Kyle Rose <kr...@krose.org> writes: > Let's finish that last sentence: > > I have to think a lot more about the IoT/resource-constrained client > problem, but I still don't think the existence of clients that would be > denied service by this scheme renders the concept completely inapplicable.
Perhaps for the resource-constrained/IoT situation, what you want is to mostly be using a pre-shared key, track clients, and only make the suspicious (too many connections too fast) or new ones solve the puzzle. _______________________________________________ TLS mailing list TLS@ietf.org https://www.ietf.org/mailman/listinfo/tls