I am well aware of vast amounts of insecure systems being out in the wild, up to and including pace makers. Being critical doesn’t make them any more secure, and we shouldn’t say otherwise. They are at risk, and we should say so, and not excuse them. If we want to have operational guidance around how to handle insecure devices, I am ok with that. Those might include secure facilities, application aware proxies, and other aspects, but I am not sure that is this document. Eliot |
Attachment:
signature.asc
Description: Message signed with OpenPGP
-- last-call mailing list last-call@xxxxxxxx https://www.ietf.org/mailman/listinfo/last-call