So we have to trade off the risks of too much data vs. the risks of a complex rekey protocol vs. the risks having the big data applications build new connections every 2**36 or so bytes.

If we don't have rekeying, then the big data applications are the only ones at risk. If we do, it may be a wedge which can compromise all users.

Cheers - Bill

-------------------------------------------------------------------------
Bill Frantz        | Re: Hardware Management Modes: | Periwinkle
(408)356-8506 | If there's a mode, there's a | 16345 Englewood Ave www.pwpconsult.com | failure mode. - Jerry Leichter | Los Gatos, CA 95032

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to