Hi Abdussalam,
At 17:06 27-11-2013, Abdussalam Baryun wrote:
What do our protocol designers think about that mitigation
possibility and about that protocol attack consideration?
There may be some information at
http://www.ietf.org/proceedings/88/minutes/minutes-88-perpass
Does the draft explain "Mitigate the attack" in user favours? users
will think every thing is possible.
What does "where possible" mean here? Is it clear for readers or it
is just me?
See http://www.youtube.com/watch?v=hGPmTS6HcGs
Regards,
-sm