Hi, I'm somewhat puzzled by the distinction between an "Insider Attack" and the "Compromised TS" in this draft. Also, it looks like Section 4.2 is almost identical to Section 4.3..
Could you elaborate a bit more about the difference, and especially, when that difference impacts security requirements? Thanks, --Sowmini _______________________________________________ nvo3 mailing list [email protected] https://www.ietf.org/mailman/listinfo/nvo3
