I notice that this transport provides no authentication of the data that is retrieved. The security considerations needs to discuss the potential attacks if an attacker modifies this public data. The security considerations section also needs to point to best practice for avoiding UDP reflection attacks. It is not good enough to say "Do what other people do." In both cases these may be included by reference. _______________________________________________ Ietf@xxxxxxxx https://www1.ietf.org/mailman/listinfo/ietf