[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: survey of isp security practices



Hi Howard,

Can you identify which mail you are responding to, so we can
understand your comment better?
Which architectural models still under development are you referring
to? 

David Harrington
dbharrington@comcast.net


> -----Original Message-----
> From: owner-opsec@psg.com [mailto:owner-opsec@psg.com] On 
> Behalf Of Howard C. Berkowitz
> Sent: Wednesday, November 17, 2004 6:25 PM
> To: opsec@ops.ietf.org
> Subject: Re: survey of isp security practices
> 
> Might I observe that a document called "Survey of ISP 
> Security Practices" isn't necessarily a logical place for 
> functions for which the architectural models are still under 
> development?  Perhaps there is a place for a new document 
> "Requirements for (new) ISP Security Practices", but the 
> value of the current one seems to be what people actually do. 
> If they do things that have problems with scalability, it 
> still may be relevant to note the technique, its limitations, 
> and move on.
> 
>