On 11/10/2022 4:54 AM, Laura Atkins wrote:

There are a couple of characteristics that stand out.


A few of the posting here have provided substantive details about the nature of a replay attack.  Not just the overall concept but some detail about the means and methods.

Whatever draft(s) move toward eventual wg publication, I encourage having at least one include this kind of detail, if only to make clear what scenarios the proffered protection mechanisms are seeking to work against.

d/

--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
mast:@[email protected]

_______________________________________________
Ietf-dkim mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-dkim

Reply via email to