>  I think this begs the question of whether currently known and
>  deployable security technologies are actually adequate to the task of
>  securing our networks and networked protocols.

well, yes, it quite explicitly begs to have such questions discussed, but in
their own forum and before Last Call for functions that use them, rather than
after.


  d/
  ---
  Dave Crocker
  Brandenburg InternetWorking
  +1.408.246.8253
  dcrocker  a t ...
  WE'VE MOVED to:  www.bbiw.net



_______________________________________________
Ietf mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/ietf

Reply via email to