Re: Point of order re: Internet Security Guidelines I-D

Stephen D Crocker <crocker@tis.com> Tue, 25 June 1991 08:45 UTC

Received: from nri.reston.va.us by NRI.NRI.Reston.VA.US id aa01814; 25 Jun 91 4:45 EDT
Received: from TIS.COM by NRI.NRI.Reston.VA.US id aa01781; 25 Jun 91 4:37 EDT
Received: from TIS.COM by TIS.COM (4.1/SUN-5.64) id AA04944; Tue, 25 Jun 91 02:54:55 EDT
Message-Id: <9106250654.AA04944@TIS.COM>
To: Craig Partridge <craig@sics.se>
Cc: spwg@NRI.Reston.VA.US
Subject: Re: Point of order re: Internet Security Guidelines I-D
In-Reply-To: Your message of Tue, 25 Jun 91 08:25:40 +0200. <9106250625.AA26851@garuda.sics.se>
Date: Tue, 25 Jun 1991 02:54:53 -0400
From: Stephen D Crocker <crocker@tis.com>

Craig,

Your point is well made and I agree.  It's inappropriate to require
conformance if there isn't a legitimate job of informing the users.

Now the trick is to craft the wording the right way.  This is intended
to be an enabling document.  It's supposed to stimulate network and
host administrators into writing policies which are consistent with
these guidelines.

Thanks,

Steve