At 10:03 PM -0400 9/29/08, Paul Wouters wrote:
On Sun, 28 Sep 2008, Paul Hoffman wrote:

 An attack can only be used if the compromise is unnoticed
 and the attacker can act as an MITM in an unnoticed way.

Not at all. Even when noticed, there is still the time before the
majority of the world has fixed the compromised use for which there
are still victims to use the attack against.

Fully agree, and I was to glib there. I should have said "...can only be used long term if..."

24 hours of owning .com can be pretty profitable.

True, but a key compromise of the .com KSK or current ZSK is not quite the same as "owning". But this is not relevant, since this is not text I was proposing to put in the document, just an explanation why I removed something that was better discussed elsewhere.

--Paul Hoffman, Director
--VPN Consortium
_______________________________________________
DNSOP mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to