Buying and selling root certificates
David Lesher
wb8foz at nrk.com
Thu Apr 29 02:03:17 UTC 2004
Steve asked:
> Put another way, what's your threat model?
Reminder:
That is THE question you ask first for any security question,
where "security" is everything from door locks at home, parking
spaces at dinner ....to # of guards with M-16's at the data center.
And you should ask it 3-4 times, and see what variety of answers
you get.....
Then ask again at the next review. (Things Change -- just recall
who our biggest ally was in defeating Hitler...and against Iran...)
I see lots of people putting {virtual} vault doors on straw houses.
--
A host is a host from coast to coast.................wb8foz at nrk.com
& no one will talk to a host that's close........[v].(301) 56-LINUX
Unless the host (that isn't close).........................pob 1433
is busy, hung or dead....................................20915-1433
More information about the NANOG
mailing list