[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: >IPSEC Charter - New Dra




Steve Kent says:
> 	One could do nothing more than make use of the services
> offered by a security protocol for end-to-end protection at layer 3,
> but this would ignore many of the potential security problems that
> arise in some mobile IP scenarios.  For example, unless a host can
> authenticate its right to use an invariant IP address (not one
> assigned by the network currently providing the access service), then
> there are obvious denial of service vulnerabilities.

Sure, but why couldn't you simply use the IP security protocol to
speak to the mobile's current cell router (I've forgotten the proper
name) to verify your right to use the address? I don't understand why
we would need a seperate protocol.

> There is also an option to tie such authenticated assertions into a
> billing scheme.

Sure, but again, I see no legitimate reason that one would need a new
security protocol to deal with this.

Perry


Follow-Ups: