On Saturday, January 28, 2006 01:11:38 PM -0500 David B Harrington <[EMAIL PROTECTED]> wrote:

This conversation of the IETF65 location started with an issue of
security.

I'd like to get this discussion back on track.
What are the security requirements for a distributed burrito
processing protocol?
If you are traveling from the conference hotel to a restaurant and are
mugged, is that considered a man-in-the-middle attack?

That would, of course, depend on the gender of the mugger. However, the important thing to note is that such attacks can be prevented by the use of strong end-to-end security, such as an armored car, or perhaps a tank. Of course, there is always a tradeoff to be made in these situations. For example, I'm given to understand that tanks tend to be a bit trickier to drive than cars...



_______________________________________________
Ietf mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/ietf

Reply via email to