Heikki Vatiainen <[email protected]> wrote: > If there's time, I'd be interested to see your presentation.
> In case a look at the existing related functionality is useful, here
> are again links to wpa_supplicant repository that show commits of:
Okay, I've noted these things, and I'll see if I can do a slide or two on
comparisons, synergies, etc.
> It looks to me your draft is focused on what happens just before and
> immediately after when network connectivity has been achieved with, the
> methods 1 or 2 above. I'd say my questions are:
...
> - How does your draft relate to the two methods and implementations
> above? Does it simply use them to get connected?
I think, the opposite, or maybe it's a competitor.
> - If not related,
> does your draft define a new mutually unauthenticated version of
> EAP-TLS?
I'm not sure I'd call it mutually unathenticated.
The question of if/how the server's certificate is validated is still open.
> - Do all these need to be synchronisation to avoid too many
> documents?
> Looking forward to your presentation, Heikki
--
] Never tell me the odds! | ipv6 mesh networks [
] Michael Richardson, Sandelman Software Works | IoT architect [
] [email protected] http://www.sandelman.ca/ | ruby on rails [
signature.asc
Description: PGP signature
_______________________________________________ Emu mailing list -- [email protected] To unsubscribe send an email to [email protected]
