On Thu, 16 Jun 2005, Keith Moore wrote:
Lately I've been thinking that trying to document security concerns
with authetication methods on a protocol-specific or service-specific
basis is not the way to go - instead what we might need is a survey of
authentication methods along with an applicability statement for
each.
Yes, that was probably the weakest part of the spamops draft, to the
extent that I thought the draft would have been better off without it.
Tony.
--
f.a.n.finch <dot(_at_)dotat(_dot_)at> http://dotat.at/
BISCAY: WEST 5 OR 6 BECOMING VARIABLE 3 OR 4. SHOWERS AT FIRST. MODERATE OR
GOOD.