On 10/29/2013 08:38 AM, Charles Chance wrote:
I agree with Olle that the common "pass the buck" attitude is wrong, although in this case I don't believe securing the messages should be mandatory. Often the communication between servers will be over a private/secure network and the user should be allowed to disable it if they deem it an unnecessary overhead.
My personal opinion, mine only, is that transport security is most efficiently provided by transport/network-layer technologies, especially inside static networks.
HTTPS/TLS on the web makes sense because web browsing inherently entails ad hoc connections to unfamiliar servers. That's the very nature of the web and of the browser. The argument could be made that this is also the nature of SIP when it comes to peer-to-peer IP/IP calling, but de facto, the few places where SIP-TLS is used, it seems to be mostly used to encrypt signaling between fixed peers (aka "a SIP trunk"). Or at least, that's my impression--I haven't done a study.
Either way, does DMQ traffic look more like WWW traffic, or more like infrastructure traffic between a fixed number of endpoints within a static topology? I would contend that it is the latter, and for this reason, it should be up to the network administrator to build a secure network, use encrypted tunnels if necessary, etc.
However, I've always been against overcomplicating things, which isn't how IETF/standards/evangelism/advocacy/consulting careers are made...
-- Alex