A follow up to clarify my position: In my opinion, what was explained in the introduction section is a sufficient explanation. If only the names of the attacks, which are explained in RFC 3756, are included, then this is sufficient without the need of repeating them again in this document. This makes it easier to follow the dialog in this document by separating the old vulnerabilities from the new.
Hosnieh
_______________________________________________ OPSEC mailing list [email protected] https://www.ietf.org/mailman/listinfo/opsec
_______________________________________________ OPSEC mailing list [email protected] https://www.ietf.org/mailman/listinfo/opsec
