Hiya,
On 10/4/24 19:30, Paul Wouters wrote:
Which makes me wonder if it makes sense to advise long TTLs on these
records so that they move along on your phone/laptop even if you enter
these kind of networks.
There's a tension between that and getting better forward-secrecy
by rotating ECH key
Hiya,
I had a quick scan and have a couple of initial questions:
I'm working on [1] so wonder if/how those may be related, any
idea? If not, should they be?
I'm also not clear on the status of this - is this a case of
wanting to get something long-used under IETF change control
or something el
Hiya,
On 9/30/24 19:47, Ben Schwartz wrote:
I support adoption. This is fine scaffolding on which to get
started.
I do think we're going to need some careful writing about which
greases can be applied in queries and responses, by stubs,
resolvers, auth servers, etc. We may also want to reser
Reviewer: Stephen Farrell
Review result: Has Issues
I see two issues here worth checking:
1. I don't recall SipHash being used as a MAC in
any IETF standard before. We normally use HMAC,
even if truncated. Why make this change and was
that checked with e.g. CFRG? (And the URL given
i
101 - 104 of 104 matches
Mail list logo