Hi all: The chairs feel draft-mglt-i2rs-security-environment-reqs-01.txt answer questions regarding the security environment for I2RS as by the IETF Security directorate and the IESG. We plan to adopt this draft, but we would like to get your feedback. This is a 1 week WG Adoption call for the WG to review this document and make comments on the adoption.
The authors have tried to address all comments made during the August. Please send comments to the list. The draft is at: https://datatracker.ietf.org/doc/draft-mglt-i2rs-security-environment-reqs/ Sue Hares and Jeff Haas -----Original Message----- From: [email protected] [mailto:[email protected]] Sent: Friday, October 02, 2015 9:52 AM To: Susan Hares; Joel Halpern; Joel M. Halpern; Daniel Migault; Daniel Migault; Susan Hares Subject: New Version Notification for draft-mglt-i2rs-security-environment-reqs-01.txt A new version of I-D, draft-mglt-i2rs-security-environment-reqs-01.txt has been successfully submitted by Daniel Migault and posted to the IETF repository. Name: draft-mglt-i2rs-security-environment-reqs Revision: 01 Title: I2RS Environment Security Requirements Document date: 2015-10-02 Group: i2rs Pages: 19 URL: https://www.ietf.org/internet-drafts/draft-mglt-i2rs-security-environment-reqs-01.txt Status: https://datatracker.ietf.org/doc/draft-mglt-i2rs-security-environment-reqs/ Htmlized: https://tools.ietf.org/html/draft-mglt-i2rs-security-environment-reqs-01 Diff: https://www.ietf.org/rfcdiff?url2=draft-mglt-i2rs-security-environment-reqs-01 Abstract: This document provides environment security requirements for the I2RS architecture. Environment security requirements are independent of the protocol used for I2RS. As a result, the requirements provided in this document are intended to provide good security practise so I2RS can be securely deployed and operated. These security requirements are designated as environment security requirements as opposed to the protocol security requirements described in [I-D.ietf-i2rs-protocol-security-requirements]. The reason to have separate document is that protocol security requirements are intended to help the design of the I2RS protocol whether the environment requirements are rather intended for deployment or implementations. Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. The IETF Secretariat _______________________________________________ i2rs mailing list [email protected] https://www.ietf.org/mailman/listinfo/i2rs
