Reviewer: Rifaat Shekh-Yusef
Review result: Has Issues

Since the use of IP address literal is not forbidden by this document, what if 
an attacker with the ability to inject DHCP messages or RAs uses this option 
to force the user to contact an IP address of his choosing? In this case, the 
use 
of TLS and presenting the identity in the certificate might not be of much help.

I think this case should be discussed in the security consideration section.


_______________________________________________
Captive-portals mailing list
Captive-portals@ietf.org
https://www.ietf.org/mailman/listinfo/captive-portals

Reply via email to