-Original Message-
From: Lakshminath Dondeti [mailto:[EMAIL PROTECTED]
Sent: Saturday, October 07, 2006 10:43 AM
To: Harald Alvestrand; Narayanan, Vidya
Cc: [EMAIL PROTECTED]; iesg@ietf.org; ietf@ietf.org
Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea)
At 01:42
-Original Message-
From: Susmit Panjwani [mailto:[EMAIL PROTECTED]
Sent: Saturday, October 07, 2006 5:04 PM
To: Harald Alvestrand
Cc: Narayanan, Vidya; [EMAIL PROTECTED]; iesg@ietf.org; ietf@ietf.org
Subject: Re: [Nea] WG Review: Network Endpoint Assessment (nea)
Third, I
Lakshminath Dondeti wrote:
At 01:42 AM 10/7/2006, Harald Alvestrand wrote:
snip
Many universities require their students to buy their own laptops,
but prohibit certain types of activity from those laptops (like
spamming, DDOS-attacks and the like). They would love to have the
ability to run
Hi Vidya
Narayanan, Vidya wrote:
-Original Message-
From: Susmit Panjwani [mailto:[EMAIL PROTECTED]
Sent: Saturday, October 07, 2006 5:04 PM
To: Harald Alvestrand
Cc: Narayanan, Vidya; [EMAIL PROTECTED]; iesg@ietf.org; ietf@ietf.org
Subject: Re: [Nea] WG Review: Network Endpoint
Hi Vidya
Inline ...
snip
How about adding this text - It should be noted that the networks at
large are exposed to attacks from lying endpoints and
external entities
attaching to the networks as well as any problems arising from unknown
vulnerabilities on NEA compliant endpoints. Hence,