Forums before death by AOL, social media and spammers... "We can't have nice things"
|    comp.dcom.vpn    |    VPN protocols, clients, awesomeness    |    2,349 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,973 of 2,349    |
|    Stephen J. Bevan to pvsnmp@yahoo.com    |
|    Re: IKE Phase1 3 message pair    |
|    04 Apr 06 02:40:28    |
      From: stephen@dino.dnsalias.com              pvsnmp@yahoo.com writes:       >>I don't know what else you want to do and so what is required.       > What I meant was that when we have the hash computed using HMAC which       > can be (is) used to authenticate the peers, why do you need an explicit       > pair of messages with the IP Address of peers in it, as in the 3rd pair       > of messages.              In the case it is an IP address it isn't much use. The best that can       be done is to optionally check it matches the IP address on the IKE       packet but even that fails in the presence of NAT.              However, the IDii does not have to be an IP address. It could be a       FQDN or an opaque key. Either of these can be used to pass down a       value that is known only to the initiator and responder. Obviously       using a FQDN name like "stephen@dino.dnsalias.com" would be easy to       guess but if instead it was a string like "stephen/*WQ732HG" where       "stephen" is the user-name and "*WQ732HG" is another shared secret       then this can be used to provide identity protection (stephen) and       provide a way to use main-mode with a (group) pre-shared key but still       providing per-user authentication.              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca