As Melinda noted, the threat analysis doc has been revised and posted.

Two major classes of edits have been made:
- changes based on feedback from folks on the list, consistent with my replies. The title was changed ("attack model"), several sections were revised, and the term "misbehaving" is now used instead of "malicious or conspiring."

- an expanded intro that provides a high level background and description of the CT architecture, including a diagram derived from DKG's slides at a previous
      meeting

I'm not sure if the intro text needs to be in this doc. It seems more appropriate for an architecture doc, but we don't have one (yet). Also, although I have included some text about browser behavior, the description is not complete. I believe there is work ongoing to generate a Monitor spec, and maybe a separate client spec plus an arch doc would be the best way to have a complete, modular set of CT docs. I suggest we re-cast
6962-bis as a spec only for the log, the nexus of CT.

Comments welcome, as always.

Steve

_______________________________________________
Trans mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/trans

Reply via email to