On Saturday, January 28, 2006 01:11:38 PM -0500 David B Harrington <ietfdbh@xxxxxxxxxxx> wrote:
This conversation of the IETF65 location started with an issue of security. I'd like to get this discussion back on track. What are the security requirements for a distributed burrito processing protocol? If you are traveling from the conference hotel to a restaurant and are mugged, is that considered a man-in-the-middle attack?
That would, of course, depend on the gender of the mugger. However, the important thing to note is that such attacks can be prevented by the use of strong end-to-end security, such as an armored car, or perhaps a tank. Of course, there is always a tradeoff to be made in these situations. For example, I'm given to understand that tanks tend to be a bit trickier to drive than cars...
_______________________________________________ Ietf@xxxxxxxx https://www1.ietf.org/mailman/listinfo/ietf