[e2e] j'accuse NFV

Khaled Elsayed kelsayed at gmail.com
Tue May 5 01:55:32 PDT 2015


But if endpoints have such choice to bypass or turn off, would there be any
endpoint out there that would choose not to?



On Mon, May 4, 2015 at 5:14 PM, David P. Reed <dpreed at reed.com> wrote:

> This argument presumes that firewalls work.... of course they can know
> neither the meaning of the packet to the sender nor the meaning to the
> receiver. So just as an air filter cannot protect your ears from shocking
> utterances,  the idea that a packet firewall ought to be entrusted to
> protect communicators from mischief is silly...
>
> Of course the endpoints need to be able to shut down or to bypass such
> "helpful" things as firewalls. They are at best kludges.
>
> On May 4, 2015, Khaled Elsayed <kelsayed at gmail.com> wrote:
>
>> You mean like a hacking packet would say please don't process me via that
>> nifty NFV firewall or something :-)
>>
>> Khaled
>>
>>
>> On Mon, May 4, 2015 at 2:27 PM, Djamel Sadok <jamel at cin.ufpe.br> wrote:
>>
>> Hi,
>>>
>>> May be we could also give the end user flow the possibility to say that
>>> it
>>> does not want to have its data packets processed by any NFV or even black
>>> list some NFVs (types of functions) on the path. Would this be possible
>>> to
>>> achieve? would it render NFV ineffective? can both NFV and Not NFV
>>> (bypass
>>> it) on given flows live together?
>>>
>>> Djamel
>>>
>>>
>>> On Thu, Apr 30, 2015 at 10:14 PM, Matt Mathis <mattmathis at google.com>
>>> wrote:
>>>
>>> On Wed, Apr 29, 2015 at 3:26 PM, <l.wood at surrey.ac.uk> wrote:
>>>>
>>>> Ah, j'accuse TLA.
>>>>
>>>>
>>>>
>>>> SDN is not is the same bucket, let me assure you.
>>>>
>>>> As for TCP, good algorithms are portable between protocols, bad
>>>>
>>> algorithms
>>>
>>>> are dangerous at any scale. Once you fully deconstruct the protocol, I
>>>> don't care so much about the packet format.
>>>>
>>>> Thanks,
>>>> --MM--
>>>> The best way to predict the future is to create it. - Alan Kay
>>>>
>>>> Privacy matters! We know from recent events that people are using our
>>>> services to speak in defiance of unjust governments. We treat privacy
>>>>
>>> and
>>>
>>>> security as matters of life and death, because for some users, they are.
>>>> ------------------------------
>>>>
>>>> end2end-interest mailing list
>>>> end2end-interest at postel.org
>>>> http://mailman.postel.org/mailman/listinfo/end2end-interest
>>>> Contact list-owner at postel.org for assistance.
>>>
>>>
>>> ------------------------------
>>>
>>> end2end-interest mailing list
>>> end2end-interest at postel.org
>>> http://mailman.postel.org/mailman/listinfo/end2end-interest
>>> Contact list-owner at postel.org for assistance.
>>
>>
>> ------------------------------
>>
>> end2end-interest mailing list
>> end2end-interest at postel.org
>> http://mailman.postel.org/mailman/listinfo/end2end-interest
>> Contact list-owner at postel.org for assistance.
>>
>
> -- Sent with *K-@ Mail
> <https://play.google.com/store/apps/details?id=com.onegravity.k10.pro2>*
> - the evolution of emailing.
>


More information about the end2end-interest mailing list