On 7/8/2014 12:03 PM, Stephen Farrell wrote:
Hi Joe,
On 08/07/14 18:54, Joe Touch wrote:
I didn't see the post on the main list, but my view is that this doc
needs to be handled in SAAG. I do not support its moving forward as an
individual draft.
saag is not an area working group, so cannot do that. Its
just not the same setup as with appsawg for example.
That's unfortunate; it would be useful to have this have a home within
the IETF.
And I'm not clear what difference that'd make either,
especially since this topic, and, more recently, this draft
have been the subject of significant discussion on the saag
list.
Yes, but there was no "WGLC". Jumping straight to IETF LC seems like an
end-run around this being homed in a WG - any WG - and IMO it ought to be.
Joe
Cheers,
S.
Joe
On 7/8/2014 8:34 AM, Stephen Farrell wrote:
IETF LC started as promised.
Cheers,
S.
-------- Original Message --------
Subject: Last Call: <draft-dukhovni-opportunistic-security-01.txt>
(Opportunistic Security: some protection most of the time) to
Informational RFC
Date: Tue, 08 Jul 2014 08:09:40 -0700
From: The IESG <iesg-secretary@xxxxxxxx>
Reply-To: ietf@xxxxxxxx
To: IETF-Announce <ietf-announce@xxxxxxxx>
The IESG has received a request from an individual submitter to consider
the following document:
- 'Opportunistic Security: some protection most of the time'
<draft-dukhovni-opportunistic-security-01.txt> as Informational RFC
The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@xxxxxxxx mailing lists by 2014-08-05. Exceptionally, comments may be
sent to iesg@xxxxxxxx instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.
Abstract
This memo defines the term "opportunistic security". In contrast to
the established approach of delivering strong protection some of the
time, opportunistic security strives to deliver at least some
protection most of the time. The primary goal is therefore broad
interoperability, with security policy tailored to the capabilities
of peer systems.
The file can be obtained via
http://datatracker.ietf.org/doc/draft-dukhovni-opportunistic-security/
IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-dukhovni-opportunistic-security/ballot/
No IPR declarations have been submitted directly on this I-D.
This document and a predecessor have been the subject of discussion
on the saag mailing list. [1]
[1] https://www.ietf.org/mail-archive/web/saag/current/maillist.html
_______________________________________________
saag mailing list
saag@xxxxxxxx
https://www.ietf.org/mailman/listinfo/saag