I think this begs the question of whether currently known and
deployable security technologies are actually adequate to the task of
securing our networks and networked protocols.
well, yes, it quite explicitly begs to have such questions discussed, but in
their own forum and before Last Call for functions that use them, rather than
after.
d/
---
Dave Crocker
Brandenburg InternetWorking
+1.408.246.8253
dcrocker a t ...
WE'VE MOVED to: www.bbiw.net
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/ietf