|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: iSCSI - Change - Login/Text commands with the binary stage codeOr it may skip the Security Stage at all (e.g., when it uses IPSEc and it is satisfied with whatever IPSec gives him). Julo Steve Senum <ssenum@cisco.com>@ece.cmu.edu on 30-08-2001 19:48:04 Please respond to Steve Senum <ssenum@cisco.com> Sent by: owner-ips@ece.cmu.edu To: ietf-ips <ips@ece.cmu.edu> cc: Subject: Re: iSCSI - Change - Login/Text commands with the binary stage code Julian, > Implement and use are different terms. An administrator might set it up not > to use security under specific conditions. I understand that. Still, the only situation I would consider it valid for the initiator to skip the SecurityNegotiation stage is if it intended to send out: I-> AuthMethod:none HeaderDigest:none DataDigest:none Otherwise it should give the target the chance to negotiate these options. Regards, Steve Senum
Home Last updated: Tue Sep 04 01:03:49 2001 6315 messages in chronological order |