> -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > Behalf Of David Harrington > Sent: Wednesday, May 14, 2008 2:07 PM > To: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Cc: [email protected] > Subject: Re: [Syslog] syslog/tls policies and use cases > > Hi, > > So I go buy a Linksys or Netgear router or other consumer gear. > I slip the CD into the drive and run software to install the > management GUI on my PC. > That software is used to perform an initial configuration of the > device, such as enabling DHCP, setting WEP keys, and so on. > This same software can presumably generate a key and "copy the > fingerprint" to the device, right? > Clueless operator needs not be involved. The Internet is secure. > > right?
Mostly ;) What the clueless user still needs to do is 1) copy the server's fingerprint to the client 2) configure the server to accept the client's fingerprint Rainer > > David Harrington > [EMAIL PROTECTED] > [EMAIL PROTECTED] > [EMAIL PROTECTED] > > > > _______________________________________________ > Syslog mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/syslog _______________________________________________ Syslog mailing list [email protected] https://www.ietf.org/mailman/listinfo/syslog
