Juergen: Normally, I would agree with you. However, these environmental security issues are not directed at the I2RS protocol but the environment. I thought it would be clearer to have this split so the I2RS protocol development work would not need to considered these hard requirements for the protocol.
Sue -----Original Message----- From: i2rs [mailto:[email protected]] On Behalf Of Juergen Schoenwaelder Sent: Monday, August 17, 2015 1:54 PM To: Susan Hares Cc: 'Jeffrey Haas'; [email protected]; [email protected]; 'Joel Halpern'; 'Alia Atlas' Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG adoption call (8/17 to 8/31) On Mon, Aug 17, 2015 at 01:49:33PM -0400, Susan Hares wrote: > This begins a 2 week WG adoption call for > draft-mglt-i2rs-security-requirements. This draft discusses the > security requirements for the I2RS environment. You can find the draft at: > > > > https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs- > 00 > > > > A security reviewer will review this draft during the time 8/20 to 8/25. > We will post the security directorate review to this discussion. > I believe there should be at max 1 I2RS security requirements document to avoid overlap and thus to improve overall document review and processing efficiency. /js -- Juergen Schoenwaelder Jacobs University Bremen gGmbH Phone: +49 421 200 3587 Campus Ring 1 | 28759 Bremen | Germany Fax: +49 421 200 3103 <http://www.jacobs-university.de/> _______________________________________________ i2rs mailing list [email protected] https://www.ietf.org/mailman/listinfo/i2rs _______________________________________________ i2rs mailing list [email protected] https://www.ietf.org/mailman/listinfo/i2rs
