ietf-dkim
[Top] [All Lists]

[ietf-dkim] Concentrate on the threats doc

2006-03-10 21:54:55
Since we have only one week now before the IETF meeting, I'd like to see us hold off on all discussion that does not have to do with open or new issues with the two documents we're currently focused on: threats and base.

Getting the terminology right is important, but let's please not spend all of this next week discussing that, and omit issues with the docs.

So:
* Please, everyone, concentrate on reviewing the threats document.
* Please look at the open issues list that Stephen posted the other day, and comment on the dispositions, giving primary importance to those against the threats doc. * If you have reviewed the threats doc and think it's ready, please say so explicitly. * After doing "threats", review the issues with the base doc from Stephen's note, and address those.

This should get us ready for the sessions at the IETF meeting.

I particularly want to make sure we have explicit review of the threats doc from enough participants to be sure it's ready to go to the IESG with the next update after the IETF meeting.

Barry

--
Barry Leiba, Pervasive Computing Technology  
(leiba(_at_)watson(_dot_)ibm(_dot_)com)
http://www.research.ibm.com/people/l/leiba
http://www.research.ibm.com/spam
_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html