Hi,

coming back to the yesterday discussion. There seems to be another issue 
if implementation first sends request to update address over UDP and
then switches to TCP. The problem arises if NO_NATS_ALLOWED is included - 
it contains IP addresses and ports for initiator and responder. If you
leave it intact while switching to TCP, then it won't match real addresses
and the responder will treat it as NAT presence. In this case RFC 4555
suggests to retry sending request several times with a new INFORMATIONAL
request. Probably we could clarify in TCP guidelines draft that the content
of NO_NATS_ALLOWED MUST be recalculated in this case? Or is it obvious?

Regards,
Valery.


_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to