On 3/11/2014 3:12 PM, Joe Touch wrote:
Hi, Steve,
....
I have
suggested "opportunistic keying" as a preferred term, since its the
key management, not the encryption per se, that distinguishes other
proposed modes of operation for IPsec, TLS, etc.

I agree if you're replacing OE with OK ;-)

One clarification: I don't see the use of unauthenticated keying as opportunistic in any sense of the word.

Opportunistic would mean making an assumption that might be wrong, but when it's right it saves time/effort.

There's no savings here; by using unauthenticated key exchange, you're really just lowering the bar.

That said, I don't like the term "anonymous encryption" because it implies identity hiding, which isn't the purpose either.

Why not just use the term "unauthenticated encryption", when that's exactly what's happening?

Joe

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to