Re: new tech report on easy-to-use IPsec

2010-08-14 Thread Steven Bellovin

On Aug 11, 2010, at 12:21 47PM, Adam Aviv wrote:

 I think the list may get a kick out of this.
 
 The tech-report was actually posted on the list previously, which is
 where I found it. Link included for completeness.
 
 http://mice.cs.columbia.edu/getTechreport.php?techreportID=1433

Thanks.  I'll add that the code is now up on SourceForge under a BSD license:
http://sourceforge.net/projects/simple-vpn/


 
 
 
  Original Message 
 Subject: Re: new tech report on easy-to-use IPsec
 Date: Wed, 28 Jul 2010 21:36:47 -0400
 From: Steven Bellovin s...@cs.columbia.edu
 To: Adam Aviv a...@cis.upenn.edu
 
 
 On Jul 28, 2010, at 9:29 51PM, Adam Aviv wrote:
 I couldn't help but notice this nugget of wisdom in your report:
 
 [quote]
 
 Public key infrastructures (PKIs) are surrounded by a great
 mystique. Organizations are regularly told that they are complex,
 require ultra-high security, and perhaps are best outsourced to
 competent parties. Setting up a certifcate authority (CA) requires a
 ceremony, a term with a technical meaning [13] but nevertheless
 redolent of high priests in robes, acolytes with censers, and
 more. This may or may not be true in general; for most IPsec uses,
 however, little of this is accurate. (High priests and censers are
 defnitely not needed; we are uncertain about the need for acolytes
 ...)
 
 Peter Gutmann told me privately that he thinks the alternate model
 involves human sacrifices and perhaps a goat...
 
 
   --Steve Bellovin, http://www.cs.columbia.edu/~smb
 
 
 
 
 
 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com
 


--Steve Bellovin, http://www.cs.columbia.edu/~smb





-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com


Fwd: Re: new tech report on easy-to-use IPsec

2010-08-11 Thread Adam Aviv
I think the list may get a kick out of this.

The tech-report was actually posted on the list previously, which is
where I found it. Link included for completeness.

http://mice.cs.columbia.edu/getTechreport.php?techreportID=1433



 Original Message 
Subject: Re: new tech report on easy-to-use IPsec
Date: Wed, 28 Jul 2010 21:36:47 -0400
From: Steven Bellovin s...@cs.columbia.edu
To: Adam Aviv a...@cis.upenn.edu


On Jul 28, 2010, at 9:29 51PM, Adam Aviv wrote:
 I couldn't help but notice this nugget of wisdom in your report:

 [quote]

 Public key infrastructures (PKIs) are surrounded by a great
 mystique. Organizations are regularly told that they are complex,
 require ultra-high security, and perhaps are best outsourced to
 competent parties. Setting up a certifcate authority (CA) requires a
 ceremony, a term with a technical meaning [13] but nevertheless
 redolent of high priests in robes, acolytes with censers, and
 more. This may or may not be true in general; for most IPsec uses,
 however, little of this is accurate. (High priests and censers are
 defnitely not needed; we are uncertain about the need for acolytes
 ...)

Peter Gutmann told me privately that he thinks the alternate model
involves human sacrifices and perhaps a goat...


--Steve Bellovin, http://www.cs.columbia.edu/~smb





-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to majord...@metzdowd.com