[EMAIL PROTECTED] writes:
> doesn't provide much protection.  However, Jeffery lobbied for them on
> the grounds that they were being used in some existing implementations
> (I don't remember which one, but it wasn't Kerberos V5), and that we
> should document what some implementations are using today.

Shouldn't they be made informative rather than proposed standard in
that case?

/assar

Reply via email to