Hi Yaron,

In response to issue 193. For reference:

--8<--
Section 9.3: this entire discussion is probably redundant, because when a node 
fails in the LS cluster, you switch to another node. Implementing QCD on top of 
this is probably an overkill. If we remove this section, we can get rid of sec. 
5.2 as well, and we can focus on a single recommended way to generate the 
token, which would make analysis that much easier.
--8<--

9.3 has been moved to 10.4 under security consideration. I will refer to 10.4 
instead of 9.3 from now on.

The token generation method highlighted in 5.1 presents a security risk 
highlighted in section 10.4.

We can not get rid of 5.2 nor 10.4, however we could make it clearer that 5.2 
is the recommended token generation method when the risk highlighted in10.4 is 
present.

Regards,

        fred

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to