Buying and selling root certificates

David Lesher wb8foz at nrk.com
Thu Apr 29 02:03:17 UTC 2004


Steve asked:

 
> Put another way, what's your threat model?  

Reminder:

That is THE question you ask first for any security question,
where "security" is everything from door locks at home, parking
spaces at dinner ....to # of guards with M-16's at the data center.

And you should ask it 3-4 times, and see what variety of answers
you get.....

Then ask again at the next review. (Things Change -- just recall
who our biggest ally was in defeating Hitler...and against Iran...)

I see lots of people putting {virtual} vault doors on straw houses.







-- 
A host is a host from coast to coast.................wb8foz at nrk.com
& no one will talk to a host that's close........[v].(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433



More information about the NANOG mailing list