That's exactly what I meant to say. :) Apologies. Been a long, long week. Being new to the IETF process, but not the industry, I have some confusion about GROW I-D's as they can sometimes be very similar or partially overlapping with IDR and SIDR drafts. Just trying to understand which WG's are responsible for what, how overlap is handled and where combining efforts makes the most sense.
Thanks in advance. Have a great weekend! -d On Sep 6, 2013, at 11:14 AM, Stephen Kent <[email protected]> wrote: > Dave, > > This is just a cleanup pass on this doc, to address IESG comments. The doc > dates back to June, 2011. > > So, perhaps you mean to say that your doc is related to his one :-). > > Steve >> Seems related to our draft on MITM attacks with BGPSEC lacking path >> validation, but expands on other attack vectors. >> >> https://datatracker.ietf.org/doc/draft-ietf-grow-simple-leak-attack-bgpsec-no-help/ >> >> Thanks. >> >> -d _______________________________________________ sidr mailing list [email protected] https://www.ietf.org/mailman/listinfo/sidr
