Hi, Samir
The solution described in section 3.2 seems to be in line with what BCP 188
(RFC 7258) calls an attack.
You should at least reference this and explain how this solution is either (1)
not pervasive monitoring, or (2) a good thing, despite being “pervasive
monitoring”
Regards,
Yoav
On 21 Nov 2015, at 6:34 PM, Samir Srivastava
<samirs(_dot_)lists(_at_)gmail(_dot_)com> wrote:
We donot need anywork being done in security consideration.
Pl refer the draft
https://tools.ietf.org/html/draft-srivastava-dispatch-avoidance-of-threats-00
Thanks
Samir