Hi, On 5/16/14, 10:30 PM, Brian E Carpenter wrote: > I've been waiting for Peter Gutmann's slides to appear on line > since I first saw them some months ago. Well worth studying: > > http://regmedia.co.uk/2014/05/16/0955_peter_gutmann.pdf > > Favourite quotes: "It's probably at least some sort of sign > of the end times when your conference badge has a rootkit." > > "There were so many other ways to render DKIM ineffective > that no-one bothered attacking the crypto." >
Except for [1], of course. I am also not one for these sorts of laundry list presentations, as it comes across as the sky is falling, and leads one to not take responsibility for one's own faults. The public statements from our leadership on this have been quite clear: we will fix what we can fix... and perhaps exhort others to fix what they can fix. Anyone who thinks this is a sprint is in the wrong race. It's a STRINT ;-) Eliot [1] http://www.theregister.co.uk/2012/10/24/uscert_dkim_spoofing_flaw/ _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
