#78: algorithm agility discussion is inadequate

 Section 6 does not provide an adequate description of how algorithm
 agility is achieved. It refers to Section 5.1, which defines log metadata.
 See other documents, e.g., RFC 6916, that describe algorithm agility for a
 security system as an illustration of the sort of description that is
 appropriate.

-- 
-------------------------+-------------------------------------------------
 Reporter:               |      Owner:  draft-ietf-trans-
  [email protected]           |  [email protected]
     Type:  defect       |     Status:  new
 Priority:  major        |  Milestone:
Component:  client-      |    Version:
  behavior               |   Keywords:
 Severity:  -            |
-------------------------+-------------------------------------------------

Ticket URL: <http://trac.tools.ietf.org/wg/trans/trac/ticket/78>
trans <http://tools.ietf.org/trans/>

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to