ietf
[Top] [All Lists]

RE: IETF Last Call on Walled Garden Standard for the Internet

2008-03-13 20:21:34


-----Original Message-----
From: ietf-bounces(_at_)ietf(_dot_)org 
[mailto:ietf-bounces(_at_)ietf(_dot_)org] On
Behalf Of Jari Arkko
Sent: Thursday, March 13, 2008 7:04 PM
To: Bernard Aboba
Cc: ietf(_at_)ietf(_dot_)org
Subject: Re: IETF Last Call on Walled Garden Standard for the Internet

Bernard,

For what it is worth, this ex-EAP co-chair also thinks that
the use of EAP keys for applications is a very bad idea.

Why?
And I too am concerned about introducing walled gardens through this.

Why?

Having said that, I think there are legitimate uses of EMSK
in the area of network access, such as various fast handover
proposals in EAP. My understanding is that HOKEY is working
on this. So perhaps one potential direction for resolving
your issues is to provide a much stricter IANA section and an
applicability note.

Sure based on technical merits not FUD.

I realize that this does not prevent people from grabbing
values. But I note that I know of one case at least where
this has already happened, even without an IETF
specification. Arguably the situation with a (sufficiently
tight) spec might be better, because we can use the spec to
explain what usage is inappropriate.

Why?

I realize we have RFC
3748 already, but since use of EMSK has been an IETF topic
for 5+ years, I think it would be reasonable to state what
the final rules are on taking specific keys out of the EMSK.

Sure based on technical merits and not FUD.

_______________________________________________
IETF mailing list
IETF(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf