In <2086143.VlEbLfYXfO@scott-latitude-e6320>, on 02/15/2012
at 03:57 PM, Scott Kitterman <[email protected]> said:
>I don't think it's possible for this applicability statement to
>cover arbitrary authentication technologies.
Certainly not in detail, but it is possible to specify general
constraints. The existing text is reasonable for any likely future
techology, it just needs a reference to the specific cases that the
draft discusses in detail.
1. Selection of the recipient(s) for reports that are
automatically generated MUST be done based on data provided
by the report recipient, and MUST NOT be done heuristically.
Therefore these reports are always solicited, though the
means for doing so, other than the cases discussed above,
are not specified in this memo.
--
Shmuel (Seymour J.) Metz, SysProg and JOAT
Atid/2 <http://patriot.net/~shmuel>
We don't care. We don't have to care, we're Congress.
(S877: The Shut up and Eat Your spam act of 2003)
_______________________________________________
marf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/marf