[Nea] draft-khosravi-nea-requirements-01.txt
"Alper Yegin" <alper.yegin@yegin.org> Wed, 28 June 2006 07:00 UTC
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1FvU2F-0006ze-44; Wed, 28 Jun 2006 03:00:27 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FvU2D-0006zZ-L7 for nea@ietf.org; Wed, 28 Jun 2006 03:00:25 -0400
Received: from mout.perfora.net ([217.160.230.40]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FvU2C-0004ty-ED for nea@ietf.org; Wed, 28 Jun 2006 03:00:25 -0400
Received: from [68.126.193.27] (helo=IBM52A5038A94F) by mrelay.perfora.net (node=mrelayus1) with ESMTP (Nemesis), id 0MKp2t-1FvU2A1hlM-0003OI; Wed, 28 Jun 2006 03:00:23 -0400
From: Alper Yegin <alper.yegin@yegin.org>
To: nea@ietf.org
Date: Wed, 28 Jun 2006 00:00:20 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.2869
Thread-index: AcaaRMMzaFrW98QXRNCjXADGJhKVkgAOuSHQ
Message-ID: <0MKp2t-1FvU2A1hlM-0003OI@mrelay.perfora.net>
X-Provags-ID: perfora.net abuse@perfora.net login:abf7a4bb310ea4dfc9b6841113e2970f
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7d33c50f3756db14428398e2bdedd581
Subject: [Nea] draft-khosravi-nea-requirements-01.txt
X-BeenThere: nea@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Network Endpoint Assessment discussion list <nea.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/nea>, <mailto:nea-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/nea>
List-Post: <mailto:nea@ietf.org>
List-Help: <mailto:nea-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/nea>, <mailto:nea-request@ietf.org?subject=subscribe>
Errors-To: nea-bounces@ietf.org
Comment and questions on the EAP usage... What is the current thinking of EAP within NEA? Is EAP always part of the NEA architecture? If yes, is it only used during the network access authentication? If not, what is the alternative to EAP? 9. The PTT EAP Method MUST support transport PB with or without identity authentication, before or after identity authentication. Is this like using an EAP method that does not really perform any authentication? Examples of NRE are EAPOL, PPP, IPSec etc. I think "IKEv2" is meant instead of "IPsec" above. Please add PANA to this list. Alper _______________________________________________ Nea mailing list Nea@ietf.org https://www1.ietf.org/mailman/listinfo/nea
- [Nea] FW: draft-khosravi-nea-requirements-01.txt Khosravi, Hormuzd M
- [Nea] draft-khosravi-nea-requirements-01.txt Alper Yegin