On 7/3/12 4:50 PM, Warren Kumari wrote:
On Jun 28, 2012, at 4:49 PM, Murphy, Sandra wrote:
This last call has ended. There were only three comments during the wglc.
Two noted that the document was solid, but that it was premature to advance the
draft when the protocols spec was still
On Jul 10, 2012, at 12:15 PM, Sean Turner wrote:
On 7/3/12 4:50 PM, Warren Kumari wrote:
On Jun 28, 2012, at 4:49 PM, Murphy, Sandra wrote:
This last call has ended. There were only three comments during the wglc.
Two noted that the document was solid, but that it was premature to
At 8:49 PM + 6/28/12, Murphy, Sandra wrote:
This last call has ended. There were only three comments during the wglc.
Two noted that the document was solid, but that it was premature to
advance the draft when the protocols spec was still undergoing
changes and might produce new required
I'll advocate for a publish it now and fix it later if needed
strategy.
the hidden tao of the ietf
aol
___
sidr mailing list
sidr@ietf.org
https://www.ietf.org/mailman/listinfo/sidr
On Jun 28, 2012, at 4:49 PM, Murphy, Sandra wrote:
This last call has ended. There were only three comments during the wglc.
Two noted that the document was solid, but that it was premature to advance
the draft when the protocols spec was still undergoing changes and might
produce new
This last call has ended. There were only three comments during the wglc.
Two noted that the document was solid, but that it was premature to advance the
draft when the protocols spec was still undergoing changes and might produce
new required features for the router certificates.
So what
A question arising from my ignorance.
How do values in the security arc get assigned? Not IANA since there are no
IANA considerations, but how then?
On the IANA profiles web page I can see
(1.3.6.1.5.5.4)
and
(1.3.6.1.5.5.8)
but no 1.3.6.1.5.5.7, just a reference to Russ.
Tom Petch
-
On 05/03/2012 03:57 AM, t.petch wrote:
A question arising from my ignorance.
How do values in the security arc get assigned? Not IANA since there are no
IANA considerations, but how then?
good question... the below are asn.1 things, quickly searching around
isn't helping me out much
I have read the -03 version of bgpsec profiles. I think the current
version of the document is solid. But I don't think the protocol spec is
quite stable enough to say we aren't going to be making any changes to
the bgpsec protocol that will require a change to the profiles document
... but I
While I think the document may be pretty solid currently, the meta-issue of
the tail wagging the dog exists.
I.e. There still exists the potential for additional requirements to
surface,
related to the design and implementation of the bgpsec protocol, which have
the potential to inform additional
10 matches
Mail list logo