Re: Machine Identity
Stephane Bortzmeyer <bortzmeyer@nic.fr> Thu, 28 February 2008 16:34 UTC
Return-Path: <discuss-bounces@ietf.org>
X-Original-To: ietfarch-discuss-archive@core3.amsl.com
Delivered-To: ietfarch-discuss-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 66B6C3A6E77; Thu, 28 Feb 2008 08:34:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.191
X-Spam-Level:
X-Spam-Status: No, score=-4.191 tagged_above=-999 required=5 tests=[AWL=2.058, BAYES_00=-2.599, HELO_EQ_FR=0.35, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qhs3JjRowH9N; Thu, 28 Feb 2008 08:34:32 -0800 (PST)
Received: from core3.amsl.com (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 37A043A6C6A; Thu, 28 Feb 2008 08:34:32 -0800 (PST)
X-Original-To: discuss@core3.amsl.com
Delivered-To: discuss@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 745553A6BF5 for <discuss@core3.amsl.com>; Thu, 28 Feb 2008 08:34:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JVP8BkBsY93P for <discuss@core3.amsl.com>; Thu, 28 Feb 2008 08:34:30 -0800 (PST)
Received: from mx2.nic.fr (mx2.nic.fr [192.134.4.11]) by core3.amsl.com (Postfix) with ESMTP id A2B813A6997 for <discuss@apps.ietf.org>; Thu, 28 Feb 2008 08:34:30 -0800 (PST)
Received: from mx2.nic.fr (localhost [127.0.0.1]) by mx2.nic.fr (Postfix) with SMTP id 7A5621C013A; Thu, 28 Feb 2008 17:34:23 +0100 (CET)
Received: from relay2.nic.fr (relay2.nic.fr [192.134.4.163]) by mx2.nic.fr (Postfix) with ESMTP id 751AD1C0132; Thu, 28 Feb 2008 17:34:23 +0100 (CET)
Received: from bortzmeyer.nic.fr (batilda.nic.fr [192.134.4.69]) by relay2.nic.fr (Postfix) with ESMTP id 71D9158E9F2; Thu, 28 Feb 2008 17:34:23 +0100 (CET)
Date: Thu, 28 Feb 2008 17:34:23 +0100
From: Stephane Bortzmeyer <bortzmeyer@nic.fr>
To: dcrocker@bbiw.net
Subject: Re: Machine Identity
Message-ID: <20080228163423.GC21463@nic.fr>
References: <20080226130527.GA1404@generic-nic.net> <200802261547.KAA20917@Sparkle.Rodents.Montreal.QC.CA> <20080226160412.GA22833@nic.fr> <47C46FBA.2090009@dcrocker.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <47C46FBA.2090009@dcrocker.net>
X-Operating-System: Debian GNU/Linux 4.0
X-Kernel: Linux 2.6.18-6-686 i686
Organization: NIC France
X-URL: http://www.nic.fr/
User-Agent: Mutt/1.5.13 (2006-08-11)
Cc: discuss@apps.ietf.org
X-BeenThere: discuss@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: general discussion of application-layer protocols <discuss.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/discuss>, <mailto:discuss-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:discuss@ietf.org>
List-Help: <mailto:discuss-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/discuss>, <mailto:discuss-request@ietf.org?subject=subscribe>
Sender: discuss-bounces@ietf.org
Errors-To: discuss-bounces@ietf.org
On Tue, Feb 26, 2008 at 11:59:54AM -0800, Dave Crocker <dhc@dcrocker.net> wrote a message of 37 lines which said: > Rather than asking about your requirements, I'll ask about the uses > you have in mind. My original thinking was about a P2P system. Entities (I could have used the term "machines" but it seems to mislead people in physical machines only) request things (for instance, files) from other entities and give things to others. In doing so, they build a reputation ("leecher" or "nice guy"). This reputation is tied to their identity. Hence the desire to have an identity which is not too transient (IP addresses are not stable over time and a machine can legitimately have several, for instance one v4 and one v6). Of course, an entity must not be able to take the identity of another one, for instance to steal its reputation. Hence the need for authentication. On the other hand, being able to generate a lot of identities is not a problem: an entity which would do so would start at a reputation of zero, which is not its interest.
- Re: Machine Identity Dave Crocker
- Machine Identity Stephane Bortzmeyer
- Re: Machine Identity Jeroen Massar
- Re: Machine Identity Stephane Bortzmeyer
- Re: Machine Identity der Mouse
- Re: Machine Identity Stephane Bortzmeyer
- Re: Machine Identity Keith Moore
- Re: Machine Identity der Mouse
- Re: Machine Identity Dave Crocker
- Re: Machine Identity Keith Moore
- Re: Machine Identity Keith Moore
- Re: Machine Identity Dave Crocker
- Re: Machine Identity Dave Crocker
- Re: Machine Identity Keith Moore
- Re: Machine Identity Miika Komu
- Re: Machine Identity Stephane Bortzmeyer
- Re: Machine Identity Juergen Schoenwaelder
- Re: Machine Identity Miika Komu
- Re: Machine Identity Juergen Schoenwaelder
- Re: Machine Identity Balazs Lengyel
- Re: Machine Identity Miika Komu
- Service Identity (Re: Machine Identity) Jeroen Massar
- RE: Service Identity (Re: Machine Identity) David Harrington
- Re: Service Identity (Re: Machine Identity) Jeroen Massar
- Re: Machine Identity Stephane Bortzmeyer
- Re: Machine Identity Dave Crocker
- Re: Service Identity (Re: Machine Identity) Juergen Schoenwaelder
- Re: Machine Identity Stephane Bortzmeyer
- Re: Machine Identity Stephane Bortzmeyer
- Re: Machine Identity Jeroen Massar
- Re: Service Identity (Re: Machine Identity) Jeroen Massar
- Re: Machine Identity Stephane Bortzmeyer
- Re: Machine Identity Jeroen Massar
- Re: Machine Identity Miika Komu
- Re: Machine Identity Dave Crocker
- Re: Machine Identity Dave Crocker
- Re: Machine Identity Frank Ellermann
- Re: Machine Identity Jeroen Massar
- Re: Machine Identity der Mouse
- Re: Service Identity (Re: Machine Identity) Dave Crocker