Hi,

On 5/16/14, 10:30 PM, Brian E Carpenter wrote:
> I've been waiting for Peter Gutmann's slides to appear on line
> since I first saw them some months ago. Well worth studying:
>
> http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf
>
> Favourite quotes: "It's probably at least some sort of sign
> of the end times when your conference badge has a rootkit."
>
> "There were so many other ways to render DKIM ineffective
> that no-one bothered attacking the crypto."
>

Except for [1], of course.  I am also not one for these sorts of laundry
list presentations, as it comes across as the sky is falling, and leads
one to not take responsibility for one's own faults.  The public
statements from our leadership on this have been quite clear: we will
fix what we can fix... and perhaps exhort others to fix what they can fix.

Anyone who thinks this is a sprint is in the wrong race.  It's a STRINT ;-)

Eliot
[1] http://www.theregister.co.uk/2012/10/24/uscert_dkim_spoofing_flaw/


_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to