Tom, I'd like to ask you to give your requirements independent of any
particular implementation biases.

I'm trying to determine if the requirements match what the WG is able
to implement.  It doesn't help me do that when people keep mixing the
two issues.

I do completely understand that if we get impossible to implement
requirements for our security solution then we'll have to go back and
revisit something.




_______________________________________________
Syslog mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/syslog

Reply via email to