> From: Alexandru Petrescu <alexandru.petrescu@xxxxxxxxxxxx> > ... > Rogue malicious wily ruthless users skilled enough to configure hostap > can rightfully be blamed; but not the novice user turning on > a particular vendor's laptop. That may be true in some situations, but should it be tolerated at the IETF? Why shouldn't such behavior be prima facie evidence of insufficent interest or experience in the business of the IETF to be allowed to participate? Even in other situations, that sort of behavior is the direct cause of most of the current security and spam problems on the Internet. If people would not run "user friendly" products that have designed and implemented such gross negligence that they execute with full system privileges any data that happens to come along, then there would be as many worms, virus, and spam amplifiers in general on the Internet as there are among UNIX based products. So a Modest Proposal: Discover which "user friendly" products were responsible for your troubles and ban everything from their maker(s) from the next meeting. Ban any person who breaks that ban at the next meeting from the following 3 meetings. (Cue cries about the business of the IETF including educating the masses, the complete unfairness of holding anyone accuntable for anything, and the need to be "open to innovation.") Vernon Schryver vjs@xxxxxxxxxxxx