Juergen: 

Normally, I would agree with you.  However, these environmental security
issues are not directed at the I2RS protocol but the environment.  I thought
it would be clearer to have this split so the I2RS protocol development work
would not need to considered these hard requirements for the protocol. 

Sue 

-----Original Message-----
From: i2rs [mailto:[email protected]] On Behalf Of Juergen Schoenwaelder
Sent: Monday, August 17, 2015 1:54 PM
To: Susan Hares
Cc: 'Jeffrey Haas'; [email protected]; [email protected]; 'Joel
Halpern'; 'Alia Atlas'
Subject: Re: [i2rs] draft-mglt-i2rs-security-requirements-00 2 Week WG
adoption call (8/17 to 8/31)

On Mon, Aug 17, 2015 at 01:49:33PM -0400, Susan Hares wrote:
> This begins a 2 week WG adoption call for 
> draft-mglt-i2rs-security-requirements.  This draft discusses the 
> security requirements for the I2RS environment.  You can find the draft
at:
> 
>  
> 
> https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-
> 00
> 
>  
> 
> A security reviewer will review this draft during the time 8/20 to 8/25.
> We will post the security directorate review to this discussion. 
>

I believe there should be at max 1 I2RS security requirements document to
avoid overlap and thus to improve overall document review and processing
efficiency.

/js

-- 
Juergen Schoenwaelder           Jacobs University Bremen gGmbH
Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
Fax:   +49 421 200 3103         <http://www.jacobs-university.de/>

_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to