see inline.
Carsten Bormann wrote on 2022-09-30 00:37:
On 2022-09-30, at 09:25, Paul Vixie <[email protected]> wrote:
what did you have in mind as an example of this, that i might not dislike?
...
The part I do not understand is why this is always framed in terms of
uncontrolled (unrestricted) visibility, i.e., everybody who manages to
get hold of a packet has full visibility.
i could live with uncontrolled visibility on my own VM server's internal
networks, or on my datacenter or home LAN. i am open to other ways to
achieve the nec'y visibility -- i don't require that it be uncontrolled.
...
Instead, I'd prefer to pursue something that I'd call Authorized
Visibility (AV). Here, the communication actors explicitly provide
visibility to additional justified parties, not simply to any
eavesdropper that comes along. ...
i'd be fine with this, as long as it was possible for my gateway to
determine at line rate whether each packet trying to get through was
participating in the Authorized Visibility regime you're describing.
Grüße, Carsten
and you.
--
P Vixie