything?

thanks,

Peter


On Fri, Feb 7, 2014 at 6:54 AM, Frode Kileng <frodek@tele.no> wrote:

> Hi Emilie
>
>
> On 07.02.2014 12:23, emile.stephan@orange.com wrote:
> > Hi Frode,
> >
> >  The term MITM in not appropriate for these cases: the service
> augmentation
> >  is performed by the reverse proxy of the mobile operator. This reverse
> proxy
> >  receives and processes the requests for the service provided by the
> mobile
> >  operator.
>
> Is the client configured to use this proxy? If not, I prefer to use MITM
> although the wording may not be the the most important isue...
>
> Regarding the "identity binding", an alternative is of course to do this
> end-2-end. If this for some reason isn't an alternative, I would propose
> that the use case description clearly states why, both in regard to
> end-user experience ("User benefit") and/or service/network provider issues
> ("Admin Benefit").
>
> Regards
> Frode Kileng
>
>
>

Received on Friday, 7 February 2014 15:00:28 UTC