|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] iSCSI: Keys used in security negotiation stageSection 11 iSCSI Security Text Keys and Authentication
Methods
lists a set of keys that can be used in security negotiation
stage.
It also says "NO OTHER keys MAY be used". Is it safe to
assume
that any other key received during security negotiation
stage
is a protocol error?
thanks!
-lakshmi
Home Last updated: Wed Jun 11 14:19:41 2003 12631 messages in chronological order |