On Wed, 26 Mar 2008, IAB Chair wrote: > The document can be found at: > http://www.ietf.org/internet-drafts/draft-iab-protocol-success-03.txt The document seems to be in good shape and is useful. Two comments: Case study A4 discusses inter-domain multicast vs application overlays. It seems as if the text is focused on inter-domain _ASM_ multicast; some of the facts stated do not apply to SSM. I'm not sure what would be the best course here: rephrase the case study to be about ASM multicast or generalize slightly. Case study A7 discusses radius vs tacacs+. As a historical point, tacacs+ 2.1 from 1995 [1] had a very non-explicit boilerplate [2] and it's not obvious if there were any real restrictions to using it. I don't remember anymore if there was something more to it but I certainly used :-). In later versions, (4.0.4 from 1998) [3], the license was more explicit and pretty much like the old BSD license. >From that perspective, unless I'm missing something, it seems as if tacacs+ had open code and was more or less restriction-free. [1] http://www.mirrorservice.org/sites/ftp.wiretapped.net/pub/security/authentication/tacacs/tac_plus.2.1.tar.gz [2] * Copyright (c) 1995 by Cisco systems, Inc. * All rights reserved. * Please NOTE: None of the TACACS code available here comes with any * warranty or support. [3] ftp://ftp-eng.cisco.com/pub/tacacs/obsolete/ -- Pekka Savola "You each name yourselves king, yet the Netcore Oy kingdom bleeds." Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings _______________________________________________ IETF mailing list IETF@xxxxxxxx https://www.ietf.org/mailman/listinfo/ietf