[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Where does security belong?




Tom,

	The motivation for providing confidentiality, authenticoty,
etc. at the IP layer is to provide a uniform tool which can protect a
variety of transport protocols (UDP, TCP, ...) and which can be 
implemented at either end systems or intermediate systems.
There is a differenec between arguing about what facilities
are appropriate for includion in the IP header or IP option
field (an area in which I agree with Phil) vs. a discussion of
where to use an encapsulating security protocol in the protoocl stack.

Steve


References: