To:
ietf-provreg@cafax.se
From:
Kent Crispin <kent@songbird.com>
Date:
Wed, 14 Feb 2001 13:10:20 -0800
In-Reply-To:
<5.0.2.1.0.20010214150906.03000160@mail.register.com>; from Jordyn A. Buchanan on Wed, Feb 14, 2001 at 03:32:00PM -0500
Mail-Followup-To:
ietf-provreg@cafax.se
Sender:
owner-ietf-provreg@cafax.se
Subject:
Re: grrp-reqs-06, 3.2 Identification and Authentication [3]
On Wed, Feb 14, 2001 at 03:32:00PM -0500, Jordyn A. Buchanan wrote: [...] > I'm > prepared to acknowledge that we're not dealing with the full scope of data > policy elements, but I don't think that means we should give up on solving > the problems that we can or hastily adopting a transport mechanism that may > or may not be well suited for the protocol we develop. I'm not sure that there is any conflict here. >>Note these data collection policies are not specific to any particular datum >>(or object) within a flow between R-* entities, any more than are the A & I >>policies. > > Yes they are. A couple of examples: [examples] Granted, but I don't think this is a major point. >>How the data policies are implemented is (implementation specific). How they >>are announced, let alone "negociated" is a protocol requirement, assuming that >>policy differences do in fact exist. I think they do. > > I agree they exist, but my point is that these policies are likely to be > announced and negotiated out-of-band on a contractual or regulatory > basis. Additionally, they are unlikely to change with regularity, so > there's no need for dynamic negotiation to occur. I don't read Eric's statement above as a contradiction to that point. -- Kent Crispin "Be good, and you will be kent@songbird.com lonesome." -- Mark Twain