Table of Contents
Engineering Trade-offs in Authentication Protocols
Areas Where Proposals Differ
Performance
Performance Comparison(messages)
Celeron 300 Time Estimates (ms)(thanks to EKR)
Stateless Cookie
Stateless Cookie
Identity Hiding
Identity Hiding
Comparing Protocols
Dead Peer Detection
How to detect a dead peer
Plausible Deniability
Negotiating Parameters
How to Negotiate Parameters
What Parameters does IKEv1 Negotiate?
How Do Proposals Differ on Parameters
Different Kinds of Credentials(usually noninteroperable)
Other Differences
|
Author: Charlie Kaufman
|