On Dec 4, 2012, at 10:20 AM, Scott Brim <s...@internet2.edu> wrote:

> I don't know who "they" is but applications that want to be robust
> across network changes have their own identity-related functions.  They
> have done their own loc/id split, for the identities that matter to them
> (app/session level), and use it to sustain sessions.  They don't care
> about or need what this list is talking about.


Hi Scott,

Doesn't that strike you as a layering violation?  Shouldn't a stack shield 
applications from having to create these mechanisms?

Regards,
Tony

_______________________________________________
rrg mailing list
rrg@irtf.org
http://www.irtf.org/mailman/listinfo/rrg

Reply via email to