Hi Yaron, You are saying the same things what i am saying, then i am not able to understand how its counter example? The point i want to make here, "We can emphasize the main use case scenario the draft, but protocol should have a space for generality". According to me RFC - 5685 is good example of the above.
Best regards, Raj On Tue, Mar 30, 2010 at 5:45 PM, Yaron Sheffer <yaronf.i...@gmail.com>wrote: > Hi Raj, > > this in fact is the perfect counter-example: RFC 5685 started out with the > client-gateway scenario, and when we woke up to see how it can be > generalized to the symmetric gateway-gateway case, it was too late. Hence > Sec. 10, which says that the resulting protocol is a very partial solution > for this case. > > 10. Use of the Redirect Mechanism between IKEv2 Peers > > The redirect mechanism described in this document is mainly intended > for use in client-gateway scenarios. However, the mechanism can also > be used between any two IKEv2 peers. But this protocol is > asymmetric, meaning that only the original responder can redirect the > original initiator to another server. > > I'm not saying that we were right in ignoring this case. I'm saying that > you can only get the protocol that you want if you define the requirements > clearly up front. > > Thanks, > Yaron > > > On 29.3.2010 16:58, Raj Singh wrote: > >> Hi Team, >> >> The similar scenarios are beautifully handled by Redirect RFC-5685. >> The Redirect RFC emphasize on client-gateway terminology, which is >> typical use of Redirect mechanism in IKEv2 where Gateway redirects >> client to another less loaded gateway but at the same time RFC is also >> applicable to router-router scenario when one router decides to off-load >> all existing IKEv2 sessions to another gateway when it goes down for >> maintenance etc. >> I totally agree with Paul. >> >> Best regards, >> Raj >> >> On Sun, Mar 28, 2010 at 8:09 PM, Paul Hoffman <paul.hoff...@vpnc.org >> <mailto:paul.hoff...@vpnc.org>> wrote: >> >> <wg-co-chair-hat on> >> >> The disagreement between Dan and Yaron is over wording in the >> not-at-all normative criteria draft. This draft is not intended to >> become an RFC, and is not binding on the WG. It currently is being >> edited by Yaron; soon it will be edited by both Yaron and Dan. >> >> From the active thread the past few days, it seems that Dan >> disagrees with Yaron's view that people thinking about the PAKE >> primarily as a gateway-to-gateway solution. That's fine: others in >> the WG might take one view or the other. I ask that Dan and Yaron >> produce an -03 with both views in it. I note that the current WG >> charter does not insist that the PAKE we choose be for >> gateway-to-gateway, but that it does list "authentication between >> two servers or routers" as a motivating scenario, and does not list >> remote access as a motivating scenario for the proposed new work. >> >> As WG members consider which criteria are important to them, they >> should also consider what scenarios we want to emphasize in the >> eventual document. I use the word "emphasize" here because we cannot >> prevent implementers and administrators from using the new >> authentication mechanism however they want; we have plenty of >> experience with IKE and IPsec documents saying "you should use this >> in that way" that are merrily ignored by large parts of the market. >> >> --Paul Hoffman, Director >> --VPN Consortium >> _______________________________________________ >> IPsec mailing list >> IPsec@ietf.org <mailto:IPsec@ietf.org> >> >> https://www.ietf.org/mailman/listinfo/ipsec >> >> >> >> >> _______________________________________________ >> IPsec mailing list >> IPsec@ietf.org >> https://www.ietf.org/mailman/listinfo/ipsec >> >
_______________________________________________ IPsec mailing list IPsec@ietf.org https://www.ietf.org/mailman/listinfo/ipsec