Egregoros

Signal feed

Timeline

Post

Remote status

Context

10

@ClickyMcTicker I don’t expect any large vendors to expend any effort on this. If you can’t get MS and Cisco etc onboard then this is already dead man walking. No comment on whether it’s good or desirable, just this has a classic first mover disadvantage. You expend millions across your product line to make it compatible for something nobody wants. Does anybody with money want this enough to get those companies to do it? @cR0w

@phnt TBF that is when I stopped reading. The idea of having my network stack broken because of some as-yet undiscovered vuln in JWT is horrifying. I'm sure there is a really good idea behind that, so maybe that can be broken out into something useful elsewhere, without the OAuth2 / JWT bits. @feld @ClickyMcTicker @cR0w

@dch @feld @ClickyMcTicker @cR0w The idea behind it after reading through some of the draft is that it prevents unauthorized changes to the network.

When I join your network while not being authorized to do so, I should not be able to access anything on the network. Or at least that's how I understood it, since the draft is ambiguous about it and doesn't really explain it. So I guess things like ARP spoofing on a local network should then be impossible, because the responses aren't authorized by a valid JWT token.

Replies

0
No replies yet.