ietf
[Top] [All Lists]

Re: P2P protocols (Re: Re: how to declare consensus when someone ignores consensus)

2006-01-23 09:39:22
In message <8F069763B60ED81B76567EBF(_at_)[10(_dot_)21(_dot_)114(_dot_)126]>, 
Harald Tveit Alvestrand 
writes:


let's veer off... this is much more fun than other current discussions :-)
Since a major problem for "illegal" P2P networks at the moment is dealing
with content that is inserted maliciously (the file named "Britney Spears'
latest hit" that says "THOU SHALT NOT STEAL" in a thunderous voice), I
think they have a large motivation for workable security models...... and I
suspect that the Security ADs would LOVE to see documented a security model
that has been proved to work in that environment.


As a former Security AD, I can tell you that I have a research project 
going on some aspects of this.  Believe it or not, I think the issue is 
linked to BGP security.

The real problem in the Security Considerations, though, is the defense 
against subpoena attacks.

                --Steven M. Bellovin, http://www.cs.columbia.edu/~smb



_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/ietf