[21:00:26] karen.s.seo joins the room [21:09:40] jpcerezo joins the room [21:21:39] mrichardson joins the room [21:37:10] BillC joins the room [21:40:02] BillC leaves the room [21:44:21] donley.chris joins the room [21:51:38] jpcerezo leaves the room: offline [21:55:28] mrichardson leaves the room [22:01:40] Melinda_bb joins the room [22:06:59] Melinda_bb leaves the room [22:17:33] karen.s.seo leaves the room [22:19:16] donley.chris leaves the room [22:28:34] joelja joins the room [22:43:10] gont test consensus on list for accepting ip security doucment semnatic distinction for implementation vs operational considerations cross area review only about 3 people claim to have read doucment in total on icmp filtering document strutuce consideration section for endpoint vs passthough control plane processors as an example manav issues with cryptogrphic protection methods pim sm to the list link local secutiry need distributed keyserver - bill atwood jeff - what are the intentions beyond this working working implications for bfd single doucment for each working group rich graven agree with previous statement multiparty key distrubtion prblem joel jaeggli shelia ras we are exploring using rfc 3547 to solve this problem in rsvp not sure about pim [22:55:44] scott.mansfield joins the room [22:56:08] scott.mansfield leaves the room [23:02:33] joelja leaves the room