On 10/29/2013 08:38 AM, Charles Chance wrote:
I agree with Olle that the common "pass the
buck" attitude is wrong,
although in this case I don't believe securing the messages should be
mandatory. Often the communication between servers will be over a
private/secure network and the user should be allowed to disable it if
they deem it an unnecessary overhead.
My personal opinion, mine only, is that transport security is most
efficiently provided by transport/network-layer technologies, especially
inside static networks.
HTTPS/TLS on the web makes sense because web browsing inherently entails
ad hoc connections to unfamiliar servers. That's the very nature of the
web and of the browser. The argument could be made that this is also
the nature of SIP when it comes to peer-to-peer IP/IP calling, but de
facto, the few places where SIP-TLS is used, it seems to be mostly used
to encrypt signaling between fixed peers (aka "a SIP trunk"). Or at
least, that's my impression--I haven't done a study.
Either way, does DMQ traffic look more like WWW traffic, or more like
infrastructure traffic between a fixed number of endpoints within a
static topology? I would contend that it is the latter, and for this
reason, it should be up to the network administrator to build a secure
network, use encrypted tunnels if necessary, etc.
However, I've always been against overcomplicating things, which isn't
how IETF/standards/evangelism/advocacy/consulting careers are made...
-- Alex
--
Alex Balashov - Principal
Evariste Systems LLC
235 E Ponce de Leon Ave
Suite 106
Decatur, GA 30030
United States
Tel: +1-678-954-0670
Web:
http://www.evaristesys.com/,
http://www.alexbalashov.com/