-----Original Message-----

From: Ondřej Surý <ondrej.s...@nic.cz>
Date: Wednesday, September 4, 2013 10:37 AM
To: "wbr...@e1b.org" <wbr...@e1b.org>
Cc: "dns-operati...@dns-oarc.net" <dns-operati...@dns-oarc.net>
Subject: Re: [dns-operations] Implementation of negative trust anchors?

>On 22. 8. 2013, at 21:59, wbr...@e1b.org wrote:
>> Our browsers give us the option to trust invalid TLS certificates, some
>> even storing it indefinitely.  Is an NTA much different?
>
>And in certain circles it's considered by one of the biggest mistakes
>that could have happened, and the reason why the whole PKI fails so hard
>now.

I just want to point out that vendors or software in general should
certainly ship secure by default, BUT also give users the option to shoot
their own foot (with adequate documentation and shepherding away from
loading the gun).

I believe in security, but also free choice.  When the two seem to
conflict, better education is the answer not removing one's ability to
make choices.  There will always be use cases the smartest can not fathom
which make perfect sense to someone you have not met...no matter how well
intentioned we are, I don't believe controlling someone else's destiny
through force alone is the right path.  In my mind, this applies to
SSL/TLS, NTA, etc.

_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to