Kyle Rose <kr...@krose.org> writes:

> Let's finish that last sentence:
> 
> I have to think a lot more about the IoT/resource-constrained client
> problem, but I still don't think the existence of clients that would be
> denied service by this scheme renders the concept completely inapplicable.

Perhaps for the resource-constrained/IoT situation, what you want is
to mostly be using a pre-shared key, track clients, and only make the
suspicious (too many connections too fast) or new ones solve the
puzzle.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to