|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: iSCSI - Change - Login/Text commands with the binary stage code
Or it may skip the Security Stage at all (e.g., when it uses IPSEc and it
is satisfied with whatever IPSec gives him).
Julo
Steve Senum <ssenum@cisco.com>@ece.cmu.edu on 30-08-2001 19:48:04
Please respond to Steve Senum <ssenum@cisco.com>
Sent by: owner-ips@ece.cmu.edu
To: ietf-ips <ips@ece.cmu.edu>
cc:
Subject: Re: iSCSI - Change - Login/Text commands with the binary stage
code
Julian,
> Implement and use are different terms. An administrator might set it up
not
> to use security under specific conditions.
I understand that. Still, the only situation I would
consider it valid for the initiator to skip the
SecurityNegotiation stage is if it intended to send out:
I-> AuthMethod:none
HeaderDigest:none
DataDigest:none
Otherwise it should give the target the chance to
negotiate these options.
Regards,
Steve Senum
Home Last updated: Tue Sep 04 01:03:49 2001 6315 messages in chronological order |