Can Midpoints Modify the Packet? How do we distinguish helpful modifications from man-in-the-middle attacks? Each such proposal requires careful, in-depth analysis. Basic test: is it worse if the attacker rewrites a field than if the packet is dropped completely? No such proposals are currently on the table for this group.