>>>>> "Tom" == Tom Petch <[EMAIL PROTECTED]> writes:
Tom> The logical conclusion of your approach is that what we need Tom> is encryption, encryption and encryption, and oh, we could Tom> throw in a little MAC here and there. I think this makes it Tom> too complex, too costly with the result that the security Tom> that is needed, and could be provided more simply, will not Tom> happen. I will say that encryption and macs are very easy to do and I think you'd need to show a strong argument that they will not perform well before performance concerns can be taken seriously. The question I really need answers to is: * Does the WG believe that Authentication of the origin of the message is a requirement for the mandatory to implement approach? * Does the WG believe that integrity protection independent of transport is a requirement for the mandatory to implement? I want these questions answered independent of particular choices about implementation complexity. Ultimately this comes down to Chris judging the consensus of the WG based on the discussion here. --Sam _______________________________________________ Syslog mailing list Syslog@lists.ietf.org https://www1.ietf.org/mailman/listinfo/syslog