So we have to trade off the risks of too much data vs. the risks
of a complex rekey protocol vs. the risks having the big data
applications build new connections every 2**36 or so bytes.
If we don't have rekeying, then the big data applications are
the only ones at risk. If we do, it may be a wedge which can
compromise all users.
Cheers - Bill
-------------------------------------------------------------------------
Bill Frantz | Re: Hardware Management Modes: | Periwinkle
(408)356-8506 | If there's a mode, there's a | 16345
Englewood Ave
www.pwpconsult.com | failure mode. - Jerry Leichter | Los Gatos,
CA 95032
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls