#78: algorithm agility discussion is inadequate Section 6 does not provide an adequate description of how algorithm agility is achieved. It refers to Section 5.1, which defines log metadata. See other documents, e.g., RFC 6916, that describe algorithm agility for a security system as an illustration of the sort of description that is appropriate.
-- -------------------------+------------------------------------------------- Reporter: | Owner: draft-ietf-trans- [email protected] | [email protected] Type: defect | Status: new Priority: major | Milestone: Component: client- | Version: behavior | Keywords: Severity: - | -------------------------+------------------------------------------------- Ticket URL: <http://trac.tools.ietf.org/wg/trans/trac/ticket/78> trans <http://tools.ietf.org/trans/> _______________________________________________ Trans mailing list [email protected] https://www.ietf.org/mailman/listinfo/trans
