Scott C Moonen writes:
> > Section 1.4 says that
> > 
> >                INFORMATIONAL exchanges MUST ONLY occur
> >    after the initial exchanges and are cryptographically protected with
> >    the negotiated keys.
> > 
> > This does not match the 1.5 which says we can send INFORMATIONAL
> > exchanges also outside the IKE SA.
> 
> I think that section 1.5 is pretty careful to distinguish between 
> informational messages (sent outside the IKE SA) and informational 
> exchanges (which occur only within the context of an IKE SA).  I'm 
> inclined to keep the Section 1.4 text as it is.  If you prefer, though, 
> I'd be ok with clarifying Section 1.4 to say "INFORMATIONAL exchanges (to 
> be distinguished from INFORMATIONAL messages sent outside the context of 
> an IKE SA) . . ."

That change looks even better than my proposed one...
-- 
kivi...@iki.fi
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to