Me too. I like to see a standard based tunneling method, that supports crypto-binding, crypto-agility, internationalization, as well as a standard framework for extension within the tunnel.
> -----Original Message----- > From: Ryan Hurst [mailto:[EMAIL PROTECTED] > Sent: Wednesday, October 03, 2007 7:16 PM > To: Ray Bell; Stephen Hanna; Joseph Salowey (jsalowey); emu@ietf.org > Subject: RE: [Emu] Moving forward with the EMU password method > > I also favor #2, I like Steve have found customers reluctant > to deploy new methods if we can satisfy the goals with a > method that's broadly deployed (with some tweaks) I think we > will have more success than if we define a new one. > > -----Original Message----- > From: Ray Bell [mailto:[EMAIL PROTECTED] > Sent: Wednesday, October 03, 2007 3:26 PM > To: 'Stephen Hanna'; 'Joseph Salowey (jsalowey)'; emu@ietf.org > Subject: RE: [Emu] Moving forward with the EMU password method > > I favor option 2 as well > > Ray > > > -----Original Message----- > From: Stephen Hanna [mailto:[EMAIL PROTECTED] > Sent: Wednesday, October 03, 2007 12:55 PM > To: Joseph Salowey (jsalowey); emu@ietf.org > Subject: RE: [Emu] Moving forward with the EMU password method > > I favor option 2. > > There are tunneling EAP methods already in widespread use > that can meet the requirements with a few extensions (e.g. > EAP-TTLSv0 with the extensions documented in > draft-hanna-eap-ttls-agility-00.txt). Customers are > understandably reluctant to deploy new EAP methods so it's > much more likely that they will use the results of our work > if we use an existing EAP method instead of defining a new method. > > Thanks, > > Steve > > -----Original Message----- > From: Joseph Salowey (jsalowey) [mailto:[EMAIL PROTECTED] > Sent: Wednesday, October 03, 2007 11:03 AM > To: emu@ietf.org > Subject: [Emu] Moving forward with the EMU password method > > At the IETF in Chicago we had a hum as to the direction we > should take with the password based method. I would like to > clarify the choices and determine working group consensus on > the list. The two directions are given below please express > you preference by 10/25. > > Option 1 - Password based method - this option restricts the > work item to what is currently in the charter. The resulting > method would have a new method ID and selecting this method > would mean selecting a password based exchange that meets the > requirements we already set forth. The method may use an > existing method as its base. > > Option 2 - Tunneling method - this option requires clarifying > the charter to work on a tunneling method which would then be > used to meet the password method requirements. This would > include making sure we have a valid set of requirements to > work with. The working group may select an existing method as > its base and have backwards compatibility as a goal, however > whether the method uses the same method ID and any > modifications to the method will be determined by working > group and IETF consensus. > > Thanks, > > Joe > > > _______________________________________________ > Emu mailing list > Emu@ietf.org > https://www1.ietf.org/mailman/listinfo/emu > > > _______________________________________________ > Emu mailing list > Emu@ietf.org > https://www1.ietf.org/mailman/listinfo/emu > > > > > > _______________________________________________ > Emu mailing list > Emu@ietf.org > https://www1.ietf.org/mailman/listinfo/emu > > > _______________________________________________ > Emu mailing list > Emu@ietf.org > https://www1.ietf.org/mailman/listinfo/emu > _______________________________________________ Emu mailing list Emu@ietf.org https://www1.ietf.org/mailman/listinfo/emu