Subir Das wrote:
It would be nice if someone can explain what's wrong with the conclusion.
Also if it is a layer-2 authentication problem, I do not know whether it
fits in IETF.
If the DSLF wants an 802 based solution, this is certainly an IEEE problem. But DHCP would of course be IETF.

When we speak about layers in the conventional sense, we think of something that operates in a steady state on top of one another in a vertical stack. Authentication occurs during a setup phase, thus the point in time in which that operation occurs relative to other items becomes significant, bringing another dimension to the problem. If you can think of steady-state layers vertically, think of the authentication phase as horizontally, where time is as important as layer.

On the other hand,  DSLF requirements do not not seem to
indicate that it is a layer-2 auth problem.
I think that this is captured as part of the "TR-101 operational model" - I understand that is a lot to try and digest. But I think what Ric has been saying is important is that the point in time that IP packets can flow on the network from a given subscriber is significant to the security model in DSL.

- Mark

regards,
-Subir

Richard Pruss wrote:

In the spirit of analyzing the DSLF's Subscriber Authentication Requirements
as presented through a liaison letter on May 25, 2007, we discussed the
following material during IETF 70 PANA WG meeting.

http://www3.ietf.org/proceedings/07dec/slides/pana-3.ppt

We have reached consensus among the PANA WG members present in the room. In order to make this an official WG consensus, we are running this by the WG
via mailing list.

If you have any feedback, please send an e-mail on the mailing list by
December 11, 2007 Tuesday 6pm PT.
If there is no objection, IETF PANA WG will send a liaison letter to DSLF
based on this consensus.
- IETF PANA WG Chairs
I strongly disagree. PANA is not suitable to DSLForum requirements. Other protocols in the IETF and IEEE are far better candidates. Taking this work in the PANA WG is a totally wrong conclusion that somehow PANA is the correct framework for solving a layer 2 authentication problem!

Put you hammer back in the drawer, not every problem is a nail you need to hit with it.

- Ric

_______________________________________________
Pana mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/pana


_______________________________________________
Pana mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/pana

Reply via email to