Hi, This is a follow up of the below mentioned discussion.
Thanks and Regards, Prashant
Hi, This is a follow up of the below mentioned discussion.
Thanks and Regards, Prashant
I answered that in the last message in the thread you reference.
Hi Stephen,
In pre-shared key authentication, does the recipient of message 5 or 6 do anything else with the ID than using it for computation of hash?
Thanks and Regards, Prashant
The recipient should validate the ID according to their security policy the details of which are not dictated by IKE. So, it can vary from doing no validation (common if the ID is an IP address) to doing checks like the ones I describe in the paragraph you quote.
Thanks Stephen for the reply.
Prashant
Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.