Re: Call for Papers: IAB Workshop on Stack Evolution in a Middlebox Internet (SEMI)

Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp> Wed, 03 December 2014 14:02 UTC

Return-Path: <mohta@necom830.hpcl.titech.ac.jp>
X-Original-To: ietf@ietfa.amsl.com
Delivered-To: ietf@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C17DC1A1A66 for <ietf@ietfa.amsl.com>; Wed, 3 Dec 2014 06:02:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.599
X-Spam-Level:
X-Spam-Status: No, score=0.599 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_JP=1.244, HOST_EQ_JP=1.265, T_RP_MATCHES_RCVD=-0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hgJJ5PcQ5xL8 for <ietf@ietfa.amsl.com>; Wed, 3 Dec 2014 06:02:18 -0800 (PST)
Received: from necom830.hpcl.titech.ac.jp (necom830.hpcl.titech.ac.jp [131.112.32.132]) by ietfa.amsl.com (Postfix) with SMTP id C72E21A1AD9 for <ietf@ietf.org>; Wed, 3 Dec 2014 06:02:17 -0800 (PST)
Received: (qmail 69428 invoked from network); 3 Dec 2014 13:49:33 -0000
Received: from necom830.hpcl.titech.ac.jp (HELO ?127.0.0.1?) (131.112.32.132) by necom830.hpcl.titech.ac.jp with SMTP; 3 Dec 2014 13:49:33 -0000
Message-ID: <547F17E6.7090908@necom830.hpcl.titech.ac.jp>
Date: Wed, 03 Dec 2014 23:02:14 +0900
From: Masataka Ohta <mohta@necom830.hpcl.titech.ac.jp>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.2.0
MIME-Version: 1.0
To: Phillip Hallam-Baker <phill@hallambaker.com>
Subject: Re: Call for Papers: IAB Workshop on Stack Evolution in a Middlebox Internet (SEMI)
References: <9D725DD0-7136-4D02-99E0-48E03C173C9E@iab.org> <BB616542-70E8-47F9-99E8-305AA63B45C9@iab.org> <5475A0A5.50105@necom830.hpcl.titech.ac.jp> <CAMm+Lwjf9jfYhE7rCaLdP32fq5=7GjiVpGpJpw1gTHK7HnivXQ@mail.gmail.com>
In-Reply-To: <CAMm+Lwjf9jfYhE7rCaLdP32fq5=7GjiVpGpJpw1gTHK7HnivXQ@mail.gmail.com>
Content-Type: text/plain; charset="iso-2022-jp"
Content-Transfer-Encoding: 7bit
Archived-At: http://mailarchive.ietf.org/arch/msg/ietf/KYYjiCT5Xuo13oaEHlVwzgLN-hM
Cc: IAB <iab@iab.org>, IETF <ietf@ietf.org>, IETF Announce <ietf-announce@ietf.org>
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf/>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Dec 2014 14:02:27 -0000

Phillip Hallam-Baker wrote:

> The only end points that can be fixed end to end on a network are
> cryptographic keys and data bound to cryptographic keys.

I think you understand that introduction of cryptographic keys for
communications between servers and clients through middleboxes
requires upgrading of all of them (servers, clients and middleboxes).

Or, are you assuming some more magical approach?

						Masataka Ohta