Reviewer: Klaas Wierenga Review result: Ready Hi, I believe the authors adequately described the different attack vectors when P-DAOs are introduced. The mitigating measures like requiring that only the root can send P-DAO and validation of VIO seem reasonable. Klaas -- last-call mailing list last-call@xxxxxxxx https://www.ietf.org/mailman/listinfo/last-call