On 3/20/2010 11:49 AM, Richard L. Hamilton wrote:
> http://tools.ietf.org/html/draft-ietf-opsec-ip-security-02
> 
> Is it a good bet that most of the recommendations have been
> implemented (or if not, rejected for good reason)?

Mostly, yes.  But it would be a substantial effort to turn this document
into specific list of requirements and then verify every part of the
system against it.  (Note that many sections in the document have
pointers to other documents and discussions of potential security risks.)

I don't know that anyone has done this work ... someone (or likely
multiple "someones," given the scope) would have to volunteer.  Maybe
there are still bugs that would be useful to fix, and thus a reason to
start a project with interested folks.

-- 
James Carlson         42.703N 71.076W         <[email protected]>
_______________________________________________
networking-discuss mailing list
[email protected]

Reply via email to