[165548] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Internet Surveillance and Boomerang Routing: A Call for

daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Sun Sep 8 04:32:35 2013

From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
Date: Sun, 8 Sep 2013 08:12:30 +0000
In-Reply-To: <m2a9jnvj5v.wl%randy@psg.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Sep 8, 2013, at 2:58 PM, Randy Bush wrote:

> cool.  then i presume you will continue to run using rc4 and rsa 1024.

The point is that no matter what crypto algorithms are developed and implem=
ented, it's generally trivial for authorized (for whatever value of 'author=
ized' applies in a given situation) entities to obviate them by simply comp=
romising the endpoints under color of law, if nothing else.

If folks are unhappy with the current state of affairs, they ought to conce=
ntrate on writing laws, not code.

-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>

	  Luck is the residue of opportunity and design.

		       -- John Milton



home help back first fref pref prev next nref lref last post