|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: iSCSI: DLB's [T.33] 10.5 Challenge Handshake Authentication Protocol (CHAP)
Rod,
Section 10 has a lot of such MUSTs for the required steps
of each authentication method. All these are applied of course
only when the relevant authentication method have been chosen
in the negotiation.
(or maybe you confused the "Algorithm" with "authentication method",
i.e., in
"For the Algorithm, as stated in [RFC1994], one value is required
to be implemented:
5 (CHAP with MD5)..."
the Algorithm is the CHAP_A key sent on the first CHAP step. )
Regards,
Ofer
Ofer Biran
Storage and Systems Technology
IBM Research Lab in Haifa
biran@il.ibm.com 972-4-8296253
"Rod Harrison" <rod.harrison@windriver.com>@ece.cmu.edu on 07/07/2002
18:03:32
Please respond to "Rod Harrison" <rod.harrison@windriver.com>
Sent by: owner-ips@ece.cmu.edu
To: <ips@ece.cmu.edu>
cc:
Subject: iSCSI: DLB's [T.33] 10.5 Challenge Handshake Authentication
Protocol (CHAP)
David,
A MUST here seems to preclude the initiator not offering CHAP due to
administrative configuration. In fact the original SHOULD seems a bit
strong.
I.e. is ...
AuthMethod=none
no longer to be valid?
If so perhaps the text should change to require CHAP and / or none.7
- Rod
Home Last updated: Mon Jul 08 10:19:01 2002 11170 messages in chronological order |