Hello, > Would there be value to deploy this at IETF meeting networks?
There was a very long and for me depessing thread on this question; once on attendees of a meeting where I reached out to get 1X security done; once on [email protected] (thread starting 27 April 2014 "Security for the IETF wireless network"). It seems like the use case at IETF meetings is so different from normal corporate use that attendees don't see significant enough value in security the 1X network properly. The story goes like this... Since the network uses username+password =="ietf/ietf" there is no risk to leak personal credentials. So there is no need to authenticate the network to the user. My argument that users could fall into a rogue 1X evil clone if they don't get provisioned proper security settings was waved away with statements such as that nobody should trust the network anyway, and that the situation is no different on the open ietf network. Needless to say that I was extremely unhappy with that way of thinking, but at some point I gave up (I considered to set up an evil twin myself, but don't want to be overly nasty). It's like... everybody should eat our dogfood, except ourselves. :-( Stefan -- Stefan WINTER Ingenieur de Recherche Fondation RESTENA - Réseau Téléinformatique de l'Education Nationale et de la Recherche 6, rue Richard Coudenhove-Kalergi L-1359 Luxembourg Tel: +352 424409 1 Fax: +352 422473 PGP key updated to 4096 Bit RSA - I will encrypt all mails if the recipient's key is known to me http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xC0DE6A358A39DC66
0x8A39DC66.asc
Description: application/pgp-keys
signature.asc
Description: OpenPGP digital signature
_______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
