diff --git a/i2p2www/spec/proposals/111-ntcp-2.rst b/i2p2www/spec/proposals/111-ntcp-2.rst
index 312cbdf4641ecf6f455f3ca1e93b8b9246520f3d..f6ab07439cac8ba67c81638cd4c772552f332a0f 100644
--- a/i2p2www/spec/proposals/111-ntcp-2.rst
+++ b/i2p2www/spec/proposals/111-ntcp-2.rst
@@ -5,7 +5,7 @@ NTCP 2
     :author: zzz
     :created: 2014-02-13
     :thread: http://zzz.i2p/topics/1577
-    :lastupdated: 2016-09-27
+    :lastupdated: 2016-09-29
     :status: Open
     :supercedes: 106
 
@@ -63,8 +63,8 @@ Design Goals
 - Add resistance to malicious MitM TCP segmentation if possible
 - Don't add significantly to CPU required for connection setup;
   if possible, reduce it significantly
-- Replace HMAC-MD5 with something more secure (see RFC 6151),
-  possibly HMAC-SHA256 or Poly1305 (see alternatives below).
+- Add message authentication (MAC), possibly HMAC-SHA256 or Poly1305
+  (see alternatives below), and remove Adler checksum
 - If possible, reduce the 4-message, two-round-trip handshake to
   a 3-message, one-round-trip handshake, as in SSU.
   This would require moving Bob's signature in message 4 to message 2.