It not necessary to log but it is necessary to create either a firewall ACL or
an L2 fib entry at the time of authentication...
Joel's iPad
On Jul 1, 2010, at 12:32 PM, Iljitsch van Beijnum
<iljitsch(_at_)muada(_dot_)com> wrote:
On 1 jul 2010, at 21:20, Russ Housley wrote:
Again, the use of anonymous registration IDs is available to you and
anyone that wants one. If you are concerned about the logs, then you
should use one.
I'm concerned about the correlation between my MAC address and the hosts I
communicate with. Anonymous IDs don't help against that, but not logging
does, because then the only way for a government to obtain this correlation
is on an individual basis rather than casting a wide net that catches large
amounts of previously logged information.
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf