[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: "Me Tarzan, You Jane" in IKEv2-05
> >>>>> "Dan" == Dan Harkins <dharkins@tibernian.com> writes:
> Dan> If a contrived use of porn is the "high volume
> scenario" for this
>
> How many times do I have to explain this?
>
> The average multi-user systems needs this so that it can do
> process to
> process tunnels with real credentials.
Interesting, but I'm still convinced that the responder can use the
initiator's identity to determine how to respond. I'm not certain how a
process-to-process tunnel would look exactly, though.
-g
> ] ON HUMILITY: to err is human. To moo, bovine.
> | firewalls [
> ] Michael Richardson, Sandelman Software Works, Ottawa, ON
> |net architect[
> ] mcr@sandelman.ottawa.on.ca
> http://www.sandelman.ottawa.on.ca/ |device > driver[
> ]
> panic("Just another Debian GNU/Linux using, kernel hacking,
> security guy"); [
>