In message <8F069763B60ED81B76567EBF(_at_)[10(_dot_)21(_dot_)114(_dot_)126]>,
Harald Tveit Alvestrand
let's veer off... this is much more fun than other current discussions :-)
Since a major problem for "illegal" P2P networks at the moment is dealing
with content that is inserted maliciously (the file named "Britney Spears'
latest hit" that says "THOU SHALT NOT STEAL" in a thunderous voice), I
think they have a large motivation for workable security models...... and I
suspect that the Security ADs would LOVE to see documented a security model
that has been proved to work in that environment.
As a former Security AD, I can tell you that I have a research project
going on some aspects of this. Believe it or not, I think the issue is
linked to BGP security.
The real problem in the Security Considerations, though, is the defense
against subpoena attacks.
--Steven M. Bellovin, http://www.cs.columbia.edu/~smb
Ietf mailing list