Summary of Mailing List Discussions Confidentiality Protection ? A combination of the following two bullets: in some environments confidentiality protection might not be required. "NSIS signaling messages MUST be possible to be confidentiality protected between NSIS nodes.“ Relationship between flow identifier and security ? Flow identifier which is independent of endpoint addresses makes identity spoofing easier |