Wendy,

You are slightly more pessimistic here. Even after the "bad guy" takes over
DHCP, DNS, ..., it may or may not already take control of the ALTO server,
obtained private key to the server certificate, ... Our job is to do our
share to provide the authenticity,  integrity, and confidentiality, as much
as we can. I saw your point that you might want us to use more "benign"
compromised settings, which we sure can tweak the wording a bit. How does
this sound?

Thanks,

Richard
_______________________________________________
alto mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/alto

Reply via email to