[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Comments: draft-siemborski-mupdate-04
Turn off hyphenation.
In section 8.8, the protocol allows as list of authentication
mechanisms, even if TLS is not in use. Without the integrity provided by
TLS, an adversary can reorder the list of mechanisms. One solution would
be to limit the list to a single item when TLS is not in use.
How was port 2004 assigned?