>>>>> "Tom" == Tom Petch <[EMAIL PROTECTED]> writes:

    Tom> More hopefully, I do believe that the threats can be met by
    Tom> syslog-sign.  Almost every user I talk to about security
    Tom> wants encryption.  I have to work very hard to do so, but
    Tom> mostly succeed, in demonstrating to them that what they need
    Tom> is message origin authentication and integrity and it just so
    Tom> happens that that is what most IPS protocols offer, and, even
    Tom> better, it is much cheaper than encryption.


I'm not sure it is true that message origin authentication and
integrity is much cheaper than encryption with either symmetric or
asymmetric cryptography.


This may be true when comparing a traditional symmetric block cipher
to a hash implemented in software.


_______________________________________________
Syslog mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/syslog

Reply via email to