Am 30.07.2014 um 13:16 schrieb Wietse Venema:
> BlueStar88:
>> Regardless how difficult it would be to develop a reliable solution for
>> that, I keep thinking here and throw another idea, inspired by Tor and
>> it's multilayer crypto: Is there a way, once a connection is established
>> to the server, to establish another one downwards within that
>> connection? 
> I suggest that you Google for FUSSP.
>
> The idea is that "if everyone will switch from the existing protocol
> X to my protocol Y, then the problem will be solved."
>
>       Wietse

Thanks for that one. Well, don't move then. Stay where we are now and
enjoy the show. While the adversaries definitely will improve in
weakening current standards or simply keep using already known
weaknesses. I wonder how we came to those current standards (protocols)
today, if high rank developers laughing at the need for new ones or
about the obvious need of making current ones better or about just
extending their use.
There was a time before SSH. How it comes someone decided to change from
well established protocols like TELNET? So what is the point, not to
address the asymmetry problem we have here? If an application can use an
established TLS connection to make another one back trough it, it's not
about changing the protocol at a whole, it's just about extending it's
usage for the sake of a better security of all people using it. If you
can make an unique feature for Postfix out of it, why not? Postfix is
well spread and that'll help. It could remain compatible for other
products by not using that new extension at all.

It's true, I'm not a developer and I don't have that specific and deep
view of things. The result is, that I show up somewhat naive perhaps,
but you shouldn't blame me for that. Both worlds, the developers and the
technology integrators have the same goal: Try to reach the best
possible solution for their users. My best part I can do, is to throw
ideas in. I'm limited to that, sorry.

-- 
BlueStar88 (bluesta...@xenobite.eu)


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to