On Saturday, January 28, 2006 01:11:38 PM -0500 David B Harrington
<ietfdbh(_at_)comcast(_dot_)net> wrote:
This conversation of the IETF65 location started with an issue of
security.
I'd like to get this discussion back on track.
What are the security requirements for a distributed burrito
processing protocol?
If you are traveling from the conference hotel to a restaurant and are
mugged, is that considered a man-in-the-middle attack?
That would, of course, depend on the gender of the mugger. However, the
important thing to note is that such attacks can be prevented by the use of
strong end-to-end security, such as an armored car, or perhaps a tank. Of
course, there is always a tradeoff to be made in these situations. For
example, I'm given to understand that tanks tend to be a bit trickier to
drive than cars...
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/ietf