On Feb 15, 2022, at 1:08 PM, Deb Cooley wrote:
>
> Is there a plan to continue work on this draft (I think it has expired)? I
> skimmed through it a while ago, had thoughts/comments, but have resisted the
> urge to provide them (why work on something that is OBE?).
I plan to keep working
Is there a plan to continue work on this draft (I think it has expired)? I
skimmed through it a while ago, had thoughts/comments, but have resisted
the urge to provide them (why work on something that is OBE?).
It is longish, but it is not a difficult read.
Deb Cooley
deco...@nsa.gov
On Fri, Fe
On Feb 11, 2022, at 6:04 AM, John Mattsson wrote:
> I think it would be very good if IETF/EMU could agree on simpler, more
> automatic, and secure deployment and configuration of TLS-based EAP methods.
> This is severely needed. Both complexity and security are very real problems.
>
> https://
: [Emu] Version Notification for draft-dekok-emu-eap-usability-00.txt
On Jul 16, 2021, at 6:26 AM, Carolin Baumgartner
wrote:
>> Provided there's some network connection available, everything else can be
>> automatic.
> ah yes. I guess it might make sense to make that clear t
On Jul 16, 2021, at 6:26 AM, Carolin Baumgartner
wrote:
>> Provided there's some network connection available, everything else can be
>> automatic.
> ah yes. I guess it might make sense to make that clear towards the beginning
> of the document :-) I only got a later
I'll definitely f
General comment: EAP configuration and implementation is certainly one issue,
but the whole certificate stuff is terrible from a user's point of view. We
could try to solve it in this draft, but it certainly touches a lot of topics.
The goal of the draft is to leverage the web root, in o
On Jul 15, 2021, at 10:24 AM, Carolin Baumgartner
wrote:
>
> Section 3.1, first bullet point on automation: I would mention "zero touch".
> That should be the goal from a user's perspective.
Sure.
> Section 3.1, fifth (sixth) bullet point on mutual exchange of identities: How
> is that sup
Hi Alan
some first thoughts
Section 3.1, first bullet point on automation: I would mention "zero
touch". That should be the goal from a user's perspective.
Section 3.1, fifth (sixth) bullet point on mutual exchange of
identities: How is that supposed to work? Don't get me wrong, I
understan
I've submitted an "EAP usability" document. The title could perhaps be
better.
It gives guidelines, requirements, and practices for making it easier to use
TLS-based EAP methods.
I've asked the chairs for time at the next IETF to discuss this. Until then,
any feedback / comments are we