On Sun, Oct 13, 2024 at 4:11 PM Martin Thomson <mt@xxxxxxxxxxxxxx> wrote:
On Mon, Oct 14, 2024, at 09:53, Rob Sayre wrote:
> We do internet protocols here in the IETF, so I think those attacks are
> salient to the IETF mission. FNV seems like a good choice for internal
> data structures (not IETF territory). But no objection to documenting
> it on the Independent stream.
The salient point here is that this is not work that has IETF consensus.
Agree that this part is important.
That this is not suitable for certain applications is secondary.
I think this also important point is that you have some "Security Considerations" not mentioned in the document if you expose an FNV hash over the internet. I'd rather go for substance than process, but both apply here.
thanks,
Rob
-- last-call mailing list -- last-call@xxxxxxxx To unsubscribe send an email to last-call-leave@xxxxxxxx