ietf
[Top] [All Lists]

RE: Last Call: <draft-farrell-perpass-attack-02.txt> (Pervasive Monitoring is an Attack) to Best Current Practice

2014-01-01 10:53:00
Russ and others,

Just as an example of where we get ourselves sideways in talking
about what the draft says and means...

--On Wednesday, January 01, 2014 08:56 -0500 Russ White
<russw(_at_)riw(_dot_)us> wrote:

==
- Does this protocol proposal provide for ways to hide the
information being transmitted between two parties, if
applicable? 

That isn't what it says.  By saying "hide", you are accidentally
making the same encryption or encryption-like assumption I made.
For the reasons you give below, I think that assumption is
usually reasonable, but I think we really mean "ways to make the
information hard to intercept and interpret" or which "hidden"
is only one family of techniques.  For those who know the story
and with apologies to those who don't, "how is your Navajo"?

There are some instances where this is not applicable, such as
routing protocols, or information about useable resources in
CDNI. OTOH, there are many instances where this is applicable,
such as specific orders for specific content within the CDNI
realm. This question, by the way, is also a relevant security
question.

Indeed.
    john




<Prev in Thread] Current Thread [Next in Thread>