[pcp] #62: Client-driven or server-driven auth retransmissions
"pcp issue tracker" <trac@tools.ietf.org> Fri, 19 October 2012 22:09 UTC
Return-Path: <trac@tools.ietf.org>
X-Original-To: pcp@ietfa.amsl.com
Delivered-To: pcp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D654521F8780 for <pcp@ietfa.amsl.com>; Fri, 19 Oct 2012 15:09:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xWImZZKrlL3g for <pcp@ietfa.amsl.com>; Fri, 19 Oct 2012 15:09:55 -0700 (PDT)
Received: from grenache.tools.ietf.org (grenache.tools.ietf.org [77.72.230.30]) by ietfa.amsl.com (Postfix) with ESMTP id F33D321F8778 for <pcp@ietf.org>; Fri, 19 Oct 2012 15:09:54 -0700 (PDT)
Received: from localhost ([127.0.0.1]:42102 helo=grenache.tools.ietf.org ident=www-data) by grenache.tools.ietf.org with esmtp (Exim 4.77) (envelope-from <trac@tools.ietf.org>) id 1TPKlA-00054R-Sa; Sat, 20 Oct 2012 00:09:40 +0200
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: pcp issue tracker <trac@tools.ietf.org>
X-Trac-Version: 0.12.2
Precedence: bulk
Auto-Submitted: auto-generated
X-Mailer: Trac 0.12.2, by Edgewall Software
To: draft-ietf-pcp-authentication@tools.ietf.org, alper.yegin@yegin.org
X-Trac-Project: pcp
Date: Fri, 19 Oct 2012 22:09:40 -0000
X-URL: http://tools.ietf.org/pcp/
X-Trac-Ticket-URL: http://trac.tools.ietf.org/wg/pcp/trac/ticket/62
Message-ID: <059.9cf5d7c12f5da883f5db53fb2786e69b@tools.ietf.org>
X-Trac-Ticket-ID: 62
X-SA-Exim-Connect-IP: 127.0.0.1
X-SA-Exim-Rcpt-To: draft-ietf-pcp-authentication@tools.ietf.org, alper.yegin@yegin.org, pcp@ietf.org
X-SA-Exim-Mail-From: trac@tools.ietf.org
X-SA-Exim-Scanned: No (on grenache.tools.ietf.org); SAEximRunCond expanded to false
Resent-To: hartmans@painless-security.com, mrw@painless-security.com, zhangdacheng@huawei.com
Resent-Message-Id: <20121019220954.F33D321F8778@ietfa.amsl.com>
Resent-Date: Fri, 19 Oct 2012 15:09:54 -0700
Resent-From: trac@tools.ietf.org
Cc: pcp@ietf.org
Subject: [pcp] #62: Client-driven or server-driven auth retransmissions
X-BeenThere: pcp@ietf.org
X-Mailman-Version: 2.1.12
List-Id: PCP wg discussion list <pcp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/pcp>, <mailto:pcp-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/pcp>
List-Post: <mailto:pcp@ietf.org>
List-Help: <mailto:pcp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/pcp>, <mailto:pcp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Oct 2012 22:09:56 -0000
#62: Client-driven or server-driven auth retransmissions Reported by Alper, Margaret, etc. PCP is currently a client-initiated request/response protocol with one-way notification. EAP is often server-driven retransmissions. This question centers around either having server-driven retransmissions or how to make EAP use client-driven retransmissions. Raw notes from Simon from October 2012 webex interim meeting: Slide 12: PANA Model - Requires server-initiated reauthentication. - Optionally to support liveness detection. - Tightly coupled. Alper: Retransmissions are driven by EAP. Not PANA's choice. Sam: No. You can design an EAP lower-layer where retransmissions are done by the client. Rafa Marin-Lopez: (did not understand) Sam: You can remove the reliability in EAP if we choose. Say PCP or PANA is responsible for retransmits. Rafa: You need retransmission. Sam: Yes but it can be done at either layer: EAP or elsewhere. Margaret: If we move it to the PCP layer, we can choose to do only client-initiated retransmission. Retransmissions don't need to be server-generated. Alper: You are reinventing ... (did not understand) Margaret: Send a description of how PANA can do only client-initiated retransmissions. -- ----------------------------+--------------------------------------------- Reporter: alper.yegin@… | Owner: draft-ietf-pcp-authentication@… Type: defect | Status: new Priority: major | Milestone: Component: authentication | Version: Severity: - | Keywords: ----------------------------+--------------------------------------------- Ticket URL: <http://trac.tools.ietf.org/wg/pcp/trac/ticket/62> pcp <http://tools.ietf.org/pcp/>
- [pcp] #62: Client-driven or server-driven auth re… pcp issue tracker
- Re: [pcp] #62: Client-driven or server-driven aut… Sam Hartman
- Re: [pcp] #62: Client-driven or server-driven aut… Yoshihiro Ohba
- Re: [pcp] #62: Client-driven or server-driven aut… Sam Hartman
- Re: [pcp] #62: Client-driven or server-driven aut… Simon Perreault
- Re: [pcp] #62: Client-driven or server-driven aut… Rafa Marin Lopez
- Re: [pcp] #62: Client-driven or server-driven aut… Alper Yegin
- Re: [pcp] #62: Client-driven or server-driven aut… Alper Yegin
- Re: [pcp] #62 (authentication): Client-driven or … pcp issue tracker