I'm concerned that your analysis seems to be based on what is easy to
implement.


We also need to do the analysis of what security is actually required
by syslog deployments.
If the ansers are different, we'll have to deal with that.  

But e are in a different situation if we decide to do something
because we don't know how to do better than if we meet what we believe
the security requirements are.



_______________________________________________
Syslog mailing list
Syslog@lists.ietf.org
https://www1.ietf.org/mailman/listinfo/syslog

Reply via email to