[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: "Me Tarzan, You Jane" in IKEv2-05



> >>>>> "Dan" == Dan Harkins <dharkins@tibernian.com> writes:
>     Dan>   If a contrived use of porn is the "high volume 
> scenario" for this
> 
>   How many times do I have to explain this?
> 
>   The average multi-user systems needs this so that it can do 
> process to
> process tunnels with real credentials. 

Interesting, but I'm still convinced that the responder can use the
initiator's identity to determine how to respond.  I'm not certain how a
process-to-process tunnel would look exactly, though.

-g

> ]       ON HUMILITY: to err is human. To moo, bovine.         
>   |  firewalls  [
> ]   Michael Richardson, Sandelman Software Works, Ottawa, ON  
>   |net architect[
> ] mcr@sandelman.ottawa.on.ca 
> http://www.sandelman.ottawa.on.ca/ |device > driver[
> ] 
> panic("Just another Debian GNU/Linux using, kernel hacking, 
> security guy"); [
>