On Sat, 29 Nov 2008, Mark Andrews wrote: > > It's worse. Before you can start validating on your own, or use some > > trusted remote TSIG accessable resolver, you are likely to need > > to accept some spoofs to get past the hotspot authentication. > > Which is something the IETF should be providing / promoting > a standard alternative for. At present normal protocol > operations are being hijacked to do this. > > Browsers could then have a "HOTSPOT" button which just looked > up this information, for example. I'd be very interested in trying to come up with something for this within the IETF to standarize hotspot cooperation. Paul _______________________________________________ Ietf@xxxxxxxx https://www.ietf.org/mailman/listinfo/ietf