[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Multicast Key Management (was Re: Anycast)




Daniel Harkins <dharkins@cisco.com> writes:
>   The example I chose was poor but note that that application already
> accepts a certain amount of key piracy-- acceptable loss, it's calculated
> into their anticipated profits.

If all you want is a fake protocol to deter piracy, well, you don't
need a real IETF multicast key distribution protocol to do that.

I was under the impression, though, that we all wanted multicast for
issues like wide scale internet infrastructure protocols, and that we
needed it secure, not "secure".

> > Anyone remember the amusing discussion at the D.C. IETF where someone
> > proposed a multicast key management system to deal with television
> > broadcasts, and folks kept coming up to say "sorry, but how will you
> > keep anything known by a million people a secret? how does your
> > "authentication" authenticate anything worth mentioning?"

>   By putting authentication in quotes are you implying that the key
> is not distributed in a mutually authenticated manner? Would you mind
> pointing out where in the protocol this is happening?

I believe an example stated was "The President gets on television and
everyone wants to know that it is really the President."

If anyone knows a way to do that with a symmetric key shared among
twenty million end stations, please tell me now.

Perry


Follow-Ups: References: