Proxies -- Discussion list for ad hoc group interested in security and proxies | |
|
|
About Proxies | |
The introduction of proxies modifies the architecture and trust relationships in network protocols. An ad hoc group has begun to examine when these changes are (and are not) a security problem. To see the collection of prior postings to the list, visit the Proxies Archives. |
|
Using Proxies | |
To post a message to all the list members, send email to
proxies@ietf.org.
You can subscribe to the list, or change your existing subscription, in the sections below. |
|
Subscribing to Proxies | |
Subscribe to Proxies by filling out the following form. You will be sent email requesting confirmation, to prevent others from gratuitously subscribing you. Once confirmation is received, your request will be held for approval by the list moderator. You will be notified of the moderator's decision by email. This is also a hidden list, which means that the list of members is available only to the list administrator. | |
Proxies Subscribers | |
|
![]() version 2.1.39 |
![]() |
![]() |