Re: Admission Control to the IETF 78 and IETF 79 Networks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Phillip,

In your earlier email, you state:

If the designers had actual brains instead of bits of liver strapped
round their waist by dogbert then all that would be necessary to
securely authenticate to the network is to give either the MAC address
of the computer or the fingerprint of the cert.

Note that you say "either". Now you state:

Of course the MAC address is trivially forged. That is the function of
the certificate.

Maybe you should check your waist.

Chris.


--
Chris Elliott
chelliot@xxxxxxxxx

_______________________________________________
Ietf mailing list
Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]