[IPsec] EAP AKA on USIM

2012-03-06 Thread Prashant Batra (prbatra)
Hello, Not sure if this is the right place to ask this, but I am not getting any other mailing list. Can someone point me to a software implementation of EAP-AKA algorithm (calculation of IK/CK/RES/MAC) on USIM, when the sim gets a EAP-Challenge request. Thanks,

[IPsec] Please Comment on New P2P VPN Problem Statement

2012-03-06 Thread Stephen Hanna
In case you didn't notice, I have posted the -00 version of the P2P VPN problem statement. The URL is below. Please review and comment. I'm especially interested in getting feedback on the use cases in this document. As previously agreed, they are based on the use cases in section 2.2 of the

Re: [IPsec] Please Comment on New P2P VPN Problem Statement

2012-03-06 Thread Vishwas Manral
Hi Steve, I agree to the need of standardization for a large scale point-to-point solution. 1. I guess the problem statement is not just about lessening the number of configuration commands but also the fact that static configuration may not work in some cases. The spokes may get new addresses

Re: [IPsec] Please Comment on New P2P VPN Problem Statement

2012-03-06 Thread Paul Hoffman
Yes, please do comment on the draft. Before commenting, read the whole draft. For extra points: start different threads of the comments with different subject lines. We will discuss this draft at the upcoming IETF meeting in Paris. By discuss, I do *not* mean have the draft introduced to us: I

[IPsec] Call for agenda items

2012-03-06 Thread Paul Hoffman
We have one active draft, and that might take up most of our hour. However, we have often had time to have short (5 minutes or less) quick presentations on other topics. A proposed agenda is: 5 min: WG intro 45 min: draft-ietf-ipsecme-p2p-vpn-problem issues 5 min:

[IPsec] P2P VPN Problem Statement - why is this hard?

2012-03-06 Thread Yoav Nir
Hi Steve On Mar 6, 2012, at 11:54 PM, Stephen Hanna wrote: So please review this short document and send comments. While the draft does a good job of describing use cases, and certain inadequate solutions, I think it's missing a description of why this is hard. Even if we accept the solution