Richard:
Yes, the slips obtained from the IETF registration desk and the network
help desk are anonymous. You show your badge, and then you can pick one
or more slips from the container. The people at the desk will not know
which registration ID you got.
We will use this same approach for IETF 78 and IETF 79. However, I
reserve the right to make process improvements based on the lessons
learned at IETF 78.
Russ
On 7/1/2010 2:59 PM, Richard L. Barnes wrote:
Russ,
Couple of quick questions:
-- Are the anonymous IDs truly anonymous (show existence of badge [not
necessarily name on badge] and get one) or are they tied to a user
identity? -- Will users be allowed to request multiple anonymous IDs? --
Will these policies be identical for both IETF 78 and IETF 79?
Thanks,
--Richard
On Jul 1, 2010, at 2:52 PM, Russ Housley wrote:
Andrew:
While it is new in IETF meetings, it is far from unusual in WiFi
networks to find some form of authentication. This happens at coffee
shops, college campuses, corporate campuses, and people's
apartments.
I'd hate to think that the IETF is modelling its networks on dodgy
semi-opaque NAT boxes with bad DNS habits and poor performance.
That aside, I have some questions. What are the plans for logging of
the authentication requests, failures, and successes, and who could
legally have access to those logs? In particular, are the governments
of the countries where the (respective) events are to be held able to
require that the logs be turned over? How long will the logs be kept,
and by whom? (Obviously, these are not new issues, but given the
increased ability under this approach to associate a particular human
with one or more MAC addresses, it would seem that the status of such
logging might be more important.)
No matter where a meeting is held, we are subject to the laws of that
location. Nothing new there.
The use of anonymous registration IDs is available to anyone that wants
to go that route. Anyone concerned about the logs should use one.
The NOC Team sees no value in the logs after the meeting is over. The
logs will be discarded by the NOC Team at the end of the meeting. Of
course, during the meting they might be very hepful in debugging and
such.
Russ
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www.ietf.org/mailman/listinfo/ietf