Tom, I'd like to ask you to give your requirements independent of any particular implementation biases.
I'm trying to determine if the requirements match what the WG is able to implement. It doesn't help me do that when people keep mixing the two issues. I do completely understand that if we get impossible to implement requirements for our security solution then we'll have to go back and revisit something. _______________________________________________ Syslog mailing list [email protected] https://www1.ietf.org/mailman/listinfo/syslog
