>> OF course, there will be some things where encryption is simply not >> needed, and but data integrity is is needed. Example: time (NTP) and >> routing protocols. So we need to be careful how we specify MUST. >> :-) > I think this is a reasonable read but I'd like to encourage dissent > here. Time is a very important part of almost all cryptographic > protocols
i might go further. having some protocols in the clear allows the attacker to better focus their efforts on what is encrypted. also, though some data themselves might not require privacy, the nature of the conversation may facilitate traffic analysis. randy _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
