[Nea] draft-khosravi-nea-requirements-01.txt

"Alper Yegin" <alper.yegin@yegin.org> Wed, 28 June 2006 07:00 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1FvU2F-0006ze-44; Wed, 28 Jun 2006 03:00:27 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1FvU2D-0006zZ-L7 for nea@ietf.org; Wed, 28 Jun 2006 03:00:25 -0400
Received: from mout.perfora.net ([217.160.230.40]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1FvU2C-0004ty-ED for nea@ietf.org; Wed, 28 Jun 2006 03:00:25 -0400
Received: from [68.126.193.27] (helo=IBM52A5038A94F) by mrelay.perfora.net (node=mrelayus1) with ESMTP (Nemesis), id 0MKp2t-1FvU2A1hlM-0003OI; Wed, 28 Jun 2006 03:00:23 -0400
From: Alper Yegin <alper.yegin@yegin.org>
To: nea@ietf.org
Date: Wed, 28 Jun 2006 00:00:20 -0700
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.5510
X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2900.2869
Thread-index: AcaaRMMzaFrW98QXRNCjXADGJhKVkgAOuSHQ
Message-ID: <0MKp2t-1FvU2A1hlM-0003OI@mrelay.perfora.net>
X-Provags-ID: perfora.net abuse@perfora.net login:abf7a4bb310ea4dfc9b6841113e2970f
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7d33c50f3756db14428398e2bdedd581
Subject: [Nea] draft-khosravi-nea-requirements-01.txt
X-BeenThere: nea@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Network Endpoint Assessment discussion list <nea.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/nea>, <mailto:nea-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/nea>
List-Post: <mailto:nea@ietf.org>
List-Help: <mailto:nea-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/nea>, <mailto:nea-request@ietf.org?subject=subscribe>
Errors-To: nea-bounces@ietf.org

Comment and questions on the EAP usage...

What is the current thinking of EAP within NEA? Is EAP always part of the
NEA architecture? If yes, is it only used during the network access
authentication? If not, what is the alternative to EAP?


	9. The PTT EAP Method MUST support transport PB with or without 
	   identity authentication, before or after identity authentication.

Is this like using an EAP method that does not really perform any
authentication?

	Examples of NRE are EAPOL, PPP, IPSec etc.

I think "IKEv2" is meant instead of "IPsec" above. Please add PANA to this
list. 

Alper



_______________________________________________
Nea mailing list
Nea@ietf.org
https://www1.ietf.org/mailman/listinfo/nea