On Thu, 19 Mar 2015, W.C.A. Wijngaards wrote:

Could perhaps a different algorithm, like ED25519, provide better
performance, and would that performance then be adequate?

Different algorithms differ in performance how much? A factor 2? Maybe
10? Compared to a botnet, I don't think that it is very relevant at all.

The draft allows negotiation of a symmetric key so normally a lot of
asymmetric operations can be avoided by the use of a cache.

For a cookie mechanism, there is the cookie draft from Eastlake and
Andrews.

Demanding source ip verification before allowing crypto seems a very
good idea with no real impact other than rejecting spoofed IPs or
old clients - and old clients won't support crypto anyway.

Paul

_______________________________________________
dns-privacy mailing list
dns-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to