Does defining configuration concepts require that you define the
functional aspects of syslog application?
I can see many different uses of syslog, each requiring different
configuration. It all depends on the context it is used in. It can be
stand-along, it can be embedded, it can be part of a
Miao:
> Security sensitive environment:
> The server and the client are both configured with
> certiifcates. The trust anchors must be configured for both
> server and client, so the client and server can validate the
> certificate to a common trust anchor. It is not easy to
> deploy because t
Chris:
Can we ask Mangus to provide suggested text? He mentioned it is just a
paragraph. This would make it a bit easier to get to the point of
what/how he wants addressed and evaluate if we agree with it. If his
suggested text is not too demanding on implementations, but rather a
recommendation,
I agree with Juergen and Rainer that we could use less specification
here since it is a different layer. How about we replace both
paragraphs with this:
"Syslog senders are RECOMMENDED to use UDP checksums when sending
messages over IPv4. Proper UDP checksum insertion and verification is
already