[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: xauth requirements: vulnerabilities



Hi Dan,

Dan Harkins wrote:

>   Stephane,
>
>   Your description of XAUTH is very disingenous.
>
>   Since the whole point of someone using XAUTH is because they do not
> want to deploy a PKI let's dismiss forever the notion that the IKE SA can
> be authenticated with a certificate and the two parties can proceed to
> XAUTH. You even admit this. It's for people who "can't (and won't) deploy
> a PKI". So that means you're stuck with pre-shared keys to authenticate
> the IKE SA.
>

Then why don't you use Hybrid?
Yes, you need a PKI, but only a small scale PKI.





References: