> I think this begs the question of whether currently known and > deployable security technologies are actually adequate to the task of > securing our networks and networked protocols. well, yes, it quite explicitly begs to have such questions discussed, but in their own forum and before Last Call for functions that use them, rather than after. d/ --- Dave Crocker Brandenburg InternetWorking +1.408.246.8253 dcrocker a t ... WE'VE MOVED to: www.bbiw.net _______________________________________________ Ietf@xxxxxxxx https://www1.ietf.org/mailman/listinfo/ietf