Re: Admission Control to the IETF 78 and IETF 79 Networks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



the only hard issue i have heard is log access and retention.  it is
clear radius logs, the only logs being used (aside from landings and
take-offs of black helicopters), should be destroyed at the end of the
meeting.  but should they be wiped more frequently?  

their intended use is solely for debugging for users who have problems
authenticating.  will folk be happy with not being able to check
"yesterday it worked, today not?"  if so, ops can destroy them nightly
or more frequently.

note that the ops group has no direct need for logs.  it's the users who
we presume want any authentication problems which they might have to be
debuggable.

randy
_______________________________________________
Ietf mailing list
Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]