[165548] in North American Network Operators' Group
Re: Internet Surveillance and Boomerang Routing: A Call for
daemon@ATHENA.MIT.EDU (Dobbins, Roland)
Sun Sep 8 04:32:35 2013
From: "Dobbins, Roland" <rdobbins@arbor.net>
To: NANOG list <nanog@nanog.org>
Date: Sun, 8 Sep 2013 08:12:30 +0000
In-Reply-To: <m2a9jnvj5v.wl%randy@psg.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Sep 8, 2013, at 2:58 PM, Randy Bush wrote:
> cool. then i presume you will continue to run using rc4 and rsa 1024.
The point is that no matter what crypto algorithms are developed and implem=
ented, it's generally trivial for authorized (for whatever value of 'author=
ized' applies in a given situation) entities to obviate them by simply comp=
romising the endpoints under color of law, if nothing else.
If folks are unhappy with the current state of affairs, they ought to conce=
ntrate on writing laws, not code.
-----------------------------------------------------------------------
Roland Dobbins <rdobbins@arbor.net> // <http://www.arbornetworks.com>
Luck is the residue of opportunity and design.
-- John Milton