This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/iot-wg@ripe.net/
[iot-wg] "The Internet of Threats: Fighting FUD with MUD"
- Previous message (by thread): [iot-wg] DoH - TEOTIAWKI?
- Next message (by thread): [iot-wg] "The Internet of Threats: Fighting FUD with MUD"
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Michael Richardson
mcr at sandelman.ca
Fri Oct 19 21:09:57 CEST 2018
Marco Davids <Marco.Davids at sidn.nl> wrote: >> The purpose of this work is keep the vacuum cleaner, when >> compromised, from being used to attack the infrastructure of the Internet. > That is why I believe in some additional 'MUD-features', such as > restricting bandwidth (not every fridge needs 100Mbit/s), or restricting > access to the internet only on certain hours of the day. I agree that these would be a beneficial extensions. > It seems that another idea of ours, restricting access based on > DNS-queries, seems to already been incorporate in the current version of > the draft. Cool ;-) It's damn annoying to implement, and violates lot of layering. But, in an HTTPS-everywhere world, particularly one where google.com gives different answers at different times, it's necessary. The google.com entrance gateways do all sorts of things: we enabled access to google analytics for our demo, and then realized that it provided access to google.com as well. This is something I'd like to engage google about. (Not an issue in IPv6) > Maybe there are other ideas as well? -- ] Never tell me the odds! | ipv6 mesh networks [ ] Michael Richardson, Sandelman Software Works | network architect [ ] mcr at sandelman.ca http://www.sandelman.ca/ | ruby on rails [ -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 487 bytes Desc: not available URL: </ripe/mail/archives/iot-wg/attachments/20181019/f3c53bf9/attachment.sig>
- Previous message (by thread): [iot-wg] DoH - TEOTIAWKI?
- Next message (by thread): [iot-wg] "The Internet of Threats: Fighting FUD with MUD"
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
[ iot-wg Archives ]