[AusNOG] Consensus from the IETF 88 Technical Plenary - Internet hardening
Robert Hudson
hudrob at gmail.com
Sat Nov 9 11:03:32 EST 2013
Because, of course, "Geordie Guy" couldn't actually be his real name now,
could it.
I mean, there's nobody on LinkedIn by that name, and he's not visible in
any one of a dozen other places on the Internet with the same name.
Oh wait... But you stay classy with your ad hominem attacks and don't
bother doing any research though. Right?
On 9 November 2013 10:59, Lloyd Wood <lloyd.wood at yahoo.co.uk> wrote:
> An ad hominem response from an anonymous account?
>
> You stay classy, "Geordie Guy."
>
> On 8 Nov 2013, at 14:32, Geordie Guy <elomis at gmail.com> wrote:
>
> Oh wait I just looked you up on LinkedIn. Nevermind.
>
>
> On Fri, Nov 8, 2013 at 2:26 PM, Geordie Guy <elomis at gmail.com> wrote:
>
>> Gross overreaction? I'm curious to hear more about how a national scale
>> warrantless surveillance system, the bugging of the phone of foreign heads
>> of state and the hacking of some of the Internet's most important company's
>> datacenter interconnects doesn't warrant encryption. What do you think
>> would've been an appropriate response? No ice cream after dinner and
>> straight to bed?
>>
>>
>> On Fri, Nov 8, 2013 at 2:20 PM, Dobbins, Roland <rdobbins at arbor.net>wrote:
>>
>>>
>>> On Nov 8, 2013, at 10:11 AM, Mark Newton <newton at atdot.dotat.org> wrote:
>>>
>>> > I can't say I'm disappointed in this resolution. Should have happened
>>> a long time ago.
>>>
>>> The problem with overencryption of this magnitude is that besides the
>>> additional overhead, it makes dealing with DDoS attacks and other security
>>> issues considerably more difficult in terms of detection, classification,
>>> traceback, and mitigation, not to mention broadening the attack surface and
>>> providing a non-insignficant impact amplification, due to crypto overhead.
>>>
>>> On top of that, it's useless - the spooks and spies (not to mention the
>>> ODCs) simply bypass it all and get everything en clair from the endpoints
>>> themselves.
>>>
>>> This is a bad move; a gross over-reaction that, if implemented (which I
>>> doubt it will be), will degrade the overall security posture of the
>>> Internet to a significant degree.
>>>
>>> There are no technical solutions to social ills. If this comes to pass,
>>> we will all regret it.
>>>
>>> -----------------------------------------------------------------------
>>> Roland Dobbins <rdobbins at arbor.net> // <http://www.arbornetworks.com>
>>>
>>> Luck is the residue of opportunity and design.
>>>
>>> -- John Milton
>>>
>>> _______________________________________________
>>> AusNOG mailing list
>>> AusNOG at lists.ausnog.net
>>> http://lists.ausnog.net/mailman/listinfo/ausnog
>>>
>>
>>
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
>
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ausnog.net/pipermail/ausnog/attachments/20131109/7858030c/attachment.html>
More information about the AusNOG
mailing list