nsis-14 Page:5
1  2  3  4  5  6  7  8 

Summary of Mailing List Discussions
Confidentiality Protection
? A combination of the following two bullets:
in some environments confidentiality protection might not be required.
"NSIS signaling messages MUST be possible to be confidentiality protected between NSIS nodes.“

Relationship between flow identifier and security

? Flow identifier which is independent of endpoint addresses makes identity spoofing easier

PPT Version