Dear all During SEC-DIR review, Benjamin pointed out:
> I worry a little bit that we haven't fully specified the entire list of steps > the 6LR > takes to follow the cryptographic chain and validate that the 6LN holds the > key > in question and registers the address in question to the Crypto-ID in > question. I > don't have a specific thing in mind that the 6LR might forget, but if we > explicitly state what things are bound to what other things, the 6LR is less > likely > to make a security-relevant mistake. Any idea how we can address this? Pascal
_______________________________________________ 6lo mailing list [email protected] https://www.ietf.org/mailman/listinfo/6lo
