Valery Smyslov via Datatracker <noreply@xxxxxxxx> wrote: > 2. It is not clear for me how revocation is done in case the private key of UA > is compromised. While the Security considerations section states that > revocation procedures are yet to be determined, I think that some text about > the directions in which they are planned to be determined should be present. Revocation is done with a hammer. (Insert picture of Hulk smashing drone...) -- Michael Richardson <mcr+IETF@xxxxxxxxxxxx> . o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide
Attachment:
signature.asc
Description: PGP signature
-- last-call mailing list last-call@xxxxxxxx https://www.ietf.org/mailman/listinfo/last-call