Lurk -- Limited Use of Remote Keys | |
|
|
About Lurk | |
Communication protocols like IPsec, SSH or TLS provide means to authenticate the remote peer. Authentication is based the proof of ownership of a private key. Currently most trust models assume the private key is associated and owned by the peer. In addition, the remote peer is both responsible of the hosted content and for the network delivery. Although these assumptions were largely true in the past, today, the deployment of service on the current Internet largely relies on multiple distributed instances of the service. Similarly, the delivery of popular content often splits the roles of providing the content and delivering the content. In such architectures, the application, - like a web browser - expects to authenticate a content provider while authenticating the node delivering the content. In this case, the confusion mostly results from using a secure transport layer to authenticate application layer content. There may be a BoF at IETF95 to discuss this topic. To see the collection of prior postings to the list, visit the Lurk Archives. |
|
Using Lurk | |
To post a message to all the list members, send email to
lurk@ietf.org.
You can subscribe to the list, or change your existing subscription, in the sections below. |
|
Subscribing to Lurk | |
Subscribe to Lurk by filling out the following form. You will be sent email requesting confirmation, to prevent others from gratuitously subscribing you. This is a private list, which means that the list of members is not available to non-members. | |
Lurk Subscribers | |
|
![]() version 2.1.39 |
![]() |
![]() |