> On 19 Sep 2014, at 21:59, Ted Lemon <mel...@fugue.com> wrote:
> 
>> On Sep 19, 2014, at 4:54 PM, Michael Thomas <m...@mtcc.com> wrote:
>> I guess that's kind of what I've been getting at: should we capture all of 
>> this in a threats document?
>> I'm a little uncomfortable with the formality, but I'm even more 
>> uncomfortable with the seeming desire
>> by some to sweep this all under the rug.
> 
> I think it would be worth gathering the information in a document if someone 
> wants to write one, sure.   Just talking and not gathering the results is a 
> waste of time.   I think there are a fair number of people who have ideas 
> about how this should work.   I don't know if a threats document per se is 
> the right thing to do, but a document where this discussion is tracked and 
> recorded would definitely be helpful.   It would be a shame though if that 
> effort derailed forward progress, as such things sometimes do.

I think it would be useful to do, and needn't hold up progress. It would give 
us a common understanding - hopefully - of which threats are being covered and 
which are not. And which are handled by layers/protocols outside the scope of 
homenet's charter.

Tim
_______________________________________________
homenet mailing list
homenet@ietf.org
https://www.ietf.org/mailman/listinfo/homenet

Reply via email to