More things worth beating this horse past death with: - authentication is difficult to do scalably, but unauthenticated key exchange is trivial, therefore
- having an option to do unauthenticated key exchange, as a middle-of-the-road choice between no-security and authentication, is a very good thing - authentication can always be added later (the charter says this!) Is this horse dead yet? I think so. Nico -- _______________________________________________ Tcpinc mailing list [email protected] https://www.ietf.org/mailman/listinfo/tcpinc
