Re: [Syslog] syslog/tls policies and use cases
"David Harrington" <ietfdbh@comcast.net> Wed, 14 May 2008 12:08 UTC
Return-Path: <syslog-bounces@ietf.org>
X-Original-To: syslog-archive@megatron.ietf.org
Delivered-To: ietfarch-syslog-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 31A9C3A687F; Wed, 14 May 2008 05:08:21 -0700 (PDT)
X-Original-To: syslog@core3.amsl.com
Delivered-To: syslog@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 5C3213A687F for <syslog@core3.amsl.com>; Wed, 14 May 2008 05:08:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.436
X-Spam-Level:
X-Spam-Status: No, score=-2.436 tagged_above=-999 required=5 tests=[AWL=0.163, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tFiyoCOyXY5Q for <syslog@core3.amsl.com>; Wed, 14 May 2008 05:08:18 -0700 (PDT)
Received: from QMTA06.emeryville.ca.mail.comcast.net (qmta06.emeryville.ca.mail.comcast.net [76.96.30.56]) by core3.amsl.com (Postfix) with ESMTP id E8E7D3A6867 for <syslog@ietf.org>; Wed, 14 May 2008 05:08:17 -0700 (PDT)
Received: from OMTA09.emeryville.ca.mail.comcast.net ([76.96.30.20]) by QMTA06.emeryville.ca.mail.comcast.net with comcast id RQ6J1Z00m0S2fkCA600300; Wed, 14 May 2008 12:07:03 +0000
Received: from Harrington73653 ([24.128.66.199]) by OMTA09.emeryville.ca.mail.comcast.net with comcast id RQ7Q1Z00U4HwxpC8V00000; Wed, 14 May 2008 12:07:26 +0000
X-Authority-Analysis: v=1.0 c=1 a=WWLg-UQFwiUA:10 a=hfXpDYVANRYc4cT53FwA:9 a=JAg1TsURFvh7AGnYkeUTqoxXJFEA:4 a=si9q_4b84H0A:10 a=hPjdaMEvmhQA:10 a=50e4U0PicR4A:10
From: David Harrington <ietfdbh@comcast.net>
To: Pasi.Eronen@nokia.com, clonvick@cisco.com
References: <Pine.GSO.4.63.0805120530390.16718@sjc-cde-003.cisco.com> <1696498986EFEC4D9153717DA325CB729CB573@vaebe104.NOE.Nokia.com>
Date: Wed, 14 May 2008 08:07:24 -0400
Message-ID: <070301c8b5bb$1342dd00$0600a8c0@china.huawei.com>
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook 11
In-Reply-To: <1696498986EFEC4D9153717DA325CB729CB573@vaebe104.NOE.Nokia.com>
Thread-Index: Aci0N7lgnIHQrINwTQGnz5RzGRCwJQBfHmZgAAFdxRA=
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198
Cc: syslog@ietf.org
Subject: Re: [Syslog] syslog/tls policies and use cases
X-BeenThere: syslog@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Security Issues in Network Event Logging <syslog.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/syslog>, <mailto:syslog-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/pipermail/syslog>
List-Post: <mailto:syslog@ietf.org>
List-Help: <mailto:syslog-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/syslog>, <mailto:syslog-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Sender: syslog-bounces@ietf.org
Errors-To: syslog-bounces@ietf.org
Hi, So I go buy a Linksys or Netgear router or other consumer gear. I slip the CD into the drive and run software to install the management GUI on my PC. That software is used to perform an initial configuration of the device, such as enabling DHCP, setting WEP keys, and so on. This same software can presumably generate a key and "copy the fingerprint" to the device, right? Clueless operator needs not be involved. The Internet is secure. right? David Harrington dbharrington@comcast.net ietfdbh@comcast.net dharrington@huawei.com _______________________________________________ Syslog mailing list Syslog@ietf.org https://www.ietf.org/mailman/listinfo/syslog
- Re: [Syslog] syslog/tls policies and use cases David Harrington
- Re: [Syslog] syslog/tls policies and use cases Rainer Gerhards
- Re: [Syslog] syslog/tls policies and use cases robert.horn
- Re: [Syslog] syslog/tls policies and use cases Rainer Gerhards
- Re: [Syslog] syslog/tls policies and use cases robert.horn
- Re: [Syslog] syslog/tls policies and use cases tom.petch