Re: Review of: Opportunistic Security -03 preview for comment

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, 15 Aug 2014, Dave Crocker wrote:

If authentication is required, we have classic authenticated encryption,
not opportunistic <foo>.

Again no, you're still reading what you would have said, rather
than what the draft actually says.

Viktor, that is your second statement commenting on my behavior.

Please stop commenting on what I am doing.  And especially do not
comment on my reading skills or performance.

I don't believe Viktor is making such a statement on your behaviour.

The draft's definition of opportunism is "encrypt where possible, even
without authentication, but mandate authenticated encryption when
advertised". While you seem to be saying opportunism is "In absence of
mandated authenticated encryption, try to use unauthenticated
encryption".

What Viktor is saying is that the parapraph in question makes sense
using his interpretation of the definition, and does not make sense
with your interpretation of the definition.

Clearly we have work to do to ensure there is only one interpreation of
the definition.

Paul





[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]