On 10/06/2016 08:15 AM, Stephen Farrell wrote: > Hiya, > > So I think this is a recurring theme in various protocols > and note that the drafts referenced in this thread overnight > [1,2,3,4] total 134 pages of text. So istm that there is > scope for a bit of generic guidance on the specific issues > about which Peter is asking, i.e. guidance on what kinds > of analysis to do when inventing or re-using an identifier > in a protocol, and (mainly via reference I'd hope) describing > the attack surface created when someone doesn't do that as > well as they might. > > If someone was willing to try craft a short I-D addressing > the above, that'd I think be a fine thing. Anyone want to > volunteer to try that? (If so, replying on or off list is > fine.) Or is that a silly idea? (If you think so, then > replying on the list is way better:-)
That's what we've tried to do in: draft-gont-numeric-ids-generation-01 Input welcome! Thanks, -- Fernando Gont SI6 Networks e-mail: [email protected] PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492 _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
