On 11/28/2011 04:31 PM, Michael Ko wrote:
To establish a secure connection between two authorized network nodes,
some of the critical management tasks that are required include the
following:
1. Discover if the network nodes that a user is authorized to access are
currently online and active. (One can always resort to timeouts to
determine if the peer is online or not, but being able to ascertain the
status of the peer quickly would be nice.)
2. Discover the functional attributes associated with these authorized
network nodes.
3. Discover the location of the authorized network nodes. (E.g., current
IP address)
4. Determine if accessing the network node requires going through a
relay (e.g., TURN). Discover the location of the relay if it is needed.
5. Determine the parameters needed to establish a secure connection
between the two network nodes.
6. Discover, via inquiry or advertisement, other authorized network
nodes as they become active and available.
If we use the hub as the entity to provide this "discovery" function,
then the statement "hubs can receive information from the spokes about
what addresses the spoke gateways protect" comes closest to meeting the
requirment, although the information to be "discovered" include the
above list and goes beyond just addresses.

Could you go into more detail about what you mean by "user" here,
and what "authorized" means?  Are you going out and querying an
authorization system?  Are you expecting that a pile of attributes
is going to be returned as the result of an authentication?  Is
a "user" some sort of authenticated credential, or something along
the lines of an NAI, or an IP address, or ... ?

Melinda
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to