On 3/11/2014 3:12 PM, Joe Touch wrote:
Hi, Steve,
....
I have
suggested "opportunistic keying" as a preferred term, since its the
key management, not the encryption per se, that distinguishes other
proposed modes of operation for IPsec, TLS, etc.
I agree if you're replacing OE with OK ;-)
One clarification: I don't see the use of unauthenticated keying as
opportunistic in any sense of the word.
Opportunistic would mean making an assumption that might be wrong, but
when it's right it saves time/effort.
There's no savings here; by using unauthenticated key exchange, you're
really just lowering the bar.
That said, I don't like the term "anonymous encryption" because it
implies identity hiding, which isn't the purpose either.
Why not just use the term "unauthenticated encryption", when that's
exactly what's happening?
Joe
_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane