On Dec 4, 2012, at 10:20 AM, Scott Brim <[email protected]> wrote: > I don't know who "they" is but applications that want to be robust > across network changes have their own identity-related functions. They > have done their own loc/id split, for the identities that matter to them > (app/session level), and use it to sustain sessions. They don't care > about or need what this list is talking about.
Hi Scott, Doesn't that strike you as a layering violation? Shouldn't a stack shield applications from having to create these mechanisms? Regards, Tony _______________________________________________ rrg mailing list [email protected] http://www.irtf.org/mailman/listinfo/rrg
