On Wed, 4 Jun 2014, Valery Smyslov wrote:

I've already asked co-chairs for a slot to present null-auth
in a private e-mail.

Great :)

We should probably add a comment about rekeying. If the responder
becomes the initiator, it might run into issues. Possibly an entity
that did not authenticate the peer should not initiate a rekey.

There is also the case where A uses null auth to an authenticated B,
and B then gets independantly triggered to setup a null auth connection
to A. We haven't fully figured out how to deal with this other than
"if we see our own IPSECKEY record, don't initiate null auth", but I'm
not sure if that covers everyone's use case.

Paul
ps. i also still prefer AUTH_NONE over "NULL AUTH", as to me NULL looks
more like an error while "none" conveys intent.

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to