Re: P2P protocols (Re: Re: how to declare consensus when someone ignores consensus)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



In message <8F069763B60ED81B76567EBF@[10.21.114.126]>, Harald Tveit Alvestrand 
writes:

>
>let's veer off... this is much more fun than other current discussions :-)
>Since a major problem for "illegal" P2P networks at the moment is dealing
>with content that is inserted maliciously (the file named "Britney Spears'
>latest hit" that says "THOU SHALT NOT STEAL" in a thunderous voice), I
>think they have a large motivation for workable security models...... and I
>suspect that the Security ADs would LOVE to see documented a security model
>that has been proved to work in that environment.
>

As a former Security AD, I can tell you that I have a research project 
going on some aspects of this.  Believe it or not, I think the issue is 
linked to BGP security.

The real problem in the Security Considerations, though, is the defense 
against subpoena attacks.

		--Steven M. Bellovin, http://www.cs.columbia.edu/~smb



_______________________________________________

Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]