RedPhone's Licensing Declaration:
The values provided in, and the processing required by the authorizations ("authz_data" in the Protocol Document) sent or received using the techniques defined in TLS Authorizations Extensions are not specified in the Protocol Document. When an implementation generates the authorizations or processes these authorizations in any of the four ways described below, then this practice may be covered by RedPhone Security's patent claims.
Asserts implementors of the tls-authz proposed standard would be in violation of RedPhone's patent and thus these features could never be incorporated into Free Software.Ref: http://www.fsf.org/blogs/community/ietf-please-reject-draft-housley-tls-authz-extns/blogentry_view
peace,
Ryan McIntosh
Software Architect
PeaceWorks Computer Consulting
ph: (204) 480-0314
cell: (204) 770-3682
ryan@xxxxxxxxxxxxx
_______________________________________________ Ietf@xxxxxxxx https://www.ietf.org/mailman/listinfo/ietf