Eliot Lear <[email protected]> wrote: >> 3) Find a replacement for MAC addresses as primary key to identify >> specific devices
> Not sure how this applies.
If MAC addresses become regularly randomized, then what is the unique handle
for each device? While some devices might not randomize their MAC address,
the fact that some do forces management systems to adapt.
I think that the answer is in the shape of hash of public (IDevID) key.
>> 4) How do our incident reporting protocols preserve or do not preserve
>> privacy? Once we have better supply chain security, then we will have
>> better and clearer statements about vulnerabilities. How does this
>> translate back to reports about specific devices? How can an ISP
>> gauge the extent of their vulnerability without actually having an
>> inventory of devices? (I think Bloom filters have some role here)
> Good question.
--
Michael Richardson <[email protected]> . o O ( IPv6 IøT consulting )
Sandelman Software Works Inc, Ottawa and Worldwide
signature.asc
Description: PGP signature
_______________________________________________ OPSAWG mailing list [email protected] https://www.ietf.org/mailman/listinfo/opsawg
