It’s a LOT more rigorous than the “algorithms” suggested. If you’re running protocols where these IDs are exposed and that creates a vulnerability, simply using these “algorithms” provides a false sense of safety. Joe |
-- last-call mailing list last-call@xxxxxxxx https://www.ietf.org/mailman/listinfo/last-call