RE: IETF Last Call on Walled Garden Standard for the Internet

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> -----Original Message-----
> From: ietf-bounces@xxxxxxxx [mailto:ietf-bounces@xxxxxxxx] On
> Behalf Of Jari Arkko
> Sent: Thursday, March 13, 2008 7:04 PM
> To: Bernard Aboba
> Cc: ietf@xxxxxxxx
> Subject: Re: IETF Last Call on Walled Garden Standard for the Internet
>
> Bernard,
>
> For what it is worth, this ex-EAP co-chair also thinks that
> the use of EAP keys for applications is a very bad idea.

Why?
> And I too am concerned about introducing walled gardens through this.

Why?

> Having said that, I think there are legitimate uses of EMSK
> in the area of network access, such as various fast handover
> proposals in EAP. My understanding is that HOKEY is working
> on this. So perhaps one potential direction for resolving
> your issues is to provide a much stricter IANA section and an
> applicability note.

Sure based on technical merits not FUD.

> I realize that this does not prevent people from grabbing
> values. But I note that I know of one case at least where
> this has already happened, even without an IETF
> specification. Arguably the situation with a (sufficiently
> tight) spec might be better, because we can use the spec to
> explain what usage is inappropriate.

Why?

> I realize we have RFC
> 3748 already, but since use of EMSK has been an IETF topic
> for 5+ years, I think it would be reasonable to state what
> the final rules are on taking specific keys out of the EMSK.

Sure based on technical merits and not FUD.

_______________________________________________
IETF mailing list
IETF@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]