[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Multicast Key Management (was Re: Anycast)
Daniel Harkins <dharkins@cisco.com> writes:
> The example I chose was poor but note that that application already
> accepts a certain amount of key piracy-- acceptable loss, it's calculated
> into their anticipated profits.
If all you want is a fake protocol to deter piracy, well, you don't
need a real IETF multicast key distribution protocol to do that.
I was under the impression, though, that we all wanted multicast for
issues like wide scale internet infrastructure protocols, and that we
needed it secure, not "secure".
> > Anyone remember the amusing discussion at the D.C. IETF where someone
> > proposed a multicast key management system to deal with television
> > broadcasts, and folks kept coming up to say "sorry, but how will you
> > keep anything known by a million people a secret? how does your
> > "authentication" authenticate anything worth mentioning?"
> By putting authentication in quotes are you implying that the key
> is not distributed in a mutually authenticated manner? Would you mind
> pointing out where in the protocol this is happening?
I believe an example stated was "The President gets on television and
everyone wants to know that it is really the President."
If anyone knows a way to do that with a symmetric key shared among
twenty million end stations, please tell me now.
Perry
Follow-Ups:
References: