>>>>> "Jim" == Jim Schaad <jim...@augustcellars.com> writes:

    Jim> Sam et al,
    Jim> 1. In section 1 after the Classic Tunnel Attack figure, I believe 
there are
    Jim> three methods listed as possible mitigation strategies, however I don't
    Jim> understand how the second one - a sufficiently strong inner method - 
could
    Jim> possibly be a mitigation by itself.  The three I see are 1) Policy 2) 
strong
    Jim> inner method 3) Cryptographic binding.

I actually was intending to describe cryptographic binding in two
sentences; I've re-punctuated the text to indicate that if the inner
method is strong enough you can do cryptographic binding.

I believe I've addressed your other comments in an upcoming draft.

--Sam
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to