[sacm] [sacmwg/vulnerability-scenario] adding wg version of vulnerability assessment scenario (#24)

Danny Haynes <notifications@github.com> Wed, 15 June 2016 16:04 UTC

Return-Path: <noreply@github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97EBD12D7CD for <sacm@ietfa.amsl.com>; Wed, 15 Jun 2016 09:04:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.555
X-Spam-Level:
X-Spam-Status: No, score=-3.555 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_20=1.546, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cJ_5db9WGwvS for <sacm@ietfa.amsl.com>; Wed, 15 Jun 2016 09:04:41 -0700 (PDT)
Received: from github-smtp2a-ext-cp1-prd.iad.github.net (github-smtp2-ext4.iad.github.net [192.30.252.195]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D60512D8FB for <sacm@ietf.org>; Wed, 15 Jun 2016 09:04:41 -0700 (PDT)
Date: Wed, 15 Jun 2016 09:04:40 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1466006680; bh=R6uyUQApbVb8PRSeei7Q1JTHJdZBr0L03E0GBVaK4G4=; h=From:Reply-To:To:Cc:Subject:List-ID:List-Archive:List-Post: List-Unsubscribe:From; b=Hz38uaFjCbnnfKk0Ibk7zDxgUE3uT4aAtDk+ncnaPHDG/CVam49oBLhHmrJCAgdjm 7zO8Sxg5lFItNWj7cngyUXs7Zxj7mhIYylWYS85bJJY+2h3wzEI2nEe++fRcFu9PQS vQen5bP3ovqMmvwgYO3ZZJ/gKpRpUwYL4jLMHjRo=
From: Danny Haynes <notifications@github.com>
To: sacmwg/vulnerability-scenario <vulnerability-scenario@noreply.github.com>
Message-ID: <sacmwg/vulnerability-scenario/pull/24@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_57617c987c9b_10cd3ff6901bb2c091018"; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: djhaynes
X-GitHub-Recipient: sacm
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/YOrPxMBRh7zhO_EH0sZAbhP4CMI>
Subject: [sacm] [sacmwg/vulnerability-scenario] adding wg version of vulnerability assessment scenario (#24)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.17
Reply-To: sacmwg/vulnerability-scenario <reply+00a6c4d120a161f34da9b3ce2c1b0afff6435c12cf3d1dda92cf0000000113793e9892a169ce09906fe5@reply.github.com>
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Jun 2016 16:04:43 -0000

You can view, comment on, or merge this pull request online at:

  https://github.com/sacmwg/vulnerability-scenario/pull/24

-- Commit Summary --

  * adding wg version of vulnerability assessment scenario

-- File Changes --

    A draft-ietf-sacm-vuln-scenario.xml (1215)

-- Patch Links --

https://github.com/sacmwg/vulnerability-scenario/pull/24.patch
https://github.com/sacmwg/vulnerability-scenario/pull/24.diff

---
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/vulnerability-scenario/pull/24