diff --git a/draft-add-server-selection-information-05.xml b/draft-add-server-selection-information-05.xml
index 9d2ec6f..35f44e2 100644
--- a/draft-add-server-selection-information-05.xml
+++ b/draft-add-server-selection-information-05.xml
@@ -248,34 +248,18 @@
Background-Check Model discussed in Section 5.2 and Section 5.3 of
Remote attestation procedure (RATS) Architecture . RATS enables a relying
- party (i.e., DNS client) to establish a level of confidence in the
- trustworthiness of remote peer (i.e., Encrypted DNS server) through the
- creation of attestation evidence about the remote peer to assess the
- peer's trustworthiness, and a way to appraise such evidence. The
- evidence is a set of claims (i.e., Policy Assertion Token (PAT)). An
- attester (i.e., the organization hosting the Encrypted DNS server)
- creates Evidence (i.e., PAT) and optionally Endorsement from an Endorser
- (i.e., an auditor who performed security and privacy audit of the
- Encrypted DNS server (e.g., Auditor Cure53 performed security audit of
- VPN provider TunnelBear ) to appraise the
- authenticity of the Evidence. The back-ground check of the organization
- hosting the Encrypted DNS server is done by a public CA and an Extended
- Validation Certificate (EV) or Organization Validation (OV) Certificate
- is issued by the CA only after verification of the requesting
- organization's legal identity. For example, the Extended Validation
- Certification Practice Statement of Comodo is explained in . The PAT is attested using the OV/EV certificate
- issued to the organization hosting the Encrypted DNS server and
- optionally by a auditor. The relying party (i.e., DNS client) appraises
- the validity of the Evidence (i.e., PAT) to assess the trustworthiness
- of the remote peer (i.e., Encrypted DNS server) to identify it is
- connecting to an encrypted DNS server hosted by a specific organization
- (e.g., ISP). In this case, the Relying Party and Verifier are co-located
- on the same machine (Section 5.3 of ) and the evidence is
- revealed to the relying party (Section 7.2 of ).
-
+ party to establish a level of confidence in the
+ trustworthiness of a remote peer through the
+ creation of attestation evidence to assess the
+ peer's trustworthiness, and a way to appraise such evidence.
+ In this document, the relying party is the DNS client and
+ remote peer is the encrypted DNS server.
+ The
+ evidence is a set of claims, which this document describes as
+ the Policy Assertion Token (PAT). The operator of the DNS server
+ attests to their own claims and an (optional) external endorser
+ can provide higher confidence.
+
JSON Web Token (JWT) and JSON Web
Signature (JWS) and related
specifications define a standard token format that can be used as a way