|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [iSCSI]: Key negotiation procedure proposalI agree. The only reason for a rejected key is that the orignator offered something that shouldn't have ever been offered or provided a list with no acceptable options to the responder. There isn't any point in continuing the negotiation. Pat -----Original Message----- From: Paul Koning [mailto:ni1d@arrl.net] Sent: Thursday, May 23, 2002 9:55 AM To: luben@splentec.com Cc: Julian_Satran@il.ibm.com; ips@ece.cmu.edu Subject: Re: [iSCSI]: Key negotiation procedure proposal Excerpt of message (sent 23 May 2002) by Luben Tuikov: > But Julian, I'm _not_ talking here about discovering capabilities. > > This is just rules for Login/Text Operational Key Negotiation. > ... > Furthermore I don't think that this complicates negotiation, > If anything ,it makes it simpler. There is a rule for simple > implementations (Martins, your opinion?) and a rule > for fully developed implementations. > > It's just login/text negotiation rules. > > People, take a look at the rules and examples > and let me hear your opinion? (those of you > involved in login/text neg. discussions) I think it's unnecessarily complex. The "simple implementation" alone is plenty. paul
Home Last updated: Fri May 24 20:18:34 2002 10315 messages in chronological order |