[AG-TECH] Lurkers in the venues

Bob Olson olson at mcs.anl.gov
Mon Jan 28 20:54:17 CST 2002


Right.

Another thing that stream encryption or SSM would solve.

Anyone done any real-life work with SSM? Any idea when it'll be feasible
to experiment with in something other than a special testbed?

--bob

On Mon, 28 Jan 2002, Jeffrey Eschbach wrote:

> Bob,
> 
> It's probably not worth worrying about for most of the conversations
> taking place, but I just want to make certain that everyone is clear on
> this... even if there are no apparent "lurkers" in a Virtual Venue,
> there is no guarantee that someone else is not listening.  Although it
> may not be likely, someone could join the multicast groups associated
> with a VV and eavesdrop, right?  Just because the Vic and RAT interfaces
> don't show someone else in the "room" doesn't mean it is secure.
> 
> Jeff
> 
> 
> Robert Olson wrote:
> > 
> > We can turn on security on more (all?) of the rooms, and come up with
> > a way for the scheduling folks to set up the APIs.
> > 
> > And hey, if doing this would get you to write an AGDP on it all the
> > better :-).
> > 
> > Are you submitting an AGDP document on beer selection?
> > 
> > --bob
> > 
> > At 12:59 PM 1/28/2002 -0700, Don Morton wrote:
> > 
> > > Well, as I think about it, this idea of passing keys around before
> > > a secure meeting seems a WHOLE lot simpler than trying to come
> > > up with some patchwork integrative approach :)
> > >
> > > I see on the Reservations page that secure rooms are available by
> > > special request, and there's some mention of needing to provide
> > > venues logins, which makes sense.  I wonder if it might be more
> > > efficient to streamline the reservation of the existing secure
> > > rooms, with some documentation.  Right now, I'm not clear on exactly
> > > how we'd make reservations and then, how we'd access the secure
> > > room (though I suspect it's intuitive).  And, hell, I'd be willing
> > > to do
> > > an AGDP document on it :)
> > >
> > > Thanks,
> > >
> > > DOn
> > >
> > > Rick Stevens wrote:
> > > >
> > > > Don,
> > > >
> > > > We have been thinking about how to implement a generallized access
> > > > control mecahnism.  Maybe Bob can talk about current thinking in
> > > > that direction.. in the mean time the secure room avoids this by
> > > using
> > > > the key distribution as an ad hoc access control.  We can build as
> > > many
> > > > secure rooms as we need until we have the automatic access control
> > > in
> > > > place.
> > > >
> > > > --Rick
> > > >
> > > > On Mon, 28 Jan 2002, Don Morton wrote:
> > > >
> > > > > All,
> > > > >
> > > > > As some of you have probably noticed, it's getting harder and
> > > harder
> > > > > to have a semi-confidential meeting in one of the venues (e.g.
> > > proposal
> > > > > related stuff) without having one or two sites sitting in there
> > > with
> > > > > 4 videos, audio turned on, sometimes even testing audio in the
> > > middle
> > > > > of a meeting.  Although appeals to the community at large
> > > probably help
> > > > > to reduce this, it ain't working, and my uneducated guess
> > > suggests it
> > > > > will get worse - it seems like more and more, folks are jumping
> > > in
> > > > > who seem unaware of things like this mailing list, the general
> > > > > AG community, etc.
> > > > >
> > > > > So, is there any sort of thought/interest in some mechanism that
> > > allows
> > > > > someone who's actually reserved a venue to control access to
> > > that venue
> > > > > during the time reserved?  For example, consider the following:
> > > > >
> > > > > - Joe/Jane Sixpack makes a venues reservation on behalf of
> > > whatever group
> > > > >   wants to come together and meet
> > > > >
> > > > > - Joe/Jane Sixpack (you can tell we're still thinking about this
> > > Beer
> > > > >   Symposium :) :)) is automagically emailed some random access
> > > code that's
> > > > >   good during the event
> > > > >
> > > > > - This access code allows Joe/Jane Sixpack access to some GUI
> > > that essentially
> > > > >   allows for blocking out the "riff raff" :) :) :)
> > > > >
> > > > > Obviously, it's "do-able" but I don't understand the venues
> > > system well enough
> > > > > to
> > > > > understand the feasibility of integration into existing
> > > components - probably a
> > > > > real bear.....
> > > > >
> > > > > Thanks!!
> > > > >
> > > > > Don
> > > > > --
> > > > > Don Morton                   http://MRoCCS.cs.umt.edu/~morton/
> > > > > Department of Computer Science       The University of Montana
> > > > > Missoula, MT 59812 | Voice (406) 243-4975 | Fax (406) 243-5139
> > > > >
> > > > >
> > >
> > >
> > > --
> > > Don Morton                   http://MRoCCS.cs.umt.edu/~morton/
> > > Department of Computer Science       The University of Montana
> > > Missoula, MT 59812 | Voice (406) 243-4975 | Fax (406) 243-5139
> 
> -- 
> ----------------------------------------------------------------
> Jeff Eschbach                              eschbach at motorola.com
> Networks and Infrastructure Research
> Senior Staff Engineer, Motorola Labs Internet2 Initiative
> http://internet2.motlabs.com              Fax:    (847) 576-3240
> Desk: (847) 538-5846                      Mobile: (847) 980-2240
> 
> 




More information about the ag-tech mailing list