You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Secure ciphers are much more important for Shared State Retry than for the load balancer stuff and Initial Encryption. Therefore, some crypto agility to allow this mechanism to adapt as ciphers deprecate would be good.
The key sequence can also imply a cipher, so we'll add that to the data model. Some fields will vary length based on the cipher.
We should also make it so everyone MUST support AES128-GCM.
The text was updated successfully, but these errors were encountered:
Secure ciphers are much more important for Shared State Retry than for the load balancer stuff and Initial Encryption. Therefore, some crypto agility to allow this mechanism to adapt as ciphers deprecate would be good.
The key sequence can also imply a cipher, so we'll add that to the data model. Some fields will vary length based on the cipher.
We should also make it so everyone MUST support AES128-GCM.
The text was updated successfully, but these errors were encountered: