On Dec 4, 2012, at 10:20 AM, Scott Brim <s...@internet2.edu> wrote: > I don't know who "they" is but applications that want to be robust > across network changes have their own identity-related functions. They > have done their own loc/id split, for the identities that matter to them > (app/session level), and use it to sustain sessions. They don't care > about or need what this list is talking about.
Hi Scott, Doesn't that strike you as a layering violation? Shouldn't a stack shield applications from having to create these mechanisms? Regards, Tony _______________________________________________ rrg mailing list rrg@irtf.org http://www.irtf.org/mailman/listinfo/rrg