On Mon, Feb 13, 2012 at 5:08 PM, Kyle Hamilton <[email protected]> wrote: > I think the existing mandate that everything be authenticated and tunneled > end-to-end only hurts the IETF. We need to develop systems within models
If it's not end-to-end it's hop-by-hop or worse: no security. So you think hop-by-hop is better than end-to-end? Yes, there are systems where only hop-by-hop security works, but generally we should prefer end-to-end. If you have a good argument for !end-to-end I'm all ears. Perhaps you don't like trusted third parties. But end-to-end doesn't imply trusted third parties. Internet scale security has required trusted third parties to date, but it's not because of the end-to-end architecture. (Or perhaps I completely misunderstood you.) Nico -- _______________________________________________ therightkey mailing list [email protected] https://www.ietf.org/mailman/listinfo/therightkey
