Blunder Dome Sighting  
privacy 
 
 
 

Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.



Click for Blog Feed
Blog Feed

Recent Items
 
Reputation and Community Trust of Download Files
 
The PITAS from PITAC And the Emperor's Security Cl...
 
Collaborative Development Spurs Open-Source Arrang...
 
Identifying Key Elements of Safety-Critical Softwa...
 
CVSS: Common Vulnerability Scoring System
 
Open-Source License Simplification (and Trust?)
 
Identity, Authentication, and Attestation Together...
 
Collaborative Systems: Social Protocols
 
Secure Computer Infrastructure as a Journey
 
Component-Based Software Engineering Projects

This page is powered by Blogger. Isn't yours?
  

Locations of visitors to this site
visits to Orcmid's Lair pages

The nfoCentrale Blog Conclave
 
Millennia Antica: The Kiln Sitter's Diary
 
nfoWorks: Pursuing Harmony
 
Numbering Peano
 
Orcmid's Lair
 
Orcmid's Live Hideout
 
Prof. von Clueless in the Blunder Dome
 
Spanner Wingnut's Muddleware Lab (experimental)

nfoCentrale Associated Sites
 
DMA: The Document Management Alliance
 
DMware: Document Management Interoperability Exchange
 
Millennia Antica Pottery
 
The Miser Project
 
nfoCentrale: the Anchor Site
 
nfoWare: Information Processing Technology
 
nfoWorks: Tools for Document Interoperability
 
NuovoDoc: Design for Document System Interoperability
 
ODMA Interoperability Exchange
 
Orcmid's Lair
 
TROST: Open-System Trustworthiness

2005-03-22

 

Certification of Network-Attached Components?

ACM News Service: Protecting the Internet: Certified Attachments and Reverse Firewalls?.  In his 2005-03-16 CircleID article, Karl Auerbach suggests that the Internet be protected at the edges by requiring certification of edge-attached components.  Karl adopts "the converse point of view that the net is being endangered by the masses of ill-protected machines operated by users."  This would prevent many PCs from engaging in zombie activity through the simple device of having routers and broadband gateways filter outgoing as well as incoming traffic.  What I find interesting is that there are easier ways than waiting for household firewall-router technology to be forced into certification and upgrading over time.  The service provider could be doing the same thing at the other end of the broadband pipe and the true border onto the internet.  Protecting the network from subverted edges can be done much more readily there, with detailing in the terms-of-service offered to end nodes.
 
This fits well with David Eisenberg's ideas regarding the stupid network. Keep the intelligence, and presumably, the authentication, verification, etc., at the edges, where the people are.

Of course, we need a similar kind of authentication, and certification of TROST-worthiness, for the software itself, some of which resides in the interior. But this software also needs to get inside the system through the edges.

A interesting thread, indeed.
 

 
Construction Structure (Hard Hat Area) You are navigating Orcmid's Lair.

template created 2004-06-17-20:01 -0700 (pdt) by orcmid
$$Author: Orcmid $
$$Date: 10-04-30 22:33 $
$$Revision: 21 $