I would offer we do the venture capital lightning round thing.
Schedule a *single* 2.5 hour slot for *all* BOFs. Each BOF proposer gets 5
minutes to make their pitch and 10 minutes of discussion. I would bet that 15
minutes of FOCUSED attention would give the IAB and IESG enough input as to
Folks,
A few of us have formulated an alternative proposal for streamlining the IETF
standards process. We hope that it at least adds to the mix of discussion in
the community.
d/
Original Message
Subject: I-D Action:draft-crocker-ietf-twostage-00.txt
Date: Tue, 09 Nov
In message 4cd967ad.80...@dcrocker.net, Dave CROCKER writes:
Folks,
A few of us have formulated an alternative proposal for streamlining the IETF
standards process. We hope that it at least adds to the mix of discussion in
the community.
d/
Dave, can you please fix/change/report to
Hi,
I could live with this. I could live with draft-housley-two-maturity-levels.
I could also live with draft-dawkins-pstmt-twostage (2003), or
draft-atkinson-newtrk-twostep (2006), or even draft-carpenter-newtrk-twostep
(2005).
For that matter I could live with
The IESG has decided to move the ALTO and DECADE working
groups from the Applications Area to the Transport Area. Two
factors played a role in this decision. First, the IESG feels
that consolidating the standardization of peer-to-peer
technologies in one Area will strengthen this important
Hi Russ,
The Areas and Area Directors have been updated accordingly for ALTO and
DECADE.
Best regards,
Cindy
On Tue Nov 09 17:43:44 2010, ietf@ietf.org wrote:
The IESG has decided to move the ALTO and DECADE working
groups from the Applications Area to the Transport Area. Two
factors
When Torsten and I started pulling together the security considerations
over the last 4-6 weeks, we toyed with the idea of either populating the
security considerations section of the protocol with a list/tree of
considerations, or creating a more comprehensive document to ensure we
covered all
I would say that the security considerations should be based on a model
of OAuth. Start with a model of the protocol and the guarantees you
want, then explain how to use security mechanisms to achieve those
guarantees.
I promised Hannes today to do a review of the current document (which I
All I did was a forward of what was sent over ietf-announce.
d/
On 11/10/2010 7:24 AM, Mark Andrews wrote:
Dave, can you please fix/change/report to the vendor that your MUA as it is
not producing valid mime. My MUA reported this as being broken.
Content-Type: Message/External-body;
The IESG has approved the following document:
- 'Anonymity Support for Kerberos'
draft-ietf-krb-wg-anon-12.txt as a Proposed Standard
This document is the product of the Kerberos Working Group.
The IESG contact persons are Tim Polk and Sean Turner.
A URL of this Internet Draft is:
The IESG has approved the following document:
- 'Additional Kerberos Naming Constraints'
draft-ietf-krb-wg-naming-07.txt as a Proposed Standard
This document is the product of the Kerberos Working Group.
The IESG contact persons are Tim Polk and Sean Turner.
A URL of this Internet Draft is:
The IESG has decided to move the ALTO and DECADE working
groups from the Applications Area to the Transport Area. Two
factors played a role in this decision. First, the IESG feels
that consolidating the standardization of peer-to-peer
technologies in one Area will strengthen this important
To provide a complete picture, I should have said something about the
P2PSIP working group in the announcement. Sorry for omitting it.
Because the P2PSIP WG is nearing the end of its chartered work, P2PSIP
is not being moved from the RAI Area to the TSV Area.
On behalf of the IESG,
Russ Housley
13 matches
Mail list logo