Hi Kostas I must disagree here. Stating that unauthenticated mode is no longer applicable is incorrect. I believe that adding network diagrams to scope the applicability is a good idea as long as the associated text is concise. I am still confused about the new mode applicability :)
-Steve -----Original Message----- From: Kostas Pentikousis [mailto:[email protected]] Sent: July-22-14 10:54 AM To: Steve Baillargeon Cc: [email protected]; Brian Trammell; [email protected]; [email protected] Subject: AW: [ippm] WGLC on draft-ietf-ippm-ipsec-03 Hi Steve, | The changes looks good but I think we need a couple of simple network | diagrams to clarify the case when this mode is not needed and the case | when it needed. Simple network examples may be a good idea to orient the uninitiated reader. But adding network diagrams to scope the applicability is not an equally good idea. <snip> | internal networks are considered "trustable" and both TWAMP endpoints I'm not sure whether anyone really thinks that an "internal" network in the age of virtualization can be "trustable" :) Best regards, Kostas _______________________________________________ IPsec mailing list [email protected] https://www.ietf.org/mailman/listinfo/ipsec
