Description: 1. Section 1.3 appears to couple issuance of certificates and assignment of Node-IDs (in most cases):
RELOAD's security model is based on each node having one or more public key certificates. In general, these certificates will be assigned by a central server which also assigns Node-IDs, although self-signed certificates can be used in closed networks.
What is the reason for this coupling? Does it have security implications? At the least, a forward reference to later sections (e.g., 3.1) might help.
Notes: in 1.1, Add text explaining that node identifiers are tightly coupled to peer certificates. Consider forward ref to security section 13.3
From: Peter St. Andre
Description: 1. Section 1.3 appears to couple issuance of certificates and assignment of Node-IDs (in most cases):
RELOAD's security model is based on each node having one or more public key certificates. In general, these certificates will be assigned by a central server which also assigns Node-IDs, although self-signed certificates can be used in closed networks.
What is the reason for this coupling? Does it have security implications? At the least, a forward reference to later sections (e.g., 3.1) might help.
Notes: in 1.1, Add text explaining that node identifiers are tightly coupled to peer certificates. Consider forward ref to security section 13.3