Wendy, You are slightly more pessimistic here. Even after the "bad guy" takes over DHCP, DNS, ..., it may or may not already take control of the ALTO server, obtained private key to the server certificate, ... Our job is to do our share to provide the authenticity, integrity, and confidentiality, as much as we can. I saw your point that you might want us to use more "benign" compromised settings, which we sure can tweak the wording a bit. How does this sound?
Thanks, Richard
_______________________________________________ alto mailing list [email protected] https://www.ietf.org/mailman/listinfo/alto
