Re: Admission Control to the IETF 78 and IETF 79 Networks

"Richard L. Barnes" <rbarnes@bbn.com> Thu, 01 July 2010 18:59 UTC

Return-Path: <rbarnes@bbn.com>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0AD643A6A39 for <ietf@core3.amsl.com>; Thu, 1 Jul 2010 11:59:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.808
X-Spam-Level:
X-Spam-Status: No, score=-1.808 tagged_above=-999 required=5 tests=[AWL=0.791, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IKodlJV9fe5u for <ietf@core3.amsl.com>; Thu, 1 Jul 2010 11:59:23 -0700 (PDT)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by core3.amsl.com (Postfix) with ESMTP id E375B3A6A38 for <ietf@ietf.org>; Thu, 1 Jul 2010 11:59:22 -0700 (PDT)
Received: from [192.1.255.188] (port=53885 helo=col-dhcp-192-1-255-188.bbn.com) by smtp.bbn.com with esmtp (Exim 4.71 (FreeBSD)) (envelope-from <rbarnes@bbn.com>) id 1OUOz0-0001ZI-3r; Thu, 01 Jul 2010 14:59:34 -0400
Message-Id: <AA10E4A4-BEEF-4564-B454-D93A963AA12F@bbn.com>
From: "Richard L. Barnes" <rbarnes@bbn.com>
To: Russ Housley <housley@vigilsec.com>
In-Reply-To: <4C2CE406.7090600@vigilsec.com>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Subject: Re: Admission Control to the IETF 78 and IETF 79 Networks
Date: Thu, 01 Jul 2010 14:59:33 -0400
References: <CFB08C07-DE90-47BE-ADFF-FC72162BBFA1@daedelus.com> <4C2BBD51.2060605@ietf.org> <6.2.5.6.2.20100701070804.0c26b8a0@resistor.net> <6D6E25E2-057B-4591-9288-1283036D0374@cisco.com> <20100701154421.GB43159@shinkuro.com> <4C2CE406.7090600@vigilsec.com>
X-Mailer: Apple Mail (2.936)
Cc: ietf@ietf.org
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Jul 2010 18:59:24 -0000

Russ,

Couple of quick questions:
-- Are the anonymous IDs truly anonymous (show existence of badge [not  
necessarily name on badge] and get one) or are they tied to a user  
identity?  
-- Will users be allowed to request multiple anonymous IDs?  
-- Will these policies be identical for both IETF 78 and IETF 79?

Thanks,
--Richard


On Jul 1, 2010, at 2:52 PM, Russ Housley wrote:

> Andrew:
>
>>> While it is new in IETF meetings, it is far from unusual in WiFi
>>> networks to find some form of authentication. This happens at coffee
>>> shops, college campuses, corporate campuses, and people's
>>> apartments.
>>
>> I'd hate to think that the IETF is modelling its networks on dodgy
>> semi-opaque NAT boxes with bad DNS habits and poor performance.
>>
>> That aside, I have some questions.  What are the plans for logging of
>> the authentication requests, failures, and successes, and who could
>> legally have access to those logs?  In particular, are the  
>> governments
>> of the countries where the (respective) events are to be held able to
>> require that the logs be turned over?  How long will the logs be  
>> kept,
>> and by whom?  (Obviously, these are not new issues, but given the
>> increased ability under this approach to associate a particular human
>> with one or more MAC addresses, it would seem that the status of such
>> logging might be more important.)
>
> No matter where a meeting is held, we are subject to the laws of that
> location.  Nothing new there.
>
> The use of anonymous registration IDs is available to anyone that  
> wants
> to go that route.  Anyone concerned about the logs should use one.
>
> The NOC Team sees no value in the logs after the meeting is over.  The
> logs will be discarded by the NOC Team at the end of the meeting.  Of
> course, during the meting they might be very hepful in debugging and  
> such.
>
> Russ
> _______________________________________________
> Ietf mailing list
> Ietf@ietf.org
> https://www.ietf.org/mailman/listinfo/ietf