[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Re[2]: key management



Housley, Russ says:
> My understanding was that the IP layer was selected so that the security
> could be slipped into the protocol stack with a lot of transparency.

Sure!

> > There are very good reasons that the IPng directorate made the
> > decision they did. I wouldn't discard the recommendation without
> > extremely serious thought.
> I have given this a lot of thought.  In fact, I have been involved in
> security protocol design efforts since 1986, and this issue comes up in
> each new effort.............
> I think that IPSP has many advantages, but in my opinion, it should not be
> used (or abused) to provide application-to-application security.

Couldn't agree more. Glad I'm not the only one holding this opinion.
--
Regards,
Uri         uri@watson.ibm.com      N2RIU
-----------
<Disclamer>



References: