As Melinda noted, the threat analysis doc has been revised and posted.
Two major classes of edits have been made:
- changes based on feedback from folks on the list, consistent with
my replies.
The title was changed ("attack model"), several sections were
revised, and
the term "misbehaving" is now used instead of "malicious or
conspiring."
- an expanded intro that provides a high level background and
description of
the CT architecture, including a diagram derived from DKG's
slides at a previous
meeting
I'm not sure if the intro text needs to be in this doc. It seems more
appropriate for
an architecture doc, but we don't have one (yet). Also, although I have
included some
text about browser behavior, the description is not complete. I believe
there is work
ongoing to generate a Monitor spec, and maybe a separate client spec
plus an arch doc
would be the best way to have a complete, modular set of CT docs. I
suggest we re-cast
6962-bis as a spec only for the log, the nexus of CT.
Comments welcome, as always.
Steve
_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans