On Friday 07 December 2007 00:46, Steve Atkins wrote:
The first step would be a group consensus on what the threats
are ("what SSP is supposed to be for"), or at least a superset of
what most people think.
Anyone? Bueller?
I, for one, feel like we did this in great depth during and before the
requirements development. My suggestion would be to look to the work we've
already done and refresh your memory on the established consenses. I'm
assuming this isn't the play the game over until you get the result you want
game.
Scott K
_______________________________________________
NOTE WELL: This list operates according to
http://mipassoc.org/dkim/ietf-list-rules.html