More things worth beating this horse past death with:

 - authentication is difficult to do scalably, but unauthenticated key
   exchange is trivial, therefore

 - having an option to do unauthenticated key exchange, as a
   middle-of-the-road choice between no-security and authentication, is
   a very good thing

 - authentication can always be added later (the charter says this!)

Is this horse dead yet?  I think so.

Nico
-- 

_______________________________________________
Tcpinc mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tcpinc

Reply via email to