[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Design] Re: Wes Hardaker: opportunistic encryption deployment problems
At 06:21 PM 8/16/2001 -0400, Henry Spencer wrote:
>On Thu, 16 Aug 2001, Stephen Kent wrote:
>> ...unauthorized access to computing resources on organizational LANs.
>> Encryption of lots of Internet traffic, without accompanying
>> authentication and access control, does not address the latter concern.
>
>And antiaircraft missiles aren't very effective against submarines, either!
>Different solutions to different problems.
>
>IPsec would not have encryption at all if passive wiretapping was not a
>serious concern.
>
You are both right. You need the encryption to properly enforce
the authentication and access control. In a trusted networked system
they are both required.
- Alex
--
Alex Alten
Alten@Home.Com
Follow-Ups:
References: