At 6:36 PM +0900 7/7/07, Masataka Ohta wrote:
Keith Moore wrote:
Also from the draft:
"At least for the strong security requirement of BCP 61 [RFC3365], the
Security Area, with the support of the IESG, has insisted that all
specifications include at least one mandatory-to-implement strong
security mechanism to guarantee universal interoperability."
I do not think this is a factual statement, at least when it comes to
HTTP, which is where my interest lies.
note that it is not necessary to have at least one
mandatory-to-implement strong security mechanism to guarantee
What, do you mean, strong security?
Given that CAs of PKI can be compromised as easily as ISPs
of the Internet, PKI is merely weakly secure as weakly as
the plain Internet.
Masataka Ohta
The notion of CA compromise and ISP comprise are not completely
comparable, which makes your comparison suspect.
Also, the security implications of errors (or sloppiness) by ISPs is
very different from that of CAs, so I don't think your comparison
makes sense in that regard as well.
Steve
_______________________________________________
Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf