I think there is probably enough support on this list and real
implementation experience to generate some sort of a spoofing
standard?
if nothing else an informational document which summarizes the
most "correct" way of implementing this. I know there have been
papers and descriptions of this before, but something which has the
blessings of more than just the authors would be quite useful...that way
we would atleast have a common base to argue about :)
does anyone else agree on the need for such a document??
manish karir
This archive was generated by hypermail 2b29 : Mon Jan 15 2001 - 16:40:44 EST