On 17/12/20 20:39, Ted Lemon wrote:
On Dec 17, 2020, at 6:35 PM, Joseph Touch <touch@xxxxxxxxxxxxxx
<mailto:touch@xxxxxxxxxxxxxx>> wrote:
What I want to avoid is breaking the potential for IoT devices to use
these protocols simply because they can’t implement the approaches
described here.
Hardware RNGs are pretty common in embedded devices nowadays. I don’t
think this is actually a practical problem, although I am curious to
know if you know of new hardware for which it would be a problem. I will
admit that ancient hardware might have trouble, but it probably won’t be
updated, given the state of the art at present, so I don’t think such a
device poses a serious problem.
Yeah, I would also be quite surprised for endpoints to be able to do
encryption/authentication, but not be able to compute PRNG or a simple
hash function. (since QUIC was raised as a document for which, somehow,
our documents turns out to be problematic)
--
Fernando Gont
SI6 Networks
e-mail: fgont@xxxxxxxxxxxxxxx
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
--
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call