Seems sensible; I'll try to come up with something. Cheers, On 13/11/2011, at 8:33 PM, Randall Gellens wrote: > In today's APPAREA/APPSWG session, Mark briefly talked about this > draft, and when mentioning the 511 code, said that his intent was not > to encourage captive portal interception as a technique for network > access authorization or authentication, but rather to reduce the harm > that such mechanisms cause. > > I agree with all these goals, but in looking at > draft-nottingham-http-new-status-03.txt, I wonder if it would be > helpful to add some text in section 6 that mentions some of the ill > effects of the method, and mentions or points to a few better > alternative mechanisms for authorizing network access. > > -- > Randall Gellens > Opinions are personal; facts are suspect; I speak for myself only > -------------- Randomly selected tag: --------------- > Hofstadter's Law: > It always takes longer than you expect, even when you take > Hofstadter's Law into account. -- Mark Nottingham http://www.mnot.net/Received on Monday, 14 November 2011 03:12:50 UTC
This archive was generated by hypermail 2.4.0 : Thursday, 2 February 2023 18:43:26 UTC