On 10/06/2016 08:15 AM, Stephen Farrell wrote:
> Hiya,
> So I think this is a recurring theme in various protocols
> and note that the drafts referenced in this thread overnight
> [1,2,3,4] total 134 pages of text. So istm that there is
> scope for a bit of generic guidance on the specific issues
> about which Peter is asking, i.e. guidance on what kinds
> of analysis to do when inventing or re-using an identifier
> in a protocol, and (mainly via reference I'd hope) describing
> the attack surface created when someone doesn't do that as
> well as they might.
> If someone was willing to try craft a short I-D addressing
> the above, that'd I think be a fine thing. Anyone want to
> volunteer to try that? (If so, replying on or off list is
> fine.) Or is that a silly idea? (If you think so, then
> replying on the list is way better:-)

That's what we've tried to do in: draft-gont-numeric-ids-generation-01

Input welcome!

Fernando Gont
SI6 Networks
e-mail: fg...@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492

perpass mailing list

Reply via email to