Richard:

Yes, the slips obtained from the IETF registration desk and the network
help desk are anonymous.  You show your badge, and then you can pick one
or more slips from the container.  The people at the desk will not know
which registration ID you got.

We will use this same approach for IETF 78 and IETF 79.  However, I
reserve the right to make process improvements based on the lessons
learned at IETF 78.

Russ

On 7/1/2010 2:59 PM, Richard L. Barnes wrote:
> Russ,
> 
> Couple of quick questions:
> -- Are the anonymous IDs truly anonymous (show existence of badge [not
> necessarily name on badge] and get one) or are they tied to a user
> identity? -- Will users be allowed to request multiple anonymous IDs? --
> Will these policies be identical for both IETF 78 and IETF 79?
> 
> Thanks,
> --Richard
> 
> 
> On Jul 1, 2010, at 2:52 PM, Russ Housley wrote:
> 
>> Andrew:
>>
>>>> While it is new in IETF meetings, it is far from unusual in WiFi
>>>> networks to find some form of authentication. This happens at coffee
>>>> shops, college campuses, corporate campuses, and people's
>>>> apartments.
>>>
>>> I'd hate to think that the IETF is modelling its networks on dodgy
>>> semi-opaque NAT boxes with bad DNS habits and poor performance.
>>>
>>> That aside, I have some questions.  What are the plans for logging of
>>> the authentication requests, failures, and successes, and who could
>>> legally have access to those logs?  In particular, are the governments
>>> of the countries where the (respective) events are to be held able to
>>> require that the logs be turned over?  How long will the logs be kept,
>>> and by whom?  (Obviously, these are not new issues, but given the
>>> increased ability under this approach to associate a particular human
>>> with one or more MAC addresses, it would seem that the status of such
>>> logging might be more important.)
>>
>> No matter where a meeting is held, we are subject to the laws of that
>> location.  Nothing new there.
>>
>> The use of anonymous registration IDs is available to anyone that wants
>> to go that route.  Anyone concerned about the logs should use one.
>>
>> The NOC Team sees no value in the logs after the meeting is over.  The
>> logs will be discarded by the NOC Team at the end of the meeting.  Of
>> course, during the meting they might be very hepful in debugging and
>> such.
>>
>> Russ
>> _______________________________________________
>> Ietf mailing list
>> Ietf@ietf.org
>> https://www.ietf.org/mailman/listinfo/ietf
> 
> 
_______________________________________________
Ietf mailing list
Ietf@ietf.org
https://www.ietf.org/mailman/listinfo/ietf

Reply via email to