[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Photuris, once more




   Each party selects an authentication function from the list of
   mechanisms supported by the other party.  Authentication policy is in
   the receiver direction.  Only the receiver can determine that
   arriving traffic is authentic.  It indicates its need for
   authentication by including authentication transforms, and/or
   authenticated encryption transforms, in its transform list. 

How does the initiator indicate that it wants MD5 as a K-transform and
does not want AH from the responder?







References: