On Jan 20, 2012, at 10:49 AM, Murray S. Kucherawy wrote:
>> 
>> The amount of "security" in the redaction is ENTIRELY up to the
>> redactor.  Given this spec, the redactor is welcome to use HMAC if they
>> want to -- if they or their lawyers think they need that level of
>> confidence that it can't be deciphered.  Depending upon the redactor's
>> sensibilities, they are also welcome to use plain SHA1, or MD5, or CRC,
>> or, hey, just base64-encode the plain-text string if all you want is to
>> keep it away from idle eyes.
>> 
>> It makes no sense for this spec to declare anything in this regard.
> 
> Does that mean, in Section 2, we could replace steps 1 through 4 with 
> something more generic, like simply "Apply any isomorphic transformation to 
> each instance of private data in this message", and suggest a range of 
> possibilities from base64 to rot13 to CRC32 to H to HMAC, depending on the 
> site's needs, perhaps with requisite admonition to be aware of the strengths 
> and weaknesses of each?

I think that would improve it in general, as well as avoiding some of the 
supposed security concerns.

Cheers,
  Steve

_______________________________________________
marf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/marf

Reply via email to