Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help

2014-05-19 Thread Jared Mauch
On May 19, 2014, at 9:12 PM, Danny McPherson wrote: > > Where else would it be documented? If the IETF is designing protocols that > operators will have to deploy, should this not be here? I thought that was > the point of an “operations” working group? Not all operational practices are do

Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help

2014-05-19 Thread Danny McPherson
Where else would it be documented? If the IETF is designing protocols that operators will have to deploy, should this not be here? I thought that was the point of an “operations” working group? -danny On May 19, 2014, at 9:11 PM, Jared Mauch wrote: > Is there a need for this to be explicit

Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help

2014-05-19 Thread Jared Mauch
On May 19, 2014, at 9:02 PM, Danny McPherson wrote: > Good point Sandy, this was definitely meant to serve as more of a motivation, > illustrating a real problem that smart people should focus on because it > happens all the time and some real heavy solutions being consider wholly > ignore it

Re: [GROW] WGLC: draft-ietf-grow-simple-leak-attack-bgpsec-no-help

2014-05-19 Thread Danny McPherson
[top post only] Good point Sandy, this was definitely meant to serve as more of a motivation, illustrating a real problem that smart people should focus on because it happens all the time and some real heavy solutions being consider wholly ignore it. Quibbling about “definitions” that satisfy