Re: Admission Control to the IETF 78 and IETF 79 Networks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



It not necessary to log but it is necessary to create either a firewall ACL or an L2 fib entry at the time of authentication...

Joel's iPad

On Jul 1, 2010, at 12:32 PM, Iljitsch van Beijnum <iljitsch@xxxxxxxxx> wrote:

> On 1 jul 2010, at 21:20, Russ Housley wrote:
> 
>> Again, the use of anonymous registration IDs is available to you and
>> anyone that wants one.  If you are concerned about the logs, then you
>> should use one.
> 
> I'm concerned about the correlation between my MAC address and the hosts I communicate with. Anonymous IDs don't help against that, but not logging does, because then the only way for a government to obtain this correlation is on an individual basis rather than casting a wide net that catches large amounts of previously logged information.
> _______________________________________________
> Ietf mailing list
> Ietf@xxxxxxxx
> https://www.ietf.org/mailman/listinfo/ietf
> 
_______________________________________________
Ietf mailing list
Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]