Re: end user security

Ted Gavin <tedgavin@newsguy.com> Wed, 10 October 2001 03:13 UTC

Received: from mailbag.cps.intel.com (mailbag.cps.intel.com [192.102.199.72]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA19430 for <run-archive@LISTS.IETF.ORG>; Tue, 9 Oct 2001 23:13:53 -0400 (EDT)
Received: from mailbag.intel.com (mailbag.cps.intel.com [192.102.199.72]) by mailbag.cps.intel.com (8.9.3/8.9.3/d: relay.m4,v 1.6 2000/11/24 22:10:56 iwep Exp iwep $) with ESMTP id TAA23670; Tue, 9 Oct 2001 19:59:29 -0700 (PDT)
Received: from MAILBAG.INTEL.COM by MAILBAG.INTEL.COM (LISTSERV-TCP/IP release 1.8d) with spool id 14911 for IETF-RUN@MAILBAG.INTEL.COM; Tue, 9 Oct 2001 19:59:29 -0700
Received: from newsguy.com (smtp.newsguy.com [209.155.56.71]) by mailbag.cps.intel.com (8.9.3/8.9.3/d: relay.m4,v 1.6 2000/11/24 22:10:56 iwep Exp iwep $) with ESMTP id TAA23666 for <IETF-RUN@mailbag.cps.INTEL.COM>; Tue, 9 Oct 2001 19:59:28 -0700 (PDT)
Received: from home (dsl092-237-232.phl1.dsl.speakeasy.net [66.92.237.232]) by newsguy.com (8.9.1a/8.9.1) with SMTP id TAA35116 for <IETF-RUN@mailbag.cps.INTEL.COM>; Tue, 9 Oct 2001 19:57:22 -0700 (PDT)
References: <20011009215545.C32066@magenet.net>
X-Mailer: Forte Agent 1.8/32.548
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by mailbag.cps.intel.com id TAA23667
Message-ID: <m3e7stcvbd4ojj3l3q73sj2jcmtbfetn8j@4ax.com>
Date: Tue, 09 Oct 2001 22:58:24 -0400
Reply-To: tedgavin@newsguy.com
Sender: IETF-RUN <IETF-RUN@mailbag.cps.INTEL.COM>
From: Ted Gavin <tedgavin@newsguy.com>
Organization: Institute for the Very, Very Nervous
Subject: Re: end user security
To: IETF-RUN@mailbag.cps.INTEL.COM
In-Reply-To: <20011009215545.C32066@magenet.net>
Content-Transfer-Encoding: 8bit

On Tue, 9 Oct 2001 21:55:45 -0400, Josh Rollyson
<dinodrac@SUMMIT.MAGENET.NET> wrote:

>I'd like to suggest that a document is needed on the responsibilities
>of end users to maintain secure systems.

This brings up an interesting point, and one that should probably be
raised at this time.

At SpamCon last spring, a number of people expressed interest in
pursuing this type of document, mostly from the perspective of an Abuse
Desk professional. That is to say, who would create a document that
could be used both by users and network abuse or support personnel in
explaining why systems had to be secured, and how to address the need
for a "best practices" type of approach for Abuse Desk staffs.

I don't know that it should/would be this group, but I'd be curious to
see what people's impressions are as to what scope the document should
cover.

Ted