I am surprised not to have seen more formal reviews of the quartet for isms I-Ds
whose Last Call has just finished, updating as they do a Standard, while at the
same time introducing a Transport subsystem and model, and also introducing a
new (to snmp) way of providing Security.
I do not know
On Apr 16, 2009, at 2:29 AM, Tom.Petch wrote:
I am surprised not to have seen more formal reviews of the quartet
for isms I-Ds
whose Last Call has just finished, updating as they do a Standard,
while at the
same time introducing a Transport subsystem and model, and also
introducing a
new
Yes, every document that goes through IETF-LC is assigned one gen-art
reviewer to review the document, but the gen-art review process isn't
really a formal part of the IETF document process - it happens in
parallel with IETF-LC and the reviews are done on behalf of the General
Area director. It
On 2009/4/13 Ralph Droms rdr...@cisco.com wrote:
For example, would a host process
information received from a Starbucks network over its 802.11
interface differently from information received a home network over
the 802.11 interface?
It's even more fun than that. How do we reliably know
Yup ... there is currently no way to provide authenticated, meaningful
identification of the network(s) to which a host is attached. Without
that identification, it's pretty hard to write any reasonable policies.
- Ralph
On Apr 16, 2009, at 1:26 PM 4/16/09, Ted Lemon wrote:
On 2009/4/13
Hi, authors,
this is the only IETF last call comment I have seen. It looks like
changes will be required, so I'm placing this document in the Revised
ID Needed state.
Lars
On 2009-4-15, at 2:07, black_da...@emc.com wrote:
Gorry,
I have been selected as the General Area Review Team
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).
Please resolve these comments along with any other Last Call comments
you may receive.
Document:
Again as I mentioned, in order to prepare or build an efficient routing
policy and to select an efficient connection/interface, it would be
necessary to identify, classify and/or prioritize underlying network
characteristics or information of the attached networks.
In addition, as many network
Hi, Seokung.
For section 2.2, I *still* think it would be good to be totally explicit
as I said: Something like:
- At the sender: perform step 7 before step 5.
- At the receiver: perform the second half of step 5 (perform
verification) after step 6.
This means that authentication is performed on
Hi all,
Here's the link to the summary of assignments for the April 23, 2009
telechat:
http://www.softarmor.com/rai/temp-gen-art/reviewers-090423.html
With the updated spreadsheets:
http://www.softarmor.com/rai/temp-gen-art/gen-art.html
Hi all,
Here's the link to the new LC assignments for this week:
http://www.softarmor.com/rai/temp-gen-art/reviewers-090416-lc.html
The assignments are captured in the spreadsheets:
http://www.softarmor.com/rai/temp-gen-art/gen-art.html
I have been selected as the General Area Review Team (Gen-ART)
reviewer for this draft (for background on Gen-ART, please see
http://www.alvestrand.no/ietf/gen/art/gen-art-FAQ.html).
Please wait for direction from your document shepherd
or AD before posting a new version of the draft.
Document:
12 matches
Mail list logo