ietf-dkim
[Top] [All Lists]

Re: [ietf-dkim] Structure of the threat analysis...

2005-10-12 12:50:46


Eliot Lear wrote:
Stephen:

- A collection of MUST/SHOULD etc. constraints imposed on the protocol
  which is basically the output of the threat analysis (so we've
  something to check the protocol against later)


I believe you are talking about protocol requirements. Does this have to be done in the threat analysis first round prior to charter?

Hopefully not, but I think its a good goal for ending up in the threat
analysis before the base protocol is finalised.

S.

_______________________________________________
ietf-dkim mailing list
http://dkim.org