SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    iSCSI: IKE normative guidelines



    
    In the framework of the effort being done now by the security team
    to sync the normative statements in the security draft with the
    protocol drafts, I suggest to adopt the following IKE normative
    guidelines that already appear in the security draft for iSCSI:
    
    ==================================================================
    
    "Conformant iSCSI, iFCP and FCIP implementations MUST support peer
    authentication using a pre-shared key, and MAY support
    certificate-based peer authentication using digital signatures.
    Peer authentication using the public key encryption methods outlined
    in IKE's sections 5.2 and 5.3[7] SHOULD NOT be used.
    
    ...Conformant iSCSI, FCIP and iFCP security implementations MUST support
    both IKE Main Mode and Aggressive Mode
    
    ...When digital signatures are used to achieve authentication, an IKE
    negotiator SHOULD use IKE Certificate Request Payload(s) to specify the
    certificate authority
    
    ...IKE negotiators SHOULD check the pertinent Certificate Revocation
    List (CRL) before accepting a PKI certificate for use in IKE's
    authentication procedures"
    
    ==================================================================
    
     Regards,
       Ofer
    
    
    Ofer Biran
    Storage and Systems Technology
    IBM Research Lab in Haifa
    biran@il.ibm.com  972-4-8296253
    
    


Home

Last updated: Sun Nov 11 17:17:33 2001
7747 messages in chronological order