Section 3.2 Point-to-Point Delivery over HTTP goes into detail over the HTTP delivery methods, describing push and pull mechanisms and their relative advantages and disadvantages. Reading the guidance, I find that it is not necessary in the specification. Further, it makes unsupported claims regarding networking policy changes which do not reflect the current state of deployed systems. Notably, "Systems behind protected network boundaries can reach externally hosted systems without requiring special firewall or network configuration" is false. Many services are deployed with limited or no egress unless it is explicitly required and configured to support the use case.
Section 3.2 Point-to-Point Delivery over HTTP goes into detail over the HTTP delivery methods, describing push and pull mechanisms and their relative advantages and disadvantages. Reading the guidance, I find that it is not necessary in the specification. Further, it makes unsupported claims regarding networking policy changes which do not reflect the current state of deployed systems. Notably, "Systems behind protected network boundaries can reach externally hosted systems without requiring special firewall or network configuration" is false. Many services are deployed with limited or no egress unless it is explicitly required and configured to support the use case.
I recommend deletion of the entire section.