That's exactly what I meant to say. :) Apologies. Been a long, long week. 

Being new to the IETF process, but not the industry, I have some confusion 
about GROW I-D's as they can sometimes be very similar or partially overlapping 
with IDR and SIDR drafts. Just trying to understand which WG's are responsible 
for what, how overlap is handled and where combining efforts makes the most 
sense. 

Thanks in advance.

Have a great weekend! 

-d

On Sep 6, 2013, at 11:14 AM, Stephen Kent <[email protected]> wrote:

> Dave,
> 
> This is just a cleanup pass on this doc, to address IESG comments. The doc 
> dates back to June, 2011.
> 
> So, perhaps you mean to say that your doc is related to his one :-).
> 
> Steve
>> Seems related to our draft on MITM attacks with BGPSEC lacking path 
>> validation, but expands on other attack vectors.
>> 
>> https://datatracker.ietf.org/doc/draft-ietf-grow-simple-leak-attack-bgpsec-no-help/
>> 
>> Thanks.
>> 
>> -d
_______________________________________________
sidr mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/sidr

Reply via email to