[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: Richard Shockey <rich.shockey@NeuStar.com>
Cc: Greg Hudson <ghudson@MIT.EDU>, keydist@cafax.se, smb@research.att.com, jis@MIT.EDU
From: Derek Atkins <derek@ihtfp.com>
Date: 04 Oct 2002 13:09:53 -0400
In-Reply-To: <5.1.0.14.2.20021004123415.04335db8@popd.ix.netcom.com>
Sender: owner-keydist@cafax.se
User-Agent: Gnus/5.0808 (Gnus v5.8.8) Emacs/20.7
Subject: Re: I intend to have a document ready for Atlanta on this subject.

Richard Shockey <rich.shockey@NeuStar.com> writes:

> Your security point is well taken however fewer indirections are a
> "good thing" but I will trade that for a more diverse and distributed
> infrastructure.

And herein lies the problem.  When designing a protocol for security
infrastructure, you cannot trade off security.  Well, I suppose you
_can_, but then you're just doing a disservice to yourself and your
users.

-derek

-- 
       Derek Atkins
       Computer and Internet Security Consultant
       derek@ihtfp.com             www.ihtfp.com



Home | Date list | Subject list