On 12-05-27 at 11:54pm, Bjarni RĂșnar Einarsson wrote:
> A minor clarification... :-)
> 
> On Sat, May 26, 2012 at 11:26 PM, Jonathan Wilkes <jancs...@yahoo.com> 
> wrote:
> > The approaches I can think of are:
> > a) pagekite et al, which would then become a central point of 
> >    attack/failure
> 
> Yes and no. PageKite's "central point of failure" is by design the 
> exact same central point as that of the web itself: the DNS system.
> 
> PageKite assumes that there are many different front-end relay servers 
> available, and connections can move from one to another at any time. 
> So if one relay is taken down, the website is simply routed to another 
> one and DNS gets updated.  This works today.

If such rerouting happens automatic and decentralized, I agree that 
there is no single point of failure.

But if a website owner needs to explicitly pick a different pagekite 
tunneling provider if the previous one stops working, then I agree with 
Jonathan that pagekite becomes a central point of attack/failure.

So how do rerouting happen?  How is it assured that rerouting mechanisms 
cannot be abused for hijacking?


 - Jonas

-- 
 * Jonas Smedegaard - idealist & Internet-arkitekt
 * Tlf.: +45 40843136  Website: http://dr.jones.dk/

 [x] quote me freely  [ ] ask before reusing  [ ] keep private

Attachment: signature.asc
Description: Digital signature

_______________________________________________
Freedombox-discuss mailing list
Freedombox-discuss@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/freedombox-discuss

Reply via email to