Re: [IPsec] Some comments to the draft-ietf-ipsecme-p2p-vpn-problem-00

2012-03-15 Thread Michael Richardson
Tero == Tero Kivinen kivi...@iki.fi writes: Tero This means that we might need to add creation of temporary Tero credentials to the protocol. This is an interesting question. I think the requirements document needs to either make this in scope or make it out of scope by requiring

Re: [IPsec] Some comments to the draft-ietf-ipsecme-p2p-vpn-problem-00

2012-03-15 Thread Tero Kivinen
Michael Richardson writes: Tero In section 3.2 about star topology it should be noted, that Tero quite often adminstrators do require star topology because Tero they want to do some kind of inspection for all traffic inside Tero the vpn. This kind of policy might make it

[IPsec] Some comments to the draft-ietf-ipsecme-p2p-vpn-problem-00

2012-03-14 Thread Tero Kivinen
In section 2.1 where there is dicsussion about the endpoint to endpoint vpn use case, it should be noted, that this might require different temporary credentials. Endpoints (especially remote access users) do use passwords or similar credentials which cannot be forwarded. I.e. if the shared secret

Re: [IPsec] Some comments to the draft-ietf-ipsecme-p2p-vpn-problem-00

2012-03-14 Thread Yoav Nir
On Mar 14, 2012, at 8:00 AM, Tero Kivinen wrote: In section 2.1 where there is dicsussion about the endpoint to endpoint vpn use case, it should be noted, that this might require different temporary credentials. Endpoints (especially remote access users) do use passwords or similar