Re: [MEXT] Well-known problem with authentication/etc. in wireless networks

Alper Yegin <alper.yegin@yegin.org> Thu, 25 August 2011 08:47 UTC

Return-Path: <alper.yegin@yegin.org>
X-Original-To: mext@ietfa.amsl.com
Delivered-To: mext@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B9BCE21F8AF2 for <mext@ietfa.amsl.com>; Thu, 25 Aug 2011 01:47:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.598
X-Spam-Level:
X-Spam-Status: No, score=-102.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wewNWbTkT0UJ for <mext@ietfa.amsl.com>; Thu, 25 Aug 2011 01:47:52 -0700 (PDT)
Received: from mout.perfora.net (mout.perfora.net [74.208.4.195]) by ietfa.amsl.com (Postfix) with ESMTP id 2A3C721F8AF0 for <mext@ietf.org>; Thu, 25 Aug 2011 01:47:52 -0700 (PDT)
Received: from [172.20.10.3] ([46.154.95.149]) by mrelay.perfora.net (node=mrus0) with ESMTP (Nemesis) id 0MA7tp-1R7oHN0aZV-00Baki; Thu, 25 Aug 2011 04:49:03 -0400
Mime-Version: 1.0 (Apple Message framework v1244.3)
Content-Type: multipart/alternative; boundary="Apple-Mail=_03A3F744-1A26-4D9E-BD7E-2E98DB9378C2"
From: Alper Yegin <alper.yegin@yegin.org>
In-Reply-To: <4E554BAA.9080409@computer.org>
Date: Thu, 25 Aug 2011 11:48:58 +0300
Message-Id: <82040B86-84C1-4CDD-B739-AC4D91865744@yegin.org>
References: <4E554BAA.9080409@computer.org>
To: charliep@computer.org
X-Mailer: Apple Mail (2.1244.3)
X-Provags-ID: V02:K0:WKZFZk/owQDd3LjwwGbm9oDU8+APDOBQURd0ZaK/XcP K2O9AXLdHSdaVLVVYV7mnUiCfj1woqm87La3xz4Ng3uwGzQrnj jTNygr+5f/8tkCtojV+LfS51DASiA9ejLDlWdKa5OrdRc4Q1hr LxDg+21VQFX5fnhs2GntUvWMYpgefFXtjLqhua1fg9lcwX64y9 H/ur0P8WlwcZbQknH6THs/PQ0GpYqQpL0+EWeYf2nQ=
Cc: mext <mext@ietf.org>
Subject: Re: [MEXT] Well-known problem with authentication/etc. in wireless networks
X-BeenThere: mext@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Mobile IPv6 EXTensions WG <mext.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mext>, <mailto:mext-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/mext>
List-Post: <mailto:mext@ietf.org>
List-Help: <mailto:mext-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mext>, <mailto:mext-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Aug 2011 08:47:52 -0000

Hi Charlie,

On Aug 24, 2011, at 10:06 PM, Charles E. Perkins wrote:

> If the Home Agent were recognized as a robust security
> appliance, then it could naturally sit on the network
> boundary as an IP-addressable device.  Mobile IP
> authentication could become the primary means of
> validating user access, instead of an afterthought
> to enable IP-address preservation after all the heavy
> lifting has been done a lower levels.

Do you mean using Mobile IP protocol for (local area) network access authentication? Or, something else?

Alper