PS:

Aaron Zauner wrote:
> No it's not. It's a very short presentation from a TLS-WG interim
> meeting. The threat-model concerns Akamai's (and other's) current and -
> possibly - future use of TLS. We're not trying to build an Onion routing
> protocol. Given the FUD on the Tor dev list, this is a good thing. While
> the presentation might have flaws from the perspective of an Onion
> routing protocol developer, it reflects the point of view of a lot of
> people/companies on this list, I assume.
> 

I don't think traffic analysis is in the treat model for TLS proper. If
we wanted to circumvent traffic analysis we'd have to introduce noise
and randomness (Pond does a good job there using Tor and other
mechanisms). I don't see how we can engineer a low-latency (now even
0-RTT) network security protocol that will do that in a performant
manner. When time comes and people have 10-40-100GE at home, maybe.
Infiniband would be nice. But that will still leave out use for 3rd
world countries (which still run on XP anyway). This is a technical list
and we should keep politics and FUD aside as best as possible.


Greetings from a very empty Sinai peninsula,
(A)aron

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to