As I mentioned earlier I am not particularly a fan of getting
a security framework out in front of a protocol framework.  While
security needs to be designed in from the outset, it also needs
to be closely coupled to the actual mechanisms being used.

yinxing> In my view, we need to analyze the security threats and 
requirements systematically, and then identify defensive techniques. 
It will help the design of the protocol.

I'm also concerned about the whole "trusted network" thing.  I
think that if you're going to continue to hang onto it (and I'd
really rather that you did not), you should probably explain in the
document that one of your starting assumptions is that there
are no insider threats.

yinxing>Sometimes byzantine attack is possible. It may be more
acceptable to analyze possible attackes before making some assumptions.

------------
Yinxing Wei


Melinda
_______________________________________________
nvo3 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nvo3
_______________________________________________
nvo3 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nvo3

Reply via email to