Dear all

During SEC-DIR review, Benjamin pointed out:


> I worry a little bit that we haven't fully specified the entire list of steps 
> the 6LR

> takes to follow the cryptographic chain and validate that the 6LN holds the 
> key

> in question and registers the address in question to the Crypto-ID in 
> question.  I

> don't have a specific thing in mind that the 6LR might forget, but if we

> explicitly state what things are bound to what other things, the 6LR is less 
> likely

> to make a security-relevant mistake.

Any idea how we can address this?

Pascal
_______________________________________________
6lo mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6lo

Reply via email to