Re: Bruce Schneier's Proposal to dedicate November meeting to saving the Internet from the NSA

Ted Lemon <ted.lemon@nominum.com> Fri, 06 September 2013 19:39 UTC

Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8E39521F8F32 for <ietf@ietfa.amsl.com>; Fri, 6 Sep 2013 12:39:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.589
X-Spam-Level:
X-Spam-Status: No, score=-106.589 tagged_above=-999 required=5 tests=[AWL=0.010, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xc5TxBCX8nJD for <ietf@ietfa.amsl.com>; Fri, 6 Sep 2013 12:39:11 -0700 (PDT)
Received: from exprod7og102.obsmtp.com (exprod7og102.obsmtp.com [64.18.2.157]) by ietfa.amsl.com (Postfix) with ESMTP id 06F7221F83EF for <ietf@ietf.org>; Fri, 6 Sep 2013 12:39:11 -0700 (PDT)
Received: from shell-too.nominum.com ([64.89.228.229]) (using TLSv1) by exprod7ob102.postini.com ([64.18.6.12]) with SMTP ID DSNKUiovXm+0fGhSqpEs7MVPnlQDgyQ3ZAz2@postini.com; Fri, 06 Sep 2013 12:39:11 PDT
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id 9C20D1B817A for <ietf@ietf.org>; Fri, 6 Sep 2013 12:39:10 -0700 (PDT)
Received: from webmail.nominum.com (cas-02.win.nominum.com [64.89.228.132]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTPS id 94EB7190077; Fri, 6 Sep 2013 12:39:10 -0700 (PDT) (envelope-from Ted.Lemon@nominum.com)
Received: from [10.0.10.40] (192.168.1.10) by CAS-02.WIN.NOMINUM.COM (192.168.1.101) with Microsoft SMTP Server (TLS) id 14.2.318.4; Fri, 6 Sep 2013 12:39:10 -0700
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0 (Mac OS X Mail 7.0 \(1805\))
Subject: Re: Bruce Schneier's Proposal to dedicate November meeting to saving the Internet from the NSA
From: Ted Lemon <ted.lemon@nominum.com>
In-Reply-To: <4CB918D6-54A4-4397-B99A-95F7989A91C1@softarmor.com>
Date: Fri, 06 Sep 2013 15:39:08 -0400
Content-Transfer-Encoding: quoted-printable
Message-ID: <E0EEF9E8-A429-4B27-9B31-71D99BF343A5@nominum.com>
References: <5F053C0B-4678-4680-A8BF-62FF282ADDCE@softarmor.com> <alpine.BSF.2.00.1309051743130.47262@hiroshima.bogus.com> <52293197.1060809@gmail.com> <5C7FECAB-8A22-4AF1-B023-456458E1B288@nominum.com> <522949C2.8010206@gmail.com> <5229AEDE.8090202@cisco.com> <5229C580.6060108@gmx.net> <5229D2C2.5030903@250bpm.com> <5229D383.2040309@cisco.com> <4CB918D6-54A4-4397-B99A-95F7989A91C1@softarmor.com>
To: Dean Willis <dean.willis@softarmor.com>
X-Mailer: Apple Mail (2.1805)
X-Originating-IP: [192.168.1.10]
Cc: "ietf@ietf.org Discussion" <ietf@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Sep 2013 19:39:17 -0000

On Sep 6, 2013, at 2:31 PM, Dean Willis <dean.willis@softarmor.com> wrote:
> What if they didn't say they were NSA guys, but just discretely worked a weakness into a protocol? What if they were a trusted senior member of the community?

If we have trusted senior members making false statements that can be shown to be false, then they won't get consensus if we do our consensus process right.   So if this has happened in the past, you should be able to find evidence that it has happened.  If you can't find such evidence, I think it's harmful to assume that it has happened.   The IETF process is in principle extremely robust in the face of this kind of behavior.   I encourage you to go looking, but don't descend into madness.