In section 2.1 where there is dicsussion about the endpoint to
endpoint vpn use case, it should be noted, that this might require
different temporary credentials. Endpoints (especially remote access
users) do use passwords or similar credentials which cannot be
forwarded. I.e. if the shared secret
On Mar 14, 2012, at 8:00 AM, Tero Kivinen wrote:
In section 2.1 where there is dicsussion about the endpoint to
endpoint vpn use case, it should be noted, that this might require
different temporary credentials. Endpoints (especially remote access
users) do use passwords or similar
Paul == Paul Wouters p...@cypherpunks.ca writes:
Few of my suggestions here
1.) Cut through VPN 2.) Auto mesh VPN
Paul Coming from FreeS/WAN and Openswan, I'm tempted to call it
Paul OEVPN, where OE stands for Opportunistc Encryption.
It's not Opportunistic.
It's
On Wed, 14 Mar 2012, Michael Richardson wrote:
Paul == Paul Wouters p...@cypherpunks.ca writes:
Few of my suggestions here
1.) Cut through VPN 2.) Auto mesh VPN
Paul Coming from FreeS/WAN and Openswan, I'm tempted to call it
Paul OEVPN, where OE stands for Opportunistc
On Mar 14, 2012, at 11:20 AM, Paul Wouters wrote:
Guess that's what I get for not fully reading the doument yet.
A note to everyone: reading the document sooner rather than later will help
make our hour in Paris much more useful.
I assumed
P2P actually meant peer to peer which kinda assumes