[16:09:57] katrin joins the room [16:39:30] terrywang joins the room [16:39:41] terrywang leaves the room [17:38:23] anybody here? [17:38:26] ꈲ joins the room [17:39:48] polk.tim joins the room [17:40:54] yohba727 joins the room [17:40:56] h-suzuki joins the room [17:41:22] Tom Taylor started HOKEY architecture presentation. [17:41:56] The work assumes inter-domain handover. [17:42:12] Functions to be supported. [17:42:39] HOKEY auth service supports three services. [17:42:58] EAP early auth, EAP re-auth, and EAP early re-auth. [17:43:47] Peer discovery for auhenticator, authentication service and local domain name. [17:44:40] And key management function supporting key derivation & dist. [17:44:50] Also local ER server authz. [17:45:30] Presentation is http://www.ietf.org/proceedings/10mar/slides/hokey-2.ppt [17:45:34] slide 4. [17:47:02] Glen suggest removing the term authenticator. [17:47:15] Slide 5. [17:49:37] Question about IP-based protocol between candidate and serving authenticators. [17:51:18] Tom mentioned it could be defined in other SDO. [17:52:47] PANA is a candidate for the first case. [17:53:29] Glen said it could be GSM based as well. [17:54:25] Tom: one possibie protocol betwen s-auth and c-auth is Diameter or maybe PANA. [17:54:51] In the thiird case, protoocl bewteen s-auth and EAP server can be Diameter. [17:54:59] Slide 6. [17:55:48] Slide 7. [17:57:29] Slide 8. [17:58:07] Slide 9. [18:00:01] Glen: This question is really relevant for the architecture. [18:01:19] Glen: need to describe what needs to be used for underlying technologies. [18:01:55] Tom: Implication is for interoperability, we have to discover which one needs to be supported. [18:02:51] Tom: There is distinct difference among three models. That is architectural conclusion. [18:03:02] Geln: Needs to discuss over the mailing list. [18:03:14] s/Geln/Glen/. [18:04:06] Lionel: Choose only one? Or one or two? [18:05:38] Qin: the first one is different from the other twos. [18:06:01] Tom: Major concern in interoperability problem among the models. [18:06:39] ꈲ leaves the room [18:07:02] Glen: Inter-domain is historycally broken in hokey wg. [18:07:37] Glen: It's a problem of deployment not a problem of architecture. [18:07:51] Tom: I see that it's a valid stance. [18:08:30] Lionel: Difference depends on what s-auth does. [18:09:31] Lionel: I am not sure we need to define a specific solution for each of the three models. [18:10:24] Lionel: From architectural point of view, they are guidelines more or less. [18:10:42] Slide 10. [18:11:50] Glen: A couple of problem in this diagram. [18:12:22] Some part of the signaling does not have to be AAA. [18:13:58] Glen: Howe AAA server and EAP server talks does not have to be defined. It can be proprietary protocol. [18:14:36] polk.tim55416 joins the room [18:14:36] polk.tim55416 leaves the room [18:14:36] polk.tim34745 joins the room [18:14:36] polk.tim34745 leaves the room [18:14:36] polk.tim28371 joins the room [18:14:52] polk.tim leaves the room [18:15:17] Slide 11. [18:15:47] Sebastian: What is missing in the diagram? [18:18:07] Glen: not speaking as WG chair, network work infrastructure requires to support hokey. [18:18:30] Glen: How to support hokey with Diameter and RADIUS is necessary. [18:20:32] Slide 12. [18:22:22] Slides and 13 and 14. [18:22:57] ER server pushes key to CA in slide 14. [18:23:04] Slide 15. [18:24:02] Slide 16. [18:24:34] Glen: How many people read this document? [18:25:18] Glen: How many people can commit on developing this document? [18:25:40] 5 people raised hands. [18:26:02] Glen: Wait for comments on the mailing list and decide. [18:26:18] Lionel: Why it is not yet WG document? [18:27:48] Tim: I have read this version. People need to take their time to read this first before it comes as -00 doc. [18:28:42] Glen: Will send an email to ask for reading the doc. [18:29:14] Glen explained document status. [18:29:36] The meeting ended. [18:29:58] h-suzuki leaves the room [18:30:05] yohba727 leaves the room [18:32:05] katrin leaves the room [18:35:39] polk.tim28371 leaves the room [18:36:14] ꈲ joins the room [19:46:39] ꈲ leaves the room [19:55:49] ꈲ joins the room [20:08:39] ꈲ leaves the room [20:08:40] ꈲ joins the room [20:40:15] ꈲ leaves the room [20:40:46] ꈲ joins the room [21:40:15] ꈲ leaves the room