http://groups.google.com/group/peertech/browse_thread/thread/accc3adeaa53328a
"""
throwing down the gauntlet:
---
using various authentication and key management methods at the TCP
session level associated with a specific IP/port endpoint pair for
access to network services[1][2][3][4][5]* is a relic from decades
past and is not only inefficient and inflexible but actively
detrimental to good usable security due to the baggage and complexity
inherent in these methods.[6][7][8]

access to network services should be provided on top of a network
endpoint local to the two domains requesting and providing services
respectively, with user centric authentication for initialization of
the secure IPv4/IPv6 tunnel session to which services are bound and
revocation performed by terminating this session and the ability to
reestablish it.

revocable delegation is implemented by proxy of traffic between peers
to the delegated domain and irrevocable delegation implemented by
sharing authentication credentials for the desired endpoint service(s)
with the trusted peer for direct communication without proxy.
...
in a sense this is simply a way to exchange "the capability to
communicate with me privately" and then utilize the services made
available to your peers when this capability is exercised.
"""
_______________________________________________
p2p-hackers mailing list
p2p-hackers@zgp.org
http://zgp.org/mailman/listinfo/p2p-hackers
_______________________________________________
Here is a web page listing P2P Conferences:
http://www.neurogrid.net/twiki/bin/view/Main/PeerToPeerConferences

Reply via email to