I sent a note to the people beta testing TIS/PEM to note when it first
gets used between organizations for something useful, i.e. not
involving the administration of PEM. The CERT folks provided the good
news that I was a little late in asking.
------- Forwarded Message
To: Stephen D Crocker <crocker(_at_)TIS(_dot_)COM>
Subject: Re: Just a quick note to identify ourselves
In-Reply-To: Your message of "Wed, 21 Oct 92 12:42:34 EDT."
<9210211642(_dot_)AA06067(_at_)TIS(_dot_)COM>
Date: Wed, 21 Oct 92 13:44:42 -0400
From: "Kenneth R. van Wyk" <krvw(_at_)cert(_dot_)org>
- -----BEGIN PRIVACY-ENHANCED MESSAGE-----
Proc-Type: 4,MIC-CLEAR
Originator-ID-Asymmetric: MDgxCzAJBgNVBAYTAlVTMSkwJwYDVQQKEyBDb21
wdXRlciBFbWVyZ2VuY3kgUmVzcG9uc2UgVGVhbQ==,04
MIC-Info: RSA-MD5,RSA,nMy5G2TxG0dToxHYcBFYXeWU/+3zAiSya3z1I6FSWlB
p6xLcJZZEzUrEjWn0F4mfMuyA3v1czhyK74K4PEb3qQ==
Steve Crocker writes:
Our of curiosity and possible historical interest, let's keep track of
when the first useful private PEM message is sent between two
organizations on this list. Traffic involving TIS doesn't count.
It has already happened. On 7 October 1992, the CERT used TIS/PEM to
exchange unix vulnerability information with another TIS/PEM user.
The transactions were encrypted and I'm happy to report that TIS/PEM
came through with flying colors.
Cheers,
Ken
- -----END PRIVACY-ENHANCED MESSAGE-----
------- End of Forwarded Message