[ietf-dkim] Structure of the threat analysis...
stephen.farrell at cs.tcd.ie
Wed Oct 12 12:40:31 PDT 2005
Eliot Lear wrote:
>> - A collection of MUST/SHOULD etc. constraints imposed on the protocol
>> which is basically the output of the threat analysis (so we've
>> something to check the protocol against later)
> I believe you are talking about protocol requirements. Does this have
> to be done in the threat analysis first round prior to charter?
Hopefully not, but I think its a good goal for ending up in the threat
analysis before the base protocol is finalised.
More information about the ietf-dkim