Re: [Int-area] Call for adoption of draft-boucadair-intarea-host-identifier-scenarios-04

Ted Lemon <ted.lemon@nominum.com> Wed, 23 July 2014 13:01 UTC

Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEEFD1B2801 for <int-area@ietfa.amsl.com>; Wed, 23 Jul 2014 06:01:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IHE5vicU8IOJ for <int-area@ietfa.amsl.com>; Wed, 23 Jul 2014 06:01:02 -0700 (PDT)
Received: from shell-too.nominum.com (shell-too.nominum.com [64.89.228.229]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5BA2F1ABB20 for <int-area@ietf.org>; Wed, 23 Jul 2014 06:01:02 -0700 (PDT)
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id D89421B834C for <int-area@ietf.org>; Wed, 23 Jul 2014 06:00:46 -0700 (PDT)
Received: from webmail.nominum.com (cas-01.win.nominum.com [64.89.228.131]) (using TLSv1 with cipher RC4-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTP id 8F632190060; Wed, 23 Jul 2014 06:00:46 -0700 (PDT)
Received: from nat64.meeting.ietf.org (31.130.238.103) by CAS-01.WIN.NOMINUM.COM (192.168.1.100) with Microsoft SMTP Server (TLS) id 14.3.158.1; Wed, 23 Jul 2014 06:00:46 -0700
Content-Type: text/plain; charset="iso-8859-1"
MIME-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\))
From: Ted Lemon <ted.lemon@nominum.com>
In-Reply-To: <63BA73CC-B475-4AD7-9EC3-5D6716060A8D@netapp.com>
Date: Wed, 23 Jul 2014 09:00:43 -0400
Content-Transfer-Encoding: quoted-printable
Message-ID: <C97C631B-1C45-4157-84F3-F049061F51C4@nominum.com>
References: <CFC8AC41.41E79%alissa@cooperw.in> <E87B771635882B4BA20096B589152EF6287695E1@eusaamb107.ericsson.se> <787AE7BB302AE849A7480A190F8B93300396C7@OPEXCLILM23.corporate.adroot.infra.ftgroup> <63BA73CC-B475-4AD7-9EC3-5D6716060A8D@netapp.com>
To: "Eggert, Lars" <lars@netapp.com>
X-Mailer: Apple Mail (2.1878.6)
X-Originating-IP: [31.130.238.103]
Archived-At: http://mailarchive.ietf.org/arch/msg/int-area/56-Zfi3JJY_ONWE0kz_j1PWpT0E
Cc: Internet Area <int-area@ietf.org>
Subject: Re: [Int-area] Call for adoption of draft-boucadair-intarea-host-identifier-scenarios-04
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Jul 2014 13:01:05 -0000

On Jul 23, 2014, at 8:11 AM, Eggert, Lars <lars@netapp.com> wrote:
> I wanted to repeat my comment from the meeting. Given that at least in my read of RFC6967, there exist to sane mechanism to even exchange host IDs across the network, I don't really see why INTAREA should spend any more time on this space. 

Lars, the end user definitely has a trust relationship with the ISP from whom they purchase service.   Typically they have a password that works for authentication, but additionally it's common practice to use the fact that a device is connected over a particular circuit as proof that the person using the device is allowed to use the services the ISP provides.   So I am puzzled as to why this problem seems intractable to you.

As to which area ought to do this, that's obviously an open issue, since we don't even have a BoF yet.   This would certainly be a cross-area issue if the not-yet-existent working group finds that they cannot use existing technology to solve the problem.