Scott C Moonen writes:
> > Section 1.4 says that
> >
> >INFORMATIONAL exchanges MUST ONLY occur
> >after the initial exchanges and are cryptographically protected with
> >the negotiated keys.
> >
> > This does not match the 1.5 which says we can send INFORMATIONAL
> > exch
Here is second set of issues now from the section 2. I didn't get
completely through it yet, but I decided to send this now as next time
I will be able to get more comments is on Monday.
--
In section 2.2 there is duplicate text