The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST)
draft-cam-winget-eap-fast-06
Yes
(Russ Housley)
No Objection
(Brian Carpenter)
(David Kessens)
(Lars Eggert)
(Magnus Westerlund)
(Ross Callon)
(Ted Hardie)
No Record
Note: This ballot was opened for revision 06 and is now closed.
Jari Arkko Former IESG member
(was Discuss)
Yes
Yes
(2007-01-25)
Unknown
> If an inner EAP method is run, then the Peer-Id is obtained from the > inner method. What if multiple inner methods are run? > EAP-FAST packets contain a three bit version field, following the TLS > Flags field, which All TLS data comes *after* the EAP-FAST version field. Did you mean "following the EAP-FAST Flags field"?
Russ Housley Former IESG member
Yes
Yes
()
Unknown
Brian Carpenter Former IESG member
No Objection
No Objection
()
Unknown
Dan Romascanu Former IESG member
No Objection
No Objection
(2007-01-22)
Unknown
There are a couple of places in this document where the vendor-ID is coded in three octets, although a four octets coding could have been used. Is there a reason for doing this? I would not be too much concerned because this should suffice for all practical reasons (8,288,608 enterprises - right now only 27825 codes are allocated) but maybe a note should indicate that we are placing a limitation and what are the reasons.
David Kessens Former IESG member
No Objection
No Objection
()
Unknown
Lars Eggert Former IESG member
No Objection
No Objection
()
Unknown
Magnus Westerlund Former IESG member
No Objection
No Objection
()
Unknown
Ross Callon Former IESG member
No Objection
No Objection
()
Unknown
Ted Hardie Former IESG member
No Objection
No Objection
()
Unknown
Cullen Jennings Former IESG member
No Record
No Record
(2007-01-24)
Unknown
Given what is in here and how it is used, I would prefer PS.