On 7/17/12 11:58 AM, Luyuan Fang (lufang) wrote:
About the 'trusted', 'untrusted', they are not new. The terms are
used in IETF RFCs/drafts all the time. I think it helps to first
establish the reference points from which direction/zone the security
threat are coming from, then talk about threads and requirements.

They are, but to be honest I don't think I've seen them used like
this, anywhere.  It was certainly the case that, for example,
rserpool tried to make similar assumptions about the security of
so-called "trusted networks" and was, uh, gently corrected.

And as I mentioned the last time around, and was not answered,
there's a question of scoping here:  do you really want this
draft only to be applicable to cases when there's a high degree
of "trust" of all devices connected to a given overlay?

Melinda
_______________________________________________
nvo3 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nvo3

Reply via email to