Eliot Lear wrote:
Stephen:
- A collection of MUST/SHOULD etc. constraints imposed on the protocol
which is basically the output of the threat analysis (so we've
something to check the protocol against later)
I believe you are talking about protocol requirements. Does this have
to be done in the threat analysis first round prior to charter?
Hopefully not, but I think its a good goal for ending up in the threat
analysis before the base protocol is finalised.
S.
_______________________________________________
ietf-dkim mailing list
http://dkim.org