> > I'm not aware, either.
> > In other uses of AAA (such as with WiFi, WiMAX, 3GPP2, etc.) I know
> that
> > the
> > subscriber ID is hidden from the NAS. There are even specific methods
> > deployed for that purpose. So, disclosing that ID would not be
> acceptable
> > there. I'm just not sure if the same privacy concerns apply to the
> VPN
> > deployments.
> 
>   It's not "hidden" it's just unavailable because there is no way to
> get it (see above) and, in the case of WiFi (and I suspect WiMAX) it's
> just a binary decision anyway.
> 
>   The notion that there could be some privacy concerns does not sound
> serious. You're going to give the NAS the power to impersonate the
> client,
> inspect all the client's packets, forge packets to and from the client,
> tamper with all the client's packets in an undetectable manner, yet for
> "privacy concerns" the NAS can't be told the real identity of the
> client?
> That's sort of like someone eating 4 chocolate cakes but washing it all
> down with a diet soda because of "weight concerns".

:-)

Mobile/wireless networks support roaming, and one operator's subscriber may
visit a NAS that belongs to another operator (or even a WiFi AP in a coffee
shop). Subscribers are concerned about location privacy, and they don't want
to leave a trace at every location they visit (which can get into the wrong
hands).
Secondly, the operators don't want their roaming partners to know the ID of
their subscribers (especially if it is also an email address), because that
can be used for switching (luring) customers. 

Alper



> 
>   regards,
> 
>   Dan.
> 
> 
> 



_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to