Hi, Alan:
- Original Message -
From: "Alan DeKok"
To: "Joseph Salowey (jsalowey)"
Cc:
Sent: Friday, August 14, 2009 2:16 PM
Subject: Re: [Emu] EAP and authorization
> Joseph Salowey (jsalowey) wrote:
>> There are other ways in which EAP has proposed authorization
>> enhancements. Oth
> There have been a lot of proposals about EAP and authorization in the
> past. At its very basis EAP performs authentication at the time of
> service access and the data resulting from the authentication can then
> be used for authorization and accounting purposes.
[Qin]: So the data resulting
It seems to me, the consistency between EAP peer and EAP Server can be caused
by the Lying NAS
Even this NAS is not malicious authenticator who impersonates another
authenticator, this NAS should
be a stupid NAS or malfunctional NAS who make a mistake for some reason.
Because this NAS distribu
Q1:Yes
Q2: I support using EAP-Team since it more fits for requrements defined in
I-D.ietf-emu-eaptunnel-req.
- Original Message -
From: "Alan DeKok"
To:
Sent: Wednesday, March 30, 2011 2:29 PM
Subject: [Emu] Consensus call on EAP Tunneled method
> For people who didn't attend the E