Hi Kostas
I must disagree here. 
Stating that unauthenticated mode is no longer applicable is incorrect.
I believe that adding network diagrams to scope the applicability is a good 
idea as long as the associated text is concise.
I am still confused about the new mode applicability :)

-Steve

-----Original Message-----
From: Kostas Pentikousis [mailto:[email protected]] 
Sent: July-22-14 10:54 AM
To: Steve Baillargeon
Cc: [email protected]; Brian Trammell; [email protected]; 
[email protected]
Subject: AW: [ippm] WGLC on draft-ietf-ippm-ipsec-03

Hi Steve,

| The changes looks good but I think we need a couple of simple network 
| diagrams to clarify the case when this mode is not needed and the case 
| when it needed.

Simple network examples may be a good idea to orient the uninitiated reader. 
But adding network diagrams to scope the applicability is not an equally good 
idea. 

<snip>

| internal networks are considered "trustable" and both TWAMP endpoints

I'm not sure whether anyone really thinks that an "internal" network in the age 
of virtualization can be "trustable" :)

Best regards,

Kostas

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to