Re: Admission Control to the IETF 78 and IETF 79 Networks

Andrew Sullivan <ajs@shinkuro.com> Thu, 01 July 2010 15:44 UTC

Return-Path: <ajs@shinkuro.com>
X-Original-To: ietf@core3.amsl.com
Delivered-To: ietf@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 740F63A69BF for <ietf@core3.amsl.com>; Thu, 1 Jul 2010 08:44:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.868
X-Spam-Level:
X-Spam-Status: No, score=0.868 tagged_above=-999 required=5 tests=[AWL=0.867, BAYES_50=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lCy-z532iE9k for <ietf@core3.amsl.com>; Thu, 1 Jul 2010 08:44:22 -0700 (PDT)
Received: from mail.yitter.info (mail.yitter.info [208.86.224.201]) by core3.amsl.com (Postfix) with ESMTP id 6BCA03A6895 for <ietf@ietf.org>; Thu, 1 Jul 2010 08:44:12 -0700 (PDT)
Received: from crankycanuck.ca (69-196-144-230.dsl.teksavvy.com [69.196.144.230]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.yitter.info (Postfix) with ESMTPSA id 11B5D1ECB41D for <ietf@ietf.org>; Thu, 1 Jul 2010 15:44:23 +0000 (UTC)
Date: Thu, 01 Jul 2010 11:44:21 -0400
From: Andrew Sullivan <ajs@shinkuro.com>
To: ietf@ietf.org
Subject: Re: Admission Control to the IETF 78 and IETF 79 Networks
Message-ID: <20100701154421.GB43159@shinkuro.com>
References: <CFB08C07-DE90-47BE-ADFF-FC72162BBFA1@daedelus.com> <4C2BBD51.2060605@ietf.org> <6.2.5.6.2.20100701070804.0c26b8a0@resistor.net> <6D6E25E2-057B-4591-9288-1283036D0374@cisco.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <6D6E25E2-057B-4591-9288-1283036D0374@cisco.com>
User-Agent: Mutt/1.5.18 (2008-05-17)
X-BeenThere: ietf@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF-Discussion <ietf.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf>
List-Post: <mailto:ietf@ietf.org>
List-Help: <mailto:ietf-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf>, <mailto:ietf-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Jul 2010 15:44:23 -0000

On Thu, Jul 01, 2010 at 08:26:35AM -0700, Fred Baker wrote:

> While it is new in IETF meetings, it is far from unusual in WiFi
> networks to find some form of authentication. This happens at coffee
> shops, college campuses, corporate campuses, and people's
> apartments. 

I'd hate to think that the IETF is modelling its networks on dodgy
semi-opaque NAT boxes with bad DNS habits and poor performance.  

That aside, I have some questions.  What are the plans for logging of
the authentication requests, failures, and successes, and who could
legally have access to those logs?  In particular, are the governments
of the countries where the (respective) events are to be held able to
require that the logs be turned over?  How long will the logs be kept,
and by whom?  (Obviously, these are not new issues, but given the
increased ability under this approach to associate a particular human
with one or more MAC addresses, it would seem that the status of such
logging might be more important.)

A

-- 
Andrew Sullivan
ajs@shinkuro.com
Shinkuro, Inc.