Hi all: 

The chairs feel draft-mglt-i2rs-security-environment-reqs-01.txt answer 
questions regarding the security environment for I2RS as by the IETF Security 
directorate and the IESG.   We plan to adopt this draft, but we would like to 
get your feedback.  This is a 1 week WG Adoption call for the WG to review this 
document and make comments on the adoption. 

The authors have tried to address all comments made during the August.   Please 
send comments to the list. 

The draft is at: 
https://datatracker.ietf.org/doc/draft-mglt-i2rs-security-environment-reqs/

Sue Hares and Jeff Haas 

-----Original Message-----
From: [email protected] [mailto:[email protected]] 
Sent: Friday, October 02, 2015 9:52 AM
To: Susan Hares; Joel Halpern; Joel M. Halpern; Daniel Migault; Daniel Migault; 
Susan Hares
Subject: New Version Notification for 
draft-mglt-i2rs-security-environment-reqs-01.txt


A new version of I-D, draft-mglt-i2rs-security-environment-reqs-01.txt
has been successfully submitted by Daniel Migault and posted to the IETF 
repository.

Name:           draft-mglt-i2rs-security-environment-reqs
Revision:       01
Title:          I2RS Environment Security Requirements
Document date:  2015-10-02
Group:          i2rs
Pages:          19
URL:            
https://www.ietf.org/internet-drafts/draft-mglt-i2rs-security-environment-reqs-01.txt
Status:         
https://datatracker.ietf.org/doc/draft-mglt-i2rs-security-environment-reqs/
Htmlized:       
https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-01
Diff:           
https://www.ietf.org/rfcdiff?url2=draft-mglt-i2rs-security-environment-reqs-01

Abstract:
   This document provides environment security requirements for the I2RS
   architecture.  Environment security requirements are independent of
   the protocol used for I2RS.  As a result, the requirements provided
   in this document are intended to provide good security practise so
   I2RS can be securely deployed and operated.

   These security requirements are designated as environment security
   requirements as opposed to the protocol security requirements
   described in [I-D.ietf-i2rs-protocol-security-requirements].  The
   reason to have separate document is that protocol security
   requirements are intended to help the design of the I2RS protocol
   whether the environment requirements are rather intended for
   deployment or implementations.

                                                                                
  


Please note that it may take a couple of minutes from the time of submission 
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat


_______________________________________________
i2rs mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/i2rs

Reply via email to