Hi Valery
I have one Q. If endpoint receives a request to create an unauthenticated IKE SA from the IP address, which is configured on the endpoint to be authenticated, the request SHOULD be rejected. Why is this not MUST be rejected ? Otherwise an attacker could trick the responder into revealing their identity (maybe some words around this also?). Thanks Graham On 08/09/2014 07:27, "Valery Smyslov" <[email protected]> wrote: >Yes. > >Obviously, as the author of the document I can see its value, >which is describet in the document itself. >And I think it's better to standardize it with >more people involved, than as individual submission. > >Regards, >Valery. > >----- Original Message ----- >From: "Yaron Sheffer" <[email protected]> >To: "ipsec" <[email protected]> >Sent: Sunday, September 07, 2014 10:53 PM >Subject: [IPsec] Call for adoption: The NULL Authentication Method in >IKEv2Protocol > > >> Dear working group, >> >> This is a call for adopting draft-smyslov-ipsecme-ikev2-null-auth as a >>WG >> document. Please respond to this mail with a Yes or No and a short >> rationale, at latest by Friday Sep. 12. >> >> Thanks, >> Yaron >> >> _______________________________________________ >> IPsec mailing list >> [email protected] >> https://www.ietf.org/mailman/listinfo/ipsec > >_______________________________________________ >IPsec mailing list >[email protected] >https://www.ietf.org/mailman/listinfo/ipsec
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ IPsec mailing list [email protected] https://www.ietf.org/mailman/listinfo/ipsec
