Hi,

I'm somewhat puzzled by the distinction between an "Insider Attack"
and the "Compromised TS" in this draft. Also, it looks like
Section 4.2 is almost identical to Section 4.3..

Could you elaborate a bit more about the difference, and especially,
when that difference impacts security requirements?

Thanks,
--Sowmini

_______________________________________________
nvo3 mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/nvo3

Reply via email to