Re: Admission Control to the IETF 78 and IETF 79 Networks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



There's a difference, however, between ticking a box and having individual user-attributable credentials. The two techniques are focused on different goals, generically binding users to an AUP, without caring who they are, versus being able to identify individual users on the network (with more detail than a MAC address).

The proposal here is the latter, which would seem to raise the question of why individual user attribution is necessary, i.e., why anonymity in the IETF network unacceptable -- even within the pool of IETF participants.

BTW, the trend cited here of more networks requiring more authentication also goes the other way:
<http://www.starbucks.com/blog/22761/free-one-click-wi-fi-is-coming>




On Jul 1, 2010, at 11:41 AM, Dave CROCKER wrote:



On 7/1/2010 8:26 AM, Fred Baker wrote:
While it is new in IETF meetings, it is far from unusual in WiFi networks to find some form of authentication. This happens at coffee shops, college campuses, corporate campuses, and people's apartments. I think I would need
some more data before I concluded this was unreasonable.


+1

Small towns often have an environment that makes it reasonable to leave one's doors unlocked. Large cities rarely do. The IETF is now part of a very big city. Restricting wifi access to authorized personnel has become not only the norm, but the expected and often the required.

Small added note about physical security:

As SM noted, we don't have monitors at the meeting room doors. Even with them, meeting attendance includes many local folk. Once upon a time, IETF meetings constituted an extremely collegial environment among folks who knew each other. Today, attendance is much more diverse.

One aspect of the diversity is that we need to treat meetings rooms as fully public places, with the attendant risks. The risk is not terrible, but it /is/ real.

There have been thefts in these rooms, in multiple meeting cities, where property was stolen rather boldly, such as from underneath the seat of an attendee.

We need to watch our personal property as if the person sitting next to us, or behind us, might steal it.

Because some of them have.

d/
--

 Dave Crocker
 Brandenburg InternetWorking
 bbiw.net
_______________________________________________
Ietf mailing list
Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf

_______________________________________________
Ietf mailing list
Ietf@xxxxxxxx
https://www.ietf.org/mailman/listinfo/ietf


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]