[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: who is implementing rekey and how



Title: who is implementing rekey and how
I think most people are either using pre-setup or on-demand negotiation. I'm interested: Does anyone do the multiple SA pre-setup method which is mentioned in the RFC? That strikes me as a superior technique (once you solve any black-hole problems), but I haven't seen anyone asking about it at any of the last few bakeoffs.
 
Andrew
-------------------------------------------
Upon closer inspection, I saw that the line
dividing black from white was in fact a shade
of grey. As I drew nearer still, the grey area
grew larger. And then I was enlightened.
 
-----Original Message-----
From: owner-ipsec@lists.tislabs.com [mailto:owner-ipsec@lists.tislabs.com]On Behalf Of Jerome Freedman Jr
Sent: Tuesday, October 09, 2001 9:56 AM
To: ipsec@lists.tislabs.com
Subject: who is implementing rekey and how


What vendors are implementing IKE rekey and how are they doing it? ( establishing n SA's in one swell foop,  just-in-time , etc).

Jerry Freedman

          >\  |  /<
           (@) (@)
 ------ o00o-(_)-o00o---------------



References: