RE: SSH - RE: [Syslog] Re: Threat model and charter

2006-01-11 Thread David B Harrington
Hi, Note that ISMS has a user-authenticatioin requirement for mapping to data access controls, while I do not believe that to be a requirement of syslog. David Harrington [EMAIL PROTECTED] > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Chris Lo

RE: SSH - RE: [Syslog] Re: Threat model and charter

2006-01-11 Thread Rainer Gerhards
; Subject: Re: SSH - RE: [Syslog] Re: Threat model and charter > > On Wed, 2006-01-11 at 06:29 -0800, Chris Lonvick wrote: > > Hi, > > > > I forgot to address the use of SSH for authentication. The > isms WG is > > trying to use SSH to provide security for

Re: SSH - RE: [Syslog] Re: Threat model and charter

2006-01-11 Thread Balazs Scheidler
On Wed, 2006-01-11 at 06:29 -0800, Chris Lonvick wrote: > Hi, > > I forgot to address the use of SSH for authentication. The isms WG is > trying to use SSH to provide security for SNMPv3. This can be done by > having the devices authenticate by having a username and credential > (password, pu