Re: IETF 78: getting to/from/around Maastricht

2010-07-13 Thread Basil Dolmatov
13.07.2010 13:38, Jaap Akkerhuis пишет: That's the same software. If b-rail.be is competent about updating its route database with other companies' trains, then the results will be exactly as good as for bahn.de. In that case, give ns.nl (dutch railways) a try. They seem to list

Re: Advance travel info for IETF-78 Maastricht

2010-04-02 Thread Basil Dolmatov
Andrew G. Malis пишет: I'm with Joe on this. I also travel extensively, including in non-tourist areas, and have never had my US Visa or Mastercard declined because it didn't have a chip. In Amsterdam there are shops (e.g. nice cheese shop ;) ) which accept only local chip cards. At the same

Re: Advance travel info for IETF-78 Maastricht

2010-03-30 Thread Basil Dolmatov
Ole Jacobsen пишет: The PIN codes issued by US banks are for cash advances only, they are NOT the required PIN code that European credit cards use and won't work if you try to use them for a regular credit card payment. US cards do not (in general) require a PIN code for credit card payments.

Re: [rt.ietf.org #24364] mail.ietf.org. is ietf.org., Remove MX Records For Less Spam

2010-02-28 Thread Basil Dolmatov
+1 John C Klensin пишет: +1 Well, OK. Let me rephrase my question: why do you believe that removing the IETF's MX record will a) decrease the amount of spam it receives? b) not damage its legitimate mail flow? Based on my experience and that of other people, neither is true. R's,

Re: DNSCurve vs. DNSSEC - FIGHT! (was OpenDNS today announced it has adopted DNSCurve to secure DNS)

2010-02-25 Thread Basil Dolmatov
Paul Wouters пишет: DNSSEC declares out of scope: * the channel where DS records get added to the parent Is that actually out of scope or just not specified yet? Out of scope. It is the bootstrap problem. Though with RFC-5011 It is much more than bootstrap problem. and perhaps

Re: IAB statement on the RPKI.

2010-02-17 Thread Basil Dolmatov
Masataka Ohta пишет: But, the most serious defect of DNSSEC, or PKI in general, is that, despite a lot of hypes, it is not cryptographically secure. Social attacks on trusted third parties makes the parties untrustworthy, which means PKI is merely socially or weakly secure. There are a lot

Re: IAB statement on the RPKI.

2010-02-17 Thread Basil Dolmatov
Masataka Ohta : Basil Dolmatov wrote: There are a lot of deficiencies in PKI, but at present time I can see no alternative for establishing trust in loosely connected and large systems. If there is one, please advise. The problem of PKI is that its security socially

Re: IAB statement on the RPKI.

2010-02-17 Thread Basil Dolmatov
Martin Rex wrote: DNSsec, as far as I can see, does not use a PKI in the traditional sense. There are _NO_ persons involved in the process, I can see some... ;) Any operation which is placed out-of-band of DNSSec requires some trusted manual intervention. Just for example: First

Re: draft-ietf-dnsext-dnssec-gost

2010-02-16 Thread Basil Dolmatov
Martin Rex пишет: What I don't understand is whether the deprecation applies to GOST R34.10-1994 in general, Yes. or only to GOST R34.10-1994 as a signature algorithm. No. I am somewhat illiterate to crypto math, so I'm wondering whether it is technicall possible to use a GOST

Re: draft-ietf-dnsext-dnssec-gost

2010-02-13 Thread Basil Dolmatov
Martin Rex : Basil Dolmatov wrote: Martin Rex : Whether and how much the -1994 version is deprecated is also a complete mystery. It is written in the text of GOST -2001 Which document are you refering to when you say "text of GOST

Re: draft-ietf-dnsext-dnssec-gost

2010-02-13 Thread Basil Dolmatov
Martin Rex пишет: I'm still quite confused. All references to GOST signature algorithms of the kind [GOST3410] ought to be fixed to say [GOST3410-2001]. I think that can de done, despite the fact that there is no other algorithm coded as GOST 3410, except GOST 34.10-2001. It seems it

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Basil Dolmatov
Martin Rex пишет: Admittedly, I know very little about the cryptographic details, but there are two GOST signature algorithms (GOST R34.10-1994 and GOST R34.10-2001). The earlier appears to bear some similarity with DH, the newer appears to bear similarity with ECDH. Whether and how much

Re: draft-ietf-dnsext-dnssec-gost

2010-02-12 Thread Basil Dolmatov
Paul Hoffman пишет: For example, there is already a published attack on the GOST hash function that does not exist in SHA-256 and SHA-512. That attack lessens the complexity of building of the collision from 2**128 operations to 2**109 operations (infinitesimal part of overall