Hi Valery


I have one Q.

If endpoint receives a request to create an unauthenticated IKE SA
from the IP address, which is configured on the endpoint to be
authenticated, the request SHOULD be rejected.


Why is this not MUST be rejected ? Otherwise an attacker could trick the
responder into revealing their identity (maybe some words around this
also?).

Thanks

Graham


On 08/09/2014 07:27, "Valery Smyslov" <[email protected]> wrote:

>Yes.
>
>Obviously, as the author of the document I can see its value,
>which is describet in the document itself.
>And I think it's better to standardize it with
>more people involved, than as individual submission.
>
>Regards,
>Valery.
>
>----- Original Message -----
>From: "Yaron Sheffer" <[email protected]>
>To: "ipsec" <[email protected]>
>Sent: Sunday, September 07, 2014 10:53 PM
>Subject: [IPsec] Call for adoption: The NULL Authentication Method in
>IKEv2Protocol
>
>
>> Dear working group,
>>
>> This is a call for adopting draft-smyslov-ipsecme-ikev2-null-auth as a
>>WG 
>> document. Please respond to this mail with a Yes or No and a short
>> rationale, at latest by Friday Sep. 12.
>>
>> Thanks,
>> Yaron
>>
>> _______________________________________________
>> IPsec mailing list
>> [email protected]
>> https://www.ietf.org/mailman/listinfo/ipsec
>
>_______________________________________________
>IPsec mailing list
>[email protected]
>https://www.ietf.org/mailman/listinfo/ipsec

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to