On Mon, Feb 13, 2012 at 5:08 PM, Kyle Hamilton <[email protected]> wrote:
> I think the existing mandate that everything be authenticated and tunneled
> end-to-end only hurts the IETF.  We need to develop systems within models

If it's not end-to-end it's hop-by-hop or worse: no security.  So you
think hop-by-hop is better than end-to-end?  Yes, there are systems
where only hop-by-hop security works, but generally we should prefer
end-to-end.  If you have a good argument for !end-to-end I'm all ears.

Perhaps you don't like trusted third parties.  But end-to-end doesn't
imply trusted third parties.  Internet scale security has required
trusted third parties to date, but it's not because of the end-to-end
architecture.  (Or perhaps I completely misunderstood you.)

Nico
--
_______________________________________________
therightkey mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/therightkey

Reply via email to