ietf
[Top] [All Lists]

Re: howto WLAN, several subnets

2003-11-21 08:39:25
From: Alexandru Petrescu <alexandru(_dot_)petrescu(_at_)motorola(_dot_)com>

...
Rogue malicious wily ruthless users skilled enough to configure hostap
can rightfully be blamed; but not the novice user turning on
a particular vendor's laptop.

That may be true in some situations, but should it be tolerated at
the IETF?  Why shouldn't such behavior be prima facie evidence of
insufficent interest or experience in the business of the IETF to be
allowed to participate?

Even in other situations, that sort of behavior is the direct cause
of most of the current security and spam problems on the Internet.
If people would not run "user friendly" products that have designed
and implemented such gross negligence that they execute with full
system privileges any data that happens to come along, then there
would be as many worms, virus, and spam amplifiers in general on the
Internet as there are among UNIX based products.

So a Modest Proposal: Discover which "user friendly" products were
responsible for your troubles and ban everything from their maker(s)
from the next meeting.  Ban any person who breaks that ban at the next
meeting from the following 3 meetings.


(Cue cries about the business of the IETF including educating the masses,
the complete unfairness of holding anyone accuntable for anything,
and the need to be "open to innovation.")


Vernon Schryver    vjs(_at_)rhyolite(_dot_)com



<Prev in Thread] Current Thread [Next in Thread>