RE: Last Call: <draft-farrell-perpass-attack-02.txt> (Pervasive Monitoring is an Attack) to Best Current Practice

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Russ and others,

Just as an example of where we get ourselves sideways in talking
about what the draft says and means...

--On Wednesday, January 01, 2014 08:56 -0500 Russ White
<russw@xxxxxx> wrote:

> ==
> - Does this protocol proposal provide for ways to hide the
> information being transmitted between two parties, if
> applicable? 

That isn't what it says.  By saying "hide", you are accidentally
making the same encryption or encryption-like assumption I made.
For the reasons you give below, I think that assumption is
usually reasonable, but I think we really mean "ways to make the
information hard to intercept and interpret" or which "hidden"
is only one family of techniques.  For those who know the story
and with apologies to those who don't, "how is your Navajo"?

> There are some instances where this is not applicable, such as
> routing protocols, or information about useable resources in
> CDNI. OTOH, there are many instances where this is applicable,
> such as specific orders for specific content within the CDNI
> realm. This question, by the way, is also a relevant security
> question.

Indeed.
    john








[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]