I'm concerned that your analysis seems to be based on what is easy to implement.
We also need to do the analysis of what security is actually required by syslog deployments. If the ansers are different, we'll have to deal with that. But e are in a different situation if we decide to do something because we don't know how to do better than if we meet what we believe the security requirements are. _______________________________________________ Syslog mailing list Syslog@lists.ietf.org https://www1.ietf.org/mailman/listinfo/syslog