On Sat, 29 Nov 2008, Mark Andrews wrote:

> > It's worse. Before you can start validating on your own, or use some
> > trusted remote TSIG accessable resolver, you are likely to need
> > to accept some spoofs to get past the hotspot authentication.
> 
>       Which is something the IETF should be providing / promoting
>       a standard alternative for.  At present normal protocol
>       operations are being hijacked to do this.
> 
>       Browsers could then have a "HOTSPOT" button which just looked
>       up this information, for example.

I'd be very interested in trying to come up with something for this
within the IETF to standarize hotspot cooperation.

Paul
_______________________________________________
Ietf mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf

Reply via email to