Re: [dix] Re: [Ietf-http-auth] More requirements

Jeff Hodges <Jeff.Hodges@neustar.biz> Fri, 14 July 2006 13:38 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1G1Nrq-00074u-SH; Fri, 14 Jul 2006 09:38:06 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1G1Nrp-0006t5-Ap for dix@ietf.org; Fri, 14 Jul 2006 09:38:05 -0400
Received: from willow.neustar.com ([209.173.53.84]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1G1Nrn-0005nY-3i for dix@ietf.org; Fri, 14 Jul 2006 09:38:05 -0400
Received: from [127.0.0.1] (stsc1260-corp-dns.va.neustar.com [209.173.53.65]) by willow.neustar.com (8.12.8/8.12.8) with ESMTP id k6EDU7QD015314; Fri, 14 Jul 2006 13:30:10 GMT
Message-ID: <44B79C5B.8070103@neustar.biz>
Date: Fri, 14 Jul 2006 06:30:03 -0700
From: Jeff Hodges <Jeff.Hodges@neustar.biz>
User-Agent: Thunderbird 1.5.0.4 (Windows/20060516)
MIME-Version: 1.0
To: Digital Identity Exchange <dix@ietf.org>
Subject: Re: [dix] Re: [Ietf-http-auth] More requirements
References: <1b587cab0607131743g36c96314ta9b3a0a90aa871e0@mail.google.com> <86wtag5r75.fsf@delta.rtfm.com> <Pine.LNX.4.64.0607140835550.31752@perf.cac.washington.edu>
In-Reply-To: <Pine.LNX.4.64.0607140835550.31752@perf.cac.washington.edu>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 856eb5f76e7a34990d1d457d8e8e5b7f
Cc: IETF HTTP Auth <ietf-http-auth@lists.osafoundation.org>
X-BeenThere: dix@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
Reply-To: Digital Identity Exchange <dix@ietf.org>
List-Id: Digital Identity Exchange <dix.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dix>, <mailto:dix-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/dix>
List-Post: <mailto:dix@ietf.org>
List-Help: <mailto:dix-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dix>, <mailto:dix-request@ietf.org?subject=subscribe>
Errors-To: dix-bounces@ietf.org

RL 'Bob' Morgan wrote:
 >
 > I think many of the requirements (no, haven't made a list yet) have the
 > assumption of "when appropriate", or "when desired", where "desired" is
 > some combination of what the user wants and what the application wants
 > or will permit.

Indeed, many of these are distinct "security properties". Note in the intro to 
his note, ekr termed the content of his note as:

   "a taxonomy of requirements/features and technical options"


JeffH





_______________________________________________
dix mailing list
dix@ietf.org
https://www1.ietf.org/mailman/listinfo/dix