[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Photuris, once more
Each party selects an authentication function from the list of
mechanisms supported by the other party. Authentication policy is in
the receiver direction. Only the receiver can determine that
arriving traffic is authentic. It indicates its need for
authentication by including authentication transforms, and/or
authenticated encryption transforms, in its transform list.
How does the initiator indicate that it wants MD5 as a K-transform and
does not want AH from the responder?
References: