RE: IETF Last Call on Walled Garden Standard for the Internet

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Pasi wrote:



> Here I agree with you fully: this is an extremely bad idea.
> Architecturally linking application security to the link
> layer is just bad engineering, and hinders the ability of
> link layers and applications evolve independently of each other.

Lets start with this: Any application?


> The emsk-hierarchy document should not give higher layer
> applications as an example use case; instead, it should
> explain why this is a bad idea, and recommend that keys
> derived from link layer authentication should be used solely
> for "link-layerish" things (such as link layer handoffs;
> Mobile IP is a borderline case here).

Mobile IP is an application.  So I guess you are okay with some applications right?

_______________________________________________
IETF mailing list
IETF@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]