-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. General comments: ================== This is a short, clear and to the point draft. I have only a few general comments 1 (introduction) - ---------------- - - Please expand MSS on first use - - "(see appendix A)" and "but there still seems to be some confusion" This sounds pretty vague to me. I thought Appendix A would be a verbatim copy of the text from 1122, but it is much more, and I appreciated the discussion. I propose to make that explicit: "RFC1122 clarified the MSS option, but confusion remains as discussed in Appendix A" Security Considerations: ======================== I don't really think what you have written down here qualifies as security considerations. It sort of hints to a denial-of-service, but I don't see any evil, just an operational problem. What I wonder about (but I am not knowledgable to judge) is whether wrong MSS size settings could be exploited for for example buffer overflow attacks. Cheers, Klaas -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk/GNzAACgkQH2Wy/p4XeFJQrACdEZggKbo9y+3p3W35N7FBzpho izcAoIl1J9o04ymIXyYmEZP+IiHRH18I =aIb0 -----END PGP SIGNATURE-----