Probably nothing can be perfect when defining affiliation, but I
think some definition can help reducing hidden conflict of interests.
Here is an example in other standards body:
http://standards.ieee.org/faqs/affiliation.html
Yoshihiro Ohba
(2012/08/02 14:37), Samuel Weiler wrote:
On Thu, 2
What is the exact definition of affiliation in IETF?
If a consultant who runs his/her own consulting company X is paid by
his/her customer company Y for his/her IETF activities including
NOMCOM activity, then what is his/her affiliation?
Yoshihiro Ohba
(2012/08/02 11:13), Patrik Fältström
works. Even when IPsec is used between a PRE and a PAA, I think
DHCP-ed address for IP2b works as long as IKEv2 identity for the PRE
is not based on IP address.
Kind Regards,
Yoshihiro Ohba
Regards,
--
Yoshifumi Nishida
nish...@sfc.wide.ad.jp
Hi Pasi,
Thanks for your response.
On Tue, Mar 25, 2008 at 10:04:00AM +0200, [EMAIL PROTECTED] wrote:
Yoshihiro Ohba wrote:
I think Vidya has a good point.
My opinion is that, bootstrapping protocols from long-term
credentials used for network access authentication is not such a bad
this situation.
Yoshihiro Ohba
On Wed, Mar 19, 2008 at 09:45:47AM -0700, Dan Harkins wrote:
Hello,
My apologies for being obtuse. This Mother of All Root Keys I've been
describing is what the EMSK Key Hierarchy calls the DSRK.
The HOKEY key that the ERP/ERX draft uses can
-panel-YoshiroOhba.pdf
Yoshihiro Ohba
On Mon, Mar 17, 2008 at 09:39:04PM -0700, Narayanan, Vidya wrote:
-Original Message-
From: Lakshminath Dondeti [mailto:[EMAIL PROTECTED]
Sent: Monday, March 17, 2008 7:58 PM
To: Harald Tveit Alvestrand
Cc: Narayanan, Vidya; ietf@ietf.org
requests, I would
expect significant modifications to EAP state machines described in
RFC 4137, and such modifications should be described in ERP document.
Yoshihiro Ohba
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
attention to re-auth DoS attack issue during WG-level
review, not to lock-step issue.)
Best Regards,
Yoshihiro Ohba
On Thu, Jan 31, 2008 at 08:09:54AM -0800, Lakshminath Dondeti wrote:
On 1/31/2008 6:23 AM, Yoshihiro Ohba wrote:
On Wed, Jan 30, 2008 at 10:53:25PM -0800, Lakshminath Dondeti wrote
the requirement itself.
Yoshihiro Ohba
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
,
Yoshihiro Ohba
Regards,
Vidya
-Original Message-
From: Lakshminath Dondeti [mailto:[EMAIL PROTECTED]
Sent: Saturday, February 17, 2007 9:36 AM
To: Sam Hartman
Cc: Narayanan, Vidya; [EMAIL PROTECTED]; Dan Harkins;
ietf@ietf.org
Subject: Re: comments on draft-houseley
an additional
functionality to run parallel EAP conversations, which is not a
required functionality for EAP lower layer.
- From protocol layering point of view, GEE is part of EAP lower layer
in terms of RFC 3748.
Hope this helps,
Yoshihiro Ohba
On Thu, Jan 04, 2007 at 06:15:40PM -0800, Lakshminath Dondeti
Let me forward my response with reducing quotes since it got bounced.
- Forwarded message from Yoshihiro Ohba [EMAIL PROTECTED] -
From: Yoshihiro Ohba [EMAIL PROTECTED]
Subject: Re: IETF last call on draft-barany-eap-gee-04.txt
To: Joseph Salowey (jsalowey) [EMAIL PROTECTED]
Cc
if the lower layer of GEE
negotiates the use of GEE between the peer and authenticator.
Yoshihiro Ohba
Also, this is
not quite the same as pre-authentication, since GEE is to allow multiple
authentications for different purposes (e.g., device and user; specific
types of accesses, say, IPv4 and IPv6, etc
that ideally 3GPP2 should take the
ownership of the GEE format and its processing rule within their
specification unless there is a particular situation that prevents
3GPP2 from doing that.
Regards,
Yoshihiro Ohba
On Wed, Dec 27, 2006 at 03:37:03PM +0200, Jari Arkko wrote:
Yoshihiro,
If we agree
to
distinguish multiple parallel EAP conversations (we are not talking
about multiple types of conversations, but instead multiple
conversations).
The draft clearly talks about multiple types of authentications.
Yoshihiro Ohba
___
Ietf mailing list
Ietf
EAP conversations
between peer and authenticator.
Yoshihiro Ohba
Next, where as it is true that pre-authentication does allow multiple
EAP conversations to occur in parallel, it is important to note that
pre-authentication merely solves a subset of the problems. In fact
- Forwarded message from Yoshihiro Ohba [EMAIL PROTECTED] -
From: Yoshihiro Ohba [EMAIL PROTECTED]
Subject: Re: [eap] Please review -- IETF Last Call ondraft-barany-eap-gee-04.txt
To: Bernard Aboba [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED], eap@frascone.com
User-Agent: Mutt/1.5.13 (2006-08
which
involve use of AAA for derivation or transport of keying material. In the
case of EAP, that would include EAP methods, AAA protocols as well as the
SAP.
Does 'AAA key management' protocol also include EAP lower layer
protocols such as 802.1X, PANA and IKEv2?
Yoshihiro Ohba
1. I do
Hi Joel,
Reading the entire thread, I think we should seriously consider your
detailed suggestions to improve the PANA framework draft for broader
acceptance in the community.
Thank you,
Yoshihiro Ohba
On Tue, May 30, 2006 at 09:42:25AM -0400, Joel M. Halpern wrote:
I think the confusion
on the discussion.
Yoshihiro Ohba
Yours,
Joel M. Halpern
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org
Vidya,
Administratively scoped multicast is not the only way for PAA
discovery. DHCP based PAA discovery is also available:
draft-ietf-dhc-paa-option-02.txt
Regards,
Yoshihiro Ohba
On Fri, May 26, 2006 at 04:34:22PM -0700, Narayanan, Vidya wrote:
Hi Jari,
Hi Vidya,
Re 1: I do
but
not IPsec SA (e.g., DSL), EAP over IKEv2 is too much.
Hope this helps,
Yoshihiro Ohba
On Fri, May 26, 2006 at 12:00:31PM -0700, Narayanan, Vidya wrote:
Hi Jari,
Hi Lakshminath,
I guess there are differences in our understanding of 3G-WLAN
interworking (and I could be wrong
protocol for
bootstrapping IPsec to protect NACP, perhaps EAP over IKEv2??
I have other security-related issues on NACP. My view is that secure
enhancement of NACP will be equivalent to the EAP over UDP protocol
the IETF is standardizing, PANA.
Yoshihiro Ohba
So from what I can tell, in each
to be the
right thing.
Yoshihiro Ohba
___
Ietf mailing list
Ietf@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf
has been already clarified by David Nelson.
TGi voted to accept the text proposed for the intent. So I don't
expect the intent to be changed through the interpretation request
procedure, while I expect the intent to be more clarified in the
procedure.
Best regards,
Yoshihiro Ohba
On Thu, Apr 06
802.1X frame exchanged over Uncontrolled Port without any
exception, I'd suggest removing the above text in clause 5.4.2.2 from
802.11i specification.
Best regards,
Yoshihiro Ohba
On Mon, Mar 20, 2006 at 08:17:22PM -0500, Russ Housley wrote:
Yesterday I had a discussion with Bernard Aboba about
of the implementation in Open Diameter project.
Regards,
Yoshihiro Ohba
On Tue, Mar 21, 2006 at 11:45:25AM -0500, Sam Hartman wrote:
Yoshihiro == Yoshihiro Ohba [EMAIL PROTECTED] writes:
e email discussion over
Yoshihiro the EAP mailing list quoted below, I had a short
Yoshihiro conversation
Information on the other part of the HOAKEY BOF, PREAUTH, is given
below.
PREAUTH chairs:
Yoshihiro Ohba ([EMAIL PROTECTED])
Alper yegin ([EMAIL PROTECTED])
PREAUTH charter:
http://www.opendiameter.org/pipermail/preauth/2006-February/57.html
PREAUTH Mailing list:
http
28 matches
Mail list logo