>>>>> "Tom" == Tom Petch <[EMAIL PROTECTED]> writes:
Tom> More hopefully, I do believe that the threats can be met by
Tom> syslog-sign. Almost every user I talk to about security
Tom> wants encryption. I have to work very hard to do so, but
Tom> mostly succeed, in demonstrating to them that what they need
Tom> is message origin authentication and integrity and it just so
Tom> happens that that is what most IPS protocols offer, and, even
Tom> better, it is much cheaper than encryption.
I'm not sure it is true that message origin authentication and
integrity is much cheaper than encryption with either symmetric or
asymmetric cryptography.
This may be true when comparing a traditional symmetric block cipher
to a hash implemented in software.
_______________________________________________
Syslog mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/syslog