Re: [Strint-attendees] Do we need a breakthrough in key management first?

Christian Grothoff <christian@grothoff.org> Sun, 23 February 2014 20:38 UTC

Return-Path: <christian@grothoff.org>
X-Original-To: strint-attendees@lists.i1b.org
Received: from smtp1.informatik.tu-muenchen.de (mail-out1.informatik.tu-muenchen.de [131.159.0.8]) by diego.dreamhost.com (Postfix) with ESMTP id 489F448176 for <strint-attendees@lists.i1b.org>; Sun, 23 Feb 2014 12:38:51 -0800 (PST)
Received: from [192.168.178.20] (pd95c0f92.dip0.t-ipconnect.de [217.92.15.146]) by mail.net.in.tum.de (Postfix) with ESMTPSA id 5342B188DB62 for <strint-attendees@lists.i1b.org>; Sun, 23 Feb 2014 21:38:49 +0100 (CET)
Message-ID: <530A5C56.1070707@grothoff.org>
Date: Sun, 23 Feb 2014 21:38:46 +0100
From: Christian Grothoff <christian@grothoff.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20131103 Icedove/17.0.10
MIME-Version: 1.0
To: strint-attendees@lists.i1b.org
References: <CAJYQ-fS6Lh1B_1eOY9q5RGY4KETb9P_=1Jre81Czm_F3iW15-A@mail.gmail.com>
In-Reply-To: <CAJYQ-fS6Lh1B_1eOY9q5RGY4KETb9P_=1Jre81Czm_F3iW15-A@mail.gmail.com>
X-Enigmail-Version: 1.5.1
Content-Type: multipart/mixed; boundary="------------020300030401080203040706"
X-Mailman-Approved-At: Sun, 23 Feb 2014 12:41:01 -0800
Subject: Re: [Strint-attendees] Do we need a breakthrough in key management first?
X-BeenThere: strint-attendees@lists.i1b.org
X-Mailman-Version: 2.1.14
Precedence: list
List-Id: STRINT Workshop Discussion List <strint-attendees-i1b.org>
List-Unsubscribe: <http://lists.i1b.org/options.cgi/strint-attendees-i1b.org>, <mailto:strint-attendees-request@lists.i1b.org?subject=unsubscribe>
List-Archive: <http://lists.i1b.org/pipermail/strint-attendees-i1b.org>
List-Post: <mailto:strint-attendees@lists.i1b.org>
List-Help: <mailto:strint-attendees-request@lists.i1b.org?subject=help>
List-Subscribe: <http://lists.i1b.org/listinfo.cgi/strint-attendees-i1b.org>, <mailto:strint-attendees-request@lists.i1b.org?subject=subscribe>
X-List-Received-Date: Sun, 23 Feb 2014 20:38:51 -0000

On 02/23/2014 08:11 PM, Johan Pouwelse wrote:
> On 17 February 2014 11:31, Carlo v. Loesch
> <lynX@we.were.webeteer.pages.de> wrote:
>> And there are some papers, that propose fundamental
>> rethinking of the way we run the Internet. Some are
>> just rough ideas (26, 38) while others appear to have
> [snip]
>> 65: The Internet is Broken: Building a GNU Network
>>
>> Alas, I am biased. This is the paper I contributed to.
>> For several years we have been working on design and
>> implementation of an alternative Internet. Although it
>> currently runs as an overlay network, it has developed
>> protocols to replace DNS, X.509, BGP and various other
>> insecure technologies. DHT-based cryptographic routing
>> has matured in over a decade and grown well out of its
>> infancy (just watch Tor). Why stick to horse carriages
>> if there is a car waiting outside?
> 
> Key management seems to me the key problem that needs
> a breakthrough and re-thinking.

Well, my claim is that with the GNU Name System, we have
that breakthrough.