Eliot Lear <[email protected]> wrote:
    >> 3) Find a replacement for MAC addresses as primary key to identify
    >> specific devices

    > Not sure how this applies.

If MAC addresses become regularly randomized, then what is the unique handle
for each device?   While some devices might not randomize their MAC address,
the fact that some do forces management systems to adapt.
I think that the answer is in the shape of hash of public (IDevID) key.

    >> 4) How do our incident reporting protocols preserve or do not preserve
    >> privacy?  Once we have better supply chain security, then we will have
    >> better and clearer statements about vulnerabilities.  How does this
    >> translate back to reports about specific devices?  How can an ISP
    >> gauge the extent of their vulnerability without actually having an
    >> inventory of devices?  (I think Bloom filters have some role here)

    > Good question.

--
Michael Richardson <[email protected]>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide

Attachment: signature.asc
Description: PGP signature

_______________________________________________
OPSAWG mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/opsawg

Reply via email to