Re: [Last-Call] Last Call: <draft-gont-numeric-ids-sec-considerations-06.txt> (Security Considerations for Transient Numeric Identifiers Employed in Network Protocols) to Best Current Practice

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 17/12/20 20:39, Ted Lemon wrote:
On Dec 17, 2020, at 6:35 PM, Joseph Touch <touch@xxxxxxxxxxxxxx <mailto:touch@xxxxxxxxxxxxxx>> wrote:
What I want to avoid is breaking the potential for IoT devices to use these protocols simply because they can’t implement the approaches described here.

Hardware RNGs are pretty common in embedded devices nowadays. I don’t think this is actually a practical problem, although I am curious to know if you know of new hardware for which it would be a problem. I will admit that ancient hardware might have trouble, but it probably won’t be updated, given the state of the art at present, so I don’t think such a device poses a serious problem.

Yeah, I would also be quite surprised for endpoints to be able to do encryption/authentication, but not be able to compute PRNG or a simple hash function. (since QUIC was raised as a document for which, somehow, our documents turns out to be problematic)


--
Fernando Gont
SI6 Networks
e-mail: fgont@xxxxxxxxxxxxxxx
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492




--
last-call mailing list
last-call@xxxxxxxx
https://www.ietf.org/mailman/listinfo/last-call




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux