> -----Original Message-----
> From: Randy Bush [mailto:[email protected]]

> > Bgpsec-reqs 3.4 provides a list of operational considerations to
> > discuss. Would probably make sense to ensure that the document covers
> > all of the listed items, perhaps even using those items as section
> > headings for continuity's sake.
>
> probably more appropriate in the protocol document, or an adjunct to it
>
> randy


[WEG]] Not certain I understand. This is an operational considerations 
document, and those are listed as operational considerations. Why would that 
not be appropriate? How are you making the distinction between what is and is 
not appropriate?

Wes


This E-mail and any of its attachments may contain Time Warner Cable 
proprietary information, which is privileged, confidential, or subject to 
copyright belonging to Time Warner Cable. This E-mail is intended solely for 
the use of the individual or entity to which it is addressed. If you are not 
the intended recipient of this E-mail, you are hereby notified that any 
dissemination, distribution, copying, or action taken in relation to the 
contents of and attachments to this E-mail is strictly prohibited and may be 
unlawful. If you have received this E-mail in error, please notify the sender 
immediately and permanently delete the original and any copy of this E-mail and 
any printout.
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to