Hi, Samir The solution described in section 3.2 seems to be in line with what BCP 188 (RFC 7258) calls an attack. You should at least reference this and explain how this solution is either (1) not pervasive monitoring, or (2) a good thing, despite being “pervasive monitoring” Regards, Yoav > On 21 Nov 2015, at 6:34 PM, Samir Srivastava <samirs.lists@xxxxxxxxx> wrote: > > We donot need anywork being done in security consideration. > > Pl refer the draft > > https://tools.ietf.org/html/draft-srivastava-dispatch-avoidance-of-threats-00 > > Thanks > Samir >