On 11 Oct 2011, at 18:13, Stephen Farrell wrote: > When various devices in the home figure out which does what, > and do that periodically to handle changes, there's clearly > the potential that a zombied host tries to try take over > stuff with undesirable consequences. > > My question is whether this group are planning to think > about that now, or later, or never? (Or don't even think > there's a problem worth attempting to address.) > > Note - I'm not trying to argue for any particular level of > security and certainly not for some unachievable fort knox > everywhere, I'm just asking what's the plan?
We're certainly expecting to think about it. However mandating any particular mechanism for how a device can identify itself as part of the "trusted" home would likely be out of scope. Ray _______________________________________________ homenet mailing list homenet@ietf.org https://www.ietf.org/mailman/listinfo/homenet