On Aug 6, 2020, at 8:18 AM, Ben Schwartz <[email protected]> 
wrote:
> 
> I think opportunistic or unauthenticated encryption is worth pursuing.  

Thanks.

> However, your quote also says "use authentication when possible", and I 
> agree.  I would like to avoid selecting an opportunistic encryption design 
> that doesn't match well with our authenticated encryption design, so I think 
> that means we need to develop them together.

Fully agree. For every use case we adopt, the instantiation of it should not 
prevent other use cases from working well.

--Paul Hoffman

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
dns-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dns-privacy

Reply via email to