[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Comments: draft-siemborski-mupdate-04




Turn off hyphenation.

In section 8.8, the protocol allows as list of authentication mechanisms, even if TLS is not in use. Without the integrity provided by TLS, an adversary can reorder the list of mechanisms. One solution would be to limit the list to a single item when TLS is not in use.

How was port 2004 assigned?