At the IETF in Chicago we had a hum as to the direction we should take
with the password based method.  I would like to clarify the choices and
determine working group consensus on the list.  The two directions are
given below please express you preference by 10/25.

Option 1 - Password based method - this option restricts the work item
to what is currently in the charter.  The resulting method would have a
new method ID and selecting this method would mean selecting a password
based exchange that meets the requirements we already set forth.  The
method may use an existing method as its base.  

Option 2 - Tunneling method - this option requires clarifying the
charter to work on a tunneling method which would then be used to meet
the password method requirements.  This would include making sure we
have a valid set of requirements to work with. The working group may
select an existing method as its base and have backwards compatibility
as a goal, however whether the method uses the same method ID and any
modifications to the method will be determined by working group and IETF
consensus.  

Thanks,

Joe


_______________________________________________
Emu mailing list
Emu@ietf.org
https://www1.ietf.org/mailman/listinfo/emu

Reply via email to