% need to be able to attach (perhaps multiple) credentials to packets,
% that stay with those packets end-to-end rather than having to do
% tunneling.  those credentials (sadly) may need to be based on both 
% user identity and current network location.  it should follow that 
% (c) IP addresses have nothing to do with authentication in such a 
% world - there will be too many cases where trust boundaries and IP 
% topology don't coincide, and trying to do VPN-like things for all 
% of the different things you want to authenticate to from the 
% same host will be too hairy.
% 
% Keith

Erp,
        "current network location" == IP address
        your model needs to be extended a bit.  I see
        three types of "things", where the node is,
        where applications are being housed, & who is 
        running them.  Credentials apply to all three.

--bill
        (thinking that renumbering the Internet every 
        20minutes is a desireable goal... again :)
        More work on supporting untethered nodes & nets
        is a good thing.  DynamicDNS & DHCP are a good
        first start.  "fixing" the transport protocols
        ... another kettle of fish ...

Reply via email to