diff --git a/draft-ietf-rats-corim.md b/draft-ietf-rats-corim.md index ce6e2561..bc6d2992 100644 --- a/draft-ietf-rats-corim.md +++ b/draft-ietf-rats-corim.md @@ -2658,7 +2658,7 @@ Utilizing the public part of an asymmetric key pair used for Evidence generation The Verifier should use cryptographically protected, mutually authenticated secure channels to all its trusted input sources (Endorsers, RVPs, Verifier Owners). These links must reach as deep as possible - possibly terminating within the appraisal session context - to avoid man-in-the-middle attacks. -Minimizing the use of intermediaries is also vital: each intermediary becomes another party that needs to be trusted and therefore factored in the Attesters and Relying Parties' TCBs. +Minimizing the use of intermediaries is also vital: each intermediary becomes another party that might need to be trusted and therefore factored in the Attesters and Relying Parties' TCBs. Refer to {{Section 12.2 of -rats-arch}} for information on Conceptual Messages protection. [^issue] https://github.com/ietf-rats-wg/draft-ietf-rats-corim/issues/11