I have reviewed this document as part of the Operational directorate's ongoing effort to review all IETF documents being processed by the IESG.    The draft is written very well. The encryption process is well described.   The only question I have is how to prevent the unintended parties to spoof the encrypted content?     Linda Dunbar   Huawei USA IP Technology Lab 5340 Legacy Drive, Plano, TX 75024 Tel: +1 469-277 - 5840 Fax: +1 469 -277 - 5900