One of the confusions from the meeting was "How can a device authenticate via
802.1X if it doesn't trust the network?"
I think the confusion is due to terminology. The discussion in the meeting,
and in the draft was about the device "authenticating" to the network during
initial bootstrapp
Hi Ekr,
Thanks for the opportunity!
As someone who has implemented and deployed EAP methods as well as
someone who is genuinely interested in this area, I look forward to
working with all of you.
However, I am till taking baby steps in this new role and I appreciate
your honest feedback on-
Dear Doctor Pala,
As the Tao of the IETF states
(https://www.ietf.org/about/participate/tao/): "IETF is made up of
volunteers" and "IETF makes voluntary standards".
So both you and I work for free.
That being said, I am excited about this additional responsibility and I
am eager to work wit