Re: The internet architecture

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Mark Seery allegedly wrote on 11/30/08 10:38 AM:
> Some questions have also risen WRT identity:
> 
> http://www.potaroo.net/presentations/2006-11-30-whoareyou.pdf
> 
> Is identity a network level thing or an application level thing?

Whatever.  All of the above.  There are many possible ways to use
identifiers, particularly for "session" (whatever that is, at whatever
layer) authentication and re-authentication.  The point to
locator/identifier separation is primarily to get identification-related
functions to stop depending on location-dependent tokens, i.e. locators.
 Once that's done, they can use anything they like -- and they do :-).

Scott
_______________________________________________

Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]